
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Cloud-based multiclass anomaly detection and categorization using ensemble learning
Faisal Shahzad, Abdul Mannan, Abdul Rehman Javed, et al.
Journal of Cloud Computing Advances Systems and Applications (2022) Vol. 11, Iss. 1
Open Access | Times Cited: 38
Faisal Shahzad, Abdul Mannan, Abdul Rehman Javed, et al.
Journal of Cloud Computing Advances Systems and Applications (2022) Vol. 11, Iss. 1
Open Access | Times Cited: 38
Showing 1-25 of 38 citing articles:
A Survey of Explainable Artificial Intelligence for Smart Cities
Abdul Rehman Javed, Waqas Ahmed, Sharnil Pandya, et al.
Electronics (2023) Vol. 12, Iss. 4, pp. 1020-1020
Open Access | Times Cited: 109
Abdul Rehman Javed, Waqas Ahmed, Sharnil Pandya, et al.
Electronics (2023) Vol. 12, Iss. 4, pp. 1020-1020
Open Access | Times Cited: 109
Deep learning-based network anomaly detection and classification in an imbalanced cloud environment
Amol D. Vibhute, Vikram Nakum
Procedia Computer Science (2024) Vol. 232, pp. 1636-1645
Open Access | Times Cited: 8
Amol D. Vibhute, Vikram Nakum
Procedia Computer Science (2024) Vol. 232, pp. 1636-1645
Open Access | Times Cited: 8
Security computing resource allocation based on deep reinforcement learning in serverless multi-cloud edge computing
Hang Zhang, Jinsong Wang, Hongwei Zhang, et al.
Future Generation Computer Systems (2023) Vol. 151, pp. 152-161
Closed Access | Times Cited: 19
Hang Zhang, Jinsong Wang, Hongwei Zhang, et al.
Future Generation Computer Systems (2023) Vol. 151, pp. 152-161
Closed Access | Times Cited: 19
A data-driven network intrusion detection system using feature selection and deep learning
Lianming Zhang, Kui Liu, Xiaowei Xie, et al.
Journal of Information Security and Applications (2023) Vol. 78, pp. 103606-103606
Closed Access | Times Cited: 18
Lianming Zhang, Kui Liu, Xiaowei Xie, et al.
Journal of Information Security and Applications (2023) Vol. 78, pp. 103606-103606
Closed Access | Times Cited: 18
Adaptive and Convex Optimization-Inspired Workflow Scheduling for Cloud Environment
Kamlesh Lakhwani, Gajanand Sharma, Ramandeep Sandhu, et al.
International Journal of Cloud Applications and Computing (2023) Vol. 13, Iss. 1, pp. 1-25
Open Access | Times Cited: 17
Kamlesh Lakhwani, Gajanand Sharma, Ramandeep Sandhu, et al.
International Journal of Cloud Applications and Computing (2023) Vol. 13, Iss. 1, pp. 1-25
Open Access | Times Cited: 17
An LSTM ‐based novel near‐real‐time multiclass network intrusion detection system for complex cloud environments
Amol D. Vibhute, Minhaj Khan, Anuradha Kanade, et al.
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 11
Closed Access | Times Cited: 5
Amol D. Vibhute, Minhaj Khan, Anuradha Kanade, et al.
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 11
Closed Access | Times Cited: 5
Consumer Behaviour in Growth Hacking: Developing and Validating the Shareability Construct
Karolina Sallaku, Anthi Avloniti, Σόλων Μαγρίζος, et al.
Journal of Business Research (2025) Vol. 189, pp. 115181-115181
Closed Access
Karolina Sallaku, Anthi Avloniti, Σόλων Μαγρίζος, et al.
Journal of Business Research (2025) Vol. 189, pp. 115181-115181
Closed Access
Advanced Malware Collector: A Semi-Automated Framework for Hunting Advanced Persistent Threat Malware and Tools
Amit Sharma, Brij B. Gupta, Awadhesh Kumar Singh, et al.
Advances in intelligent systems and computing (2025), pp. 267-282
Closed Access
Amit Sharma, Brij B. Gupta, Awadhesh Kumar Singh, et al.
Advances in intelligent systems and computing (2025), pp. 267-282
Closed Access
Radial Basis Neural Network Based Distributed Denial of Services (DDoS) Attack Detection
Akshat Gaurav, Avadhesh Kumar Gupta, Raju Shanmugam, et al.
Advances in intelligent systems and computing (2025), pp. 236-246
Closed Access
Akshat Gaurav, Avadhesh Kumar Gupta, Raju Shanmugam, et al.
Advances in intelligent systems and computing (2025), pp. 236-246
Closed Access
Comparative Analysis of Data Sets for Developing and Evaluating Defensive Mechanisms Against Distributed Denial of Service Attack
Anupama Mishra, Neena Gupta
Advances in intelligent systems and computing (2025), pp. 63-69
Closed Access
Anupama Mishra, Neena Gupta
Advances in intelligent systems and computing (2025), pp. 63-69
Closed Access
Traffic Flow Prediction with Heterogenous Data Using a Hybrid LSTM_BILSTM Model
Jing‐Doo Wang, Chayadi Oktomy Noto Susanto
Advances in intelligent systems and computing (2025), pp. 1-15
Closed Access
Jing‐Doo Wang, Chayadi Oktomy Noto Susanto
Advances in intelligent systems and computing (2025), pp. 1-15
Closed Access
Security Benefits in Small Medium Business Enterprise Through Cloud Adoption
Mosiur Rahaman, Bibisumaya Chappu, Santanu Jana, et al.
Advances in intelligent systems and computing (2025), pp. 168-180
Closed Access
Mosiur Rahaman, Bibisumaya Chappu, Santanu Jana, et al.
Advances in intelligent systems and computing (2025), pp. 168-180
Closed Access
Feasibility Study of Type 2 Diabetes Mellitus Prediction Using Machine Learning Algorithms with Electrocadiogram Signals
Kwok Tai Chui, Brij B. Gupta, Pandian Vasant, et al.
Advances in intelligent systems and computing (2025), pp. 85-92
Closed Access
Kwok Tai Chui, Brij B. Gupta, Pandian Vasant, et al.
Advances in intelligent systems and computing (2025), pp. 85-92
Closed Access
Accelerated Artificial Bee Colony Optimization for Cost‐Sensitive Neural Networks in Multi‐Class Problems
Hilal Hacılar, Bilge Kagan Dedetürk, Mihrimah Özmen, et al.
Expert Systems (2025) Vol. 42, Iss. 5
Open Access
Hilal Hacılar, Bilge Kagan Dedetürk, Mihrimah Özmen, et al.
Expert Systems (2025) Vol. 42, Iss. 5
Open Access
Multiple Intrusion Detection in Complex Cloud Environments Using Random Forest and Deep Learning on the UNSW-NB15 Benchmark Datasets
Abhinav Upadhyay, Nidhi Thakur, Abhishek Pandey, et al.
Lecture notes in networks and systems (2025), pp. 71-85
Closed Access
Abhinav Upadhyay, Nidhi Thakur, Abhishek Pandey, et al.
Lecture notes in networks and systems (2025), pp. 71-85
Closed Access
AI-empowered malware detection system for industrial internet of things
Santosh K. Smmarwar, Govind P. Gupta, Sanjay Kumar
Computers & Electrical Engineering (2023) Vol. 108, pp. 108731-108731
Closed Access | Times Cited: 9
Santosh K. Smmarwar, Govind P. Gupta, Sanjay Kumar
Computers & Electrical Engineering (2023) Vol. 108, pp. 108731-108731
Closed Access | Times Cited: 9
Machine Learning-Based Distributed Denial of Services (DDoS) Attack Detection in Intelligent Information Systems
Wadee Alhalabi, Akshat Gaurav, Varsha Arya, et al.
International Journal on Semantic Web and Information Systems (2023) Vol. 19, Iss. 1, pp. 1-17
Open Access | Times Cited: 9
Wadee Alhalabi, Akshat Gaurav, Varsha Arya, et al.
International Journal on Semantic Web and Information Systems (2023) Vol. 19, Iss. 1, pp. 1-17
Open Access | Times Cited: 9
Optimizing Multi-Tier Cellular Networks With Deep Learning for 6G Consumer Electronics Communications
Sher Ali, Muhammad Abul Hassan, Fabrizio Granelli, et al.
IEEE Transactions on Consumer Electronics (2024) Vol. 70, Iss. 1, pp. 627-634
Closed Access | Times Cited: 2
Sher Ali, Muhammad Abul Hassan, Fabrizio Granelli, et al.
IEEE Transactions on Consumer Electronics (2024) Vol. 70, Iss. 1, pp. 627-634
Closed Access | Times Cited: 2
A heuristic method for discovering multi-class classification rules from multi-source data in cloud–edge system
Jing Shang, Zhiwen Xiao, Tao Tao, et al.
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 2, pp. 101962-101962
Open Access | Times Cited: 2
Jing Shang, Zhiwen Xiao, Tao Tao, et al.
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 2, pp. 101962-101962
Open Access | Times Cited: 2
Ensemble random forest and deep convolutional neural networks in detecting and classifying the multiple intrusions from near real‐time cloud datasets
Minhaj Khan, Mohd Haroon
Security and Privacy (2024) Vol. 7, Iss. 5
Closed Access | Times Cited: 2
Minhaj Khan, Mohd Haroon
Security and Privacy (2024) Vol. 7, Iss. 5
Closed Access | Times Cited: 2
Machine Learning in Cybersecurity: Advanced Detection and Classification Techniques for Network Traffic Environments
Samer El Hajj Hassan, Nghia Duong‐Trung
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems (2024) Vol. 11, Iss. 3
Open Access | Times Cited: 2
Samer El Hajj Hassan, Nghia Duong‐Trung
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems (2024) Vol. 11, Iss. 3
Open Access | Times Cited: 2
Ensemble-Learning-Based Decision Support System for Energy-Theft Detection in Smart-Grid Environment
Farah Mohammad, Kashif Saleem, Jalal Al‐Muhtadi
Energies (2023) Vol. 16, Iss. 4, pp. 1907-1907
Open Access | Times Cited: 5
Farah Mohammad, Kashif Saleem, Jalal Al‐Muhtadi
Energies (2023) Vol. 16, Iss. 4, pp. 1907-1907
Open Access | Times Cited: 5
Long Short-Term Memory Network (LSTM) based Stock Price Prediction
Akshat Gaurav, Varsha Arya, Kwok Tai Chui, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 4
Akshat Gaurav, Varsha Arya, Kwok Tai Chui, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 4
Security Monitoring and Management for the Network Services in the Orchestration of SDN-NFV Environment Using Machine Learning Techniques
Nasser Alshammari, Shumaila Shahzadi, Saad Alanazi, et al.
Computer Systems Science and Engineering (2024) Vol. 48, Iss. 2, pp. 363-394
Open Access | Times Cited: 1
Nasser Alshammari, Shumaila Shahzadi, Saad Alanazi, et al.
Computer Systems Science and Engineering (2024) Vol. 48, Iss. 2, pp. 363-394
Open Access | Times Cited: 1
Enhancing Email Security in Consumer Electronics with a Hybrid Deep Learning Approach
Akshat Gaurav, Brij B. Gupta, Kwok Tai Chui, et al.
2023 IEEE International Conference on Consumer Electronics (ICCE) (2024), pp. 1-5
Closed Access | Times Cited: 1
Akshat Gaurav, Brij B. Gupta, Kwok Tai Chui, et al.
2023 IEEE International Conference on Consumer Electronics (ICCE) (2024), pp. 1-5
Closed Access | Times Cited: 1