OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Unknown, Atypical and Polymorphic Network Intrusion Detection: A Systematic Survey
Ulya Sabeel, Shahram Shah Heydari, Khalil El‐Khatib, et al.
IEEE Transactions on Network and Service Management (2023) Vol. 21, Iss. 1, pp. 1190-1212
Closed Access | Times Cited: 7

Showing 7 citing articles:

Anomaly and intrusion detection using deep learning for software-defined networks: A survey
Vitor Gabriel da Silva Ruffo, Daniel Matheus Brandão Lent, Mateus Komarchesqui, et al.
Expert Systems with Applications (2024) Vol. 256, pp. 124982-124982
Closed Access | Times Cited: 5

The types of hackers and cyberattacks in the aviation industry
Lázaro Florido-Benítez
Journal of Transportation Security (2024) Vol. 17, Iss. 1
Open Access | Times Cited: 4

HIDIM: A novel framework of network intrusion detection for hierarchical dependency and class imbalance
Weidong Zhou, Chunhe Xia, Tianbo Wang, et al.
Computers & Security (2024), pp. 104155-104155
Closed Access | Times Cited: 3

An Effective Method for Detecting Unknown Types of Attacks Based on Log-Cosh Variational Autoencoder
Yu Li, Liuquan Xu, Xuefeng Jiang
Applied Sciences (2023) Vol. 13, Iss. 22, pp. 12492-12492
Open Access | Times Cited: 4

ASRL: Adaptive Swarm Reinforcement Learning For Enhanced OSN Intrusion Detection
Edward Kwadwo Boahen, Rexford Nii Ayitey Sosu, Selasi Kwame Ocansey, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 10258-10272
Closed Access | Times Cited: 1

Beyond botnets: Autonomous Firmware Zombie Attack in industrial control systems
Seyed Mohammad Alavi, Hamed Pourvali Moghadam, Amir Hossein Jahangir
International Journal of Critical Infrastructure Protection (2024), pp. 100729-100729
Closed Access

Incremental Adversarial Learning for Polymorphic Attack Detection
Ulya Sabeel, Shahram Shah Heydari, Khalil El‐Khatib, et al.
IEEE Transactions on Machine Learning in Communications and Networking (2024) Vol. 2, pp. 869-887
Open Access

Page 1

Scroll to top