
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Network intrusion detection system: A survey on artificial intelligence‐based techniques
Mohammed Sayeeduddin Habeeb, Tummala Ranga Babu
Expert Systems (2022) Vol. 39, Iss. 9
Closed Access | Times Cited: 22
Mohammed Sayeeduddin Habeeb, Tummala Ranga Babu
Expert Systems (2022) Vol. 39, Iss. 9
Closed Access | Times Cited: 22
Showing 22 citing articles:
Coarse and fine feature selection for Network Intrusion Detection Systems (IDS ) in IoT networks
Mohammed Sayeeduddin Habeeb, Tummala Ranga Babu
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 4
Closed Access | Times Cited: 5
Mohammed Sayeeduddin Habeeb, Tummala Ranga Babu
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 4
Closed Access | Times Cited: 5
Improved network anomaly detection system using optimized autoencoder − LSTM
S. Narmadha, Balaji Narayanan
Expert Systems with Applications (2025), pp. 126854-126854
Closed Access
S. Narmadha, Balaji Narayanan
Expert Systems with Applications (2025), pp. 126854-126854
Closed Access
Two‐Stage Botnet Detection Method Based on Feature Selection for Industrial Internet of Things
Shu Jian, J.-H Lu
IET Information Security (2025) Vol. 2025, Iss. 1
Open Access
Shu Jian, J.-H Lu
IET Information Security (2025) Vol. 2025, Iss. 1
Open Access
A Comparative Study of Using Deep Learning Algorithms in Network Intrusion Detection
S. N. Elsayed, Khalil Mohamed, Mohamed Ashraf Madkour
IEEE Access (2024) Vol. 12, pp. 58851-58870
Open Access | Times Cited: 2
S. N. Elsayed, Khalil Mohamed, Mohamed Ashraf Madkour
IEEE Access (2024) Vol. 12, pp. 58851-58870
Open Access | Times Cited: 2
Zeeshan Ahmad, Adnan Shahid Khan, Kartinah Zen, et al.
Transactions on Emerging Telecommunications Technologies (2023) Vol. 34, Iss. 8
Open Access | Times Cited: 6
AERO: Automotive Ethernet Real-Time Observer for Anomaly Detection in In-Vehicle Networks
Seong Hoon Jeong, Huy Kang Kim, Mee Lan Han, et al.
IEEE Transactions on Industrial Informatics (2023) Vol. 20, Iss. 3, pp. 4651-4662
Closed Access | Times Cited: 6
Seong Hoon Jeong, Huy Kang Kim, Mee Lan Han, et al.
IEEE Transactions on Industrial Informatics (2023) Vol. 20, Iss. 3, pp. 4651-4662
Closed Access | Times Cited: 6
The internet of modular robotic things: Issues, limitations, challenges, & solutions
Jean-Paul A. Yaacoub, Hassan Noura, Benoît Piranda
Internet of Things (2023) Vol. 23, pp. 100886-100886
Open Access | Times Cited: 5
Jean-Paul A. Yaacoub, Hassan Noura, Benoît Piranda
Internet of Things (2023) Vol. 23, pp. 100886-100886
Open Access | Times Cited: 5
AOC-IDS: Autonomous Online Framework with Contrastive Learning for Intrusion Detection
Xinchen Zhang, Running Zhao, Zhihan Jiang, et al.
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications (2024), pp. 581-590
Open Access | Times Cited: 1
Xinchen Zhang, Running Zhao, Zhihan Jiang, et al.
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications (2024), pp. 581-590
Open Access | Times Cited: 1
Predictive Analytics and Cybersecurity
Mohammed Sayeeduddin Habeeb
(2024), pp. 151-169
Closed Access | Times Cited: 1
Mohammed Sayeeduddin Habeeb
(2024), pp. 151-169
Closed Access | Times Cited: 1
PPFCM-SMOTE: a novel balancing system for anomaly detection in IoT edge using probabilistic possibilistic fuzzy clustering and SMOTE
J. Manokaran, G. Vairavel, J. Vijaya
International Journal of Information Technology (2024)
Closed Access | Times Cited: 1
J. Manokaran, G. Vairavel, J. Vijaya
International Journal of Information Technology (2024)
Closed Access | Times Cited: 1
Autoencoder Feature Residuals for Network Intrusion Detection: Unsupervised Pre-training for Improved Performance
Brian Lewandowski, Randy Paffenroth
(2022), pp. 1334-1341
Closed Access | Times Cited: 6
Brian Lewandowski, Randy Paffenroth
(2022), pp. 1334-1341
Closed Access | Times Cited: 6
Detecting Intrusion in WiFi Network Using Graph Neural Networks
Quang-Vinh Dang, Tan-Loc Nguyen
Lecture notes in electrical engineering (2023), pp. 637-645
Closed Access | Times Cited: 2
Quang-Vinh Dang, Tan-Loc Nguyen
Lecture notes in electrical engineering (2023), pp. 637-645
Closed Access | Times Cited: 2
Advancing Cybersecurity with AI: A Multimodal Fusion Approach for Intrusion Detection Systems
George Agrafiotis, Sarantis Kalafatidis, Konstantinos Giapantzis, et al.
(2024), pp. 51-56
Closed Access
George Agrafiotis, Sarantis Kalafatidis, Konstantinos Giapantzis, et al.
(2024), pp. 51-56
Closed Access
Trustable Network Intrusion Detection System through Wisdomnet and Uncertainty Measures
Abhinav Vij, Hai Anh Tran, Truong X. Tran
(2024), pp. 1-8
Closed Access
Abhinav Vij, Hai Anh Tran, Truong X. Tran
(2024), pp. 1-8
Closed Access
Quality of Service of Signature Based Intrusion Detection System
Durdana Pervez, Zakira Inayat, Awais Ahmad
(2024)
Closed Access
Durdana Pervez, Zakira Inayat, Awais Ahmad
(2024)
Closed Access
MS-CFFS: Multistage Coarse and Fine Feature Selecton for Advanced Anomaly Detection in IoT Security Networks
Mohammed Sayeeduddin Habeeb, Tummala Ranga Babu
International Journal of Electrical and Electronics Research (2024) Vol. 12, Iss. 3, pp. 780-790
Open Access
Mohammed Sayeeduddin Habeeb, Tummala Ranga Babu
International Journal of Electrical and Electronics Research (2024) Vol. 12, Iss. 3, pp. 780-790
Open Access
Security of the IoT Ecosystem: Current and Future Directions
Tuhin Shukla, Nishchol Mishra
Lecture notes in electrical engineering (2024), pp. 211-226
Closed Access
Tuhin Shukla, Nishchol Mishra
Lecture notes in electrical engineering (2024), pp. 211-226
Closed Access
Counter Denial of Service for Next-Generation Networks within the Artificial Intelligence and Post-Quantum Era
Saleh Darzi, Attila A. Yavuz
(2024), pp. 138-147
Closed Access
Saleh Darzi, Attila A. Yavuz
(2024), pp. 138-147
Closed Access
Autoencoder Feature Residuals for Network Intrusion Detection: One-Class Pretraining for Improved Performance
Brian Lewandowski, Randy Paffenroth
Machine Learning and Knowledge Extraction (2023) Vol. 5, Iss. 3, pp. 868-890
Open Access | Times Cited: 1
Brian Lewandowski, Randy Paffenroth
Machine Learning and Knowledge Extraction (2023) Vol. 5, Iss. 3, pp. 868-890
Open Access | Times Cited: 1
Improving the Detection of Unknown DDoS Attacks through Continual Learning
Beny Nugraha, Krishna Yadav, Parag Patil, et al.
(2023), pp. 477-483
Closed Access | Times Cited: 1
Beny Nugraha, Krishna Yadav, Parag Patil, et al.
(2023), pp. 477-483
Closed Access | Times Cited: 1
Intrusion Detection Using Enhanced Transductive Support Vector Machine
V. Priyalakshmi, R. Devi
(2022), pp. 1571-1579
Closed Access | Times Cited: 1
V. Priyalakshmi, R. Devi
(2022), pp. 1571-1579
Closed Access | Times Cited: 1
Network Intrusion Detection Using CNN-based Classification Method
Tzu-En Peng, I‐Hsien Liu, Jung-Shian Li, et al.
(2023), pp. 361-364
Closed Access
Tzu-En Peng, I‐Hsien Liu, Jung-Shian Li, et al.
(2023), pp. 361-364
Closed Access