
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Griffin: Real-Time Network Intrusion Detection System via Ensemble of Autoencoder in SDN
Liyan Yang, Yubo Song, Shang Gao, et al.
IEEE Transactions on Network and Service Management (2022) Vol. 19, Iss. 3, pp. 2269-2281
Closed Access | Times Cited: 50
Liyan Yang, Yubo Song, Shang Gao, et al.
IEEE Transactions on Network and Service Management (2022) Vol. 19, Iss. 3, pp. 2269-2281
Closed Access | Times Cited: 50
Showing 1-25 of 50 citing articles:
Ensemble of Autoencoders for Anomaly Detection in Biomedical Data: A Narrative Review
Ali Nawaz, Shehroz S. Khan, Amir Ahmad
IEEE Access (2024) Vol. 12, pp. 17273-17289
Open Access | Times Cited: 17
Ali Nawaz, Shehroz S. Khan, Amir Ahmad
IEEE Access (2024) Vol. 12, pp. 17273-17289
Open Access | Times Cited: 17
Flow-based intrusion detection on software-defined networks: a multivariate time series anomaly detection approach
Sultan Zavrak, Murat İskefiyeli
Neural Computing and Applications (2023) Vol. 35, Iss. 16, pp. 12175-12193
Open Access | Times Cited: 19
Sultan Zavrak, Murat İskefiyeli
Neural Computing and Applications (2023) Vol. 35, Iss. 16, pp. 12175-12193
Open Access | Times Cited: 19
Securing SDN: Hybrid autoencoder-random forest for intrusion detection and attack mitigation
Lotfi Mhamdi, Mohd Mat Isa
Journal of Network and Computer Applications (2024) Vol. 225, pp. 103868-103868
Open Access | Times Cited: 7
Lotfi Mhamdi, Mohd Mat Isa
Journal of Network and Computer Applications (2024) Vol. 225, pp. 103868-103868
Open Access | Times Cited: 7
Network intrusion detection and mitigation in SDN using deep learning models
Mamatha Maddu, Yamarthi Narasimha Rao
International Journal of Information Security (2023) Vol. 23, Iss. 2, pp. 849-862
Closed Access | Times Cited: 12
Mamatha Maddu, Yamarthi Narasimha Rao
International Journal of Information Security (2023) Vol. 23, Iss. 2, pp. 849-862
Closed Access | Times Cited: 12
Intrusion detection systems for software-defined networks: a comprehensive study on machine learning-based techniques
Zaid Mustafa, Rashid Amin, Hamza Aldabbas, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 9635-9661
Closed Access | Times Cited: 4
Zaid Mustafa, Rashid Amin, Hamza Aldabbas, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 9635-9661
Closed Access | Times Cited: 4
Recent Advances of Differential Privacy in Centralized Deep Learning: A Systematic Survey
Lea Demelius, Roman Kern, Andreas Trügler
ACM Computing Surveys (2025)
Open Access
Lea Demelius, Roman Kern, Andreas Trügler
ACM Computing Surveys (2025)
Open Access
Software Defined Network Traffic Classification for QoS Optimization Using Machine Learning
Rehab H. Serag, Mohamed S. Abdalzaher, Hussein A. Elsayed, et al.
Journal of Network and Systems Management (2025) Vol. 33, Iss. 2
Open Access
Rehab H. Serag, Mohamed S. Abdalzaher, Hussein A. Elsayed, et al.
Journal of Network and Systems Management (2025) Vol. 33, Iss. 2
Open Access
Navigating Next‐Generation Network Architecture
Monika Dubey, Snehlata, Ashutosh Kumar Singh, et al.
(2025), pp. 1-34
Closed Access
Monika Dubey, Snehlata, Ashutosh Kumar Singh, et al.
(2025), pp. 1-34
Closed Access
Deep learning for the security of software-defined networks: a review
Roya Taheri, Habib Ahmed, Engin Arslan
Cluster Computing (2023) Vol. 26, Iss. 5, pp. 3089-3112
Closed Access | Times Cited: 10
Roya Taheri, Habib Ahmed, Engin Arslan
Cluster Computing (2023) Vol. 26, Iss. 5, pp. 3089-3112
Closed Access | Times Cited: 10
Federated Learning for Privacy-Preserving Intrusion Detection in Software-Defined Networks
Mubashar Raza, Muhammad Jasim Saeed, Muhammad Bilal Riaz, et al.
IEEE Access (2024) Vol. 12, pp. 69551-69567
Open Access | Times Cited: 2
Mubashar Raza, Muhammad Jasim Saeed, Muhammad Bilal Riaz, et al.
IEEE Access (2024) Vol. 12, pp. 69551-69567
Open Access | Times Cited: 2
OptFBFN: IOT threat mitigation in software-defined networks based on fuzzy approach
B. Dhanalaxmi, Yeligeti Raju, B. Saritha, et al.
Cluster Computing (2024) Vol. 27, Iss. 9, pp. 12943-12963
Closed Access | Times Cited: 2
B. Dhanalaxmi, Yeligeti Raju, B. Saritha, et al.
Cluster Computing (2024) Vol. 27, Iss. 9, pp. 12943-12963
Closed Access | Times Cited: 2
Network Anomaly Detection Using Autoencoder on Various Datasets: A omprehensive Review
Richa Singh, Nidhi Srivastava, Ashwani Kumar
Recent Patents on Engineering (2023) Vol. 18, Iss. 9
Closed Access | Times Cited: 5
Richa Singh, Nidhi Srivastava, Ashwani Kumar
Recent Patents on Engineering (2023) Vol. 18, Iss. 9
Closed Access | Times Cited: 5
A Comprehensive Survey on Ensemble Learning-Based Intrusion Detection Approaches in Computer Networks
Thiago José Lucas, Inaê Soares de Figueiredo, Carlos Alexandre Carvalho Tojeiro, et al.
IEEE Access (2023) Vol. 11, pp. 122638-122676
Open Access | Times Cited: 4
Thiago José Lucas, Inaê Soares de Figueiredo, Carlos Alexandre Carvalho Tojeiro, et al.
IEEE Access (2023) Vol. 11, pp. 122638-122676
Open Access | Times Cited: 4
An Effective Method for Detecting Unknown Types of Attacks Based on Log-Cosh Variational Autoencoder
Yu Li, Liuquan Xu, Xuefeng Jiang
Applied Sciences (2023) Vol. 13, Iss. 22, pp. 12492-12492
Open Access | Times Cited: 4
Yu Li, Liuquan Xu, Xuefeng Jiang
Applied Sciences (2023) Vol. 13, Iss. 22, pp. 12492-12492
Open Access | Times Cited: 4
An adaptive multistage intrusion detection and prevention system in software defined networking environment
N Maheswaran, Sanjay K. Bose, B. K. Natarajan
Automatika (2024) Vol. 65, Iss. 4, pp. 1364-1378
Open Access | Times Cited: 1
N Maheswaran, Sanjay K. Bose, B. K. Natarajan
Automatika (2024) Vol. 65, Iss. 4, pp. 1364-1378
Open Access | Times Cited: 1
An intelligent intrusion prediction and prevention system for software defined internet of things cloud networks
S. Kranthi, M. Kanchana, Suneetha Manne
Peer-to-Peer Networking and Applications (2022) Vol. 16, Iss. 1, pp. 210-225
Closed Access | Times Cited: 6
S. Kranthi, M. Kanchana, Suneetha Manne
Peer-to-Peer Networking and Applications (2022) Vol. 16, Iss. 1, pp. 210-225
Closed Access | Times Cited: 6
Blockchain-Based Decentralized Federated Learning Model
Hongkai Wang, Dong Mao, Zuge Chen, et al.
(2023), pp. 622-625
Closed Access | Times Cited: 3
Hongkai Wang, Dong Mao, Zuge Chen, et al.
(2023), pp. 622-625
Closed Access | Times Cited: 3
Power data attribution revocation searchable encrypted cloud storage
Jiawei Li, Tao Zhang
(2023), pp. 579-582
Closed Access | Times Cited: 2
Jiawei Li, Tao Zhang
(2023), pp. 579-582
Closed Access | Times Cited: 2
ER-ERT:A Method of Ensemble Representation Learning of Encrypted RAT Traffic
Yijing Zhang, Hui Xue, Jianjun Lin, et al.
(2023), pp. 1-10
Closed Access | Times Cited: 2
Yijing Zhang, Hui Xue, Jianjun Lin, et al.
(2023), pp. 1-10
Closed Access | Times Cited: 2
An Atom Quest Optimizer for CNN to Distinguish IDs in SDN and IoT Eco System
V.S Anusuya Devi, Vijilius Helena Raj, Balasubramanian Prabhu Kavin, et al.
(2024), pp. 1430-1437
Closed Access
V.S Anusuya Devi, Vijilius Helena Raj, Balasubramanian Prabhu Kavin, et al.
(2024), pp. 1430-1437
Closed Access
Advancing Network Survivability and Reliability: Integrating XAI-Enhanced Autoencoders and LDA for Effective Detection of Unknown Attacks
Fatemeh Stodt, Fabrice Théoleyre, Christoph Reich
(2024), pp. 9-16
Open Access
Fatemeh Stodt, Fabrice Théoleyre, Christoph Reich
(2024), pp. 9-16
Open Access
The Missing Link in Network Intrusion Detection: Taking AI/ML Research Efforts to Users
Katharina Dietz, Michael Mühlhauser, Jochen Kögel, et al.
IEEE Access (2024) Vol. 12, pp. 79815-79837
Open Access
Katharina Dietz, Michael Mühlhauser, Jochen Kögel, et al.
IEEE Access (2024) Vol. 12, pp. 79815-79837
Open Access
A novel fusion feature imageization with improved extreme learning machine for network anomaly detection
Geying Yang, Jinyu Wu, Lina Wang, et al.
Applied Intelligence (2024) Vol. 54, Iss. 19, pp. 9313-9329
Closed Access
Geying Yang, Jinyu Wu, Lina Wang, et al.
Applied Intelligence (2024) Vol. 54, Iss. 19, pp. 9313-9329
Closed Access
Intrusion Detection Systems Using Quantum-Inspired Density Matrix Encodings
Larry Huynh, Jin B. Hong, Ajmal Mian, et al.
(2024), pp. 32-38
Closed Access
Larry Huynh, Jin B. Hong, Ajmal Mian, et al.
(2024), pp. 32-38
Closed Access
Research on Quantum Encryption Information Security Protection Technology for Distribution Networks
Jin Qian, Jun Luo, Chao Chen, et al.
(2024), pp. 964-968
Closed Access
Jin Qian, Jun Luo, Chao Chen, et al.
(2024), pp. 964-968
Closed Access