OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Deep Analysis of Risks and Recent Trends Towards Network Intrusion Detection System
D. Shankar, G. Victo Sudha George, J. N. S. S. Janardhana Naidu, et al.
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 1
Open Access | Times Cited: 11

Showing 11 citing articles:

Complex Network Articulation Points Detection and Centrality Measures
D. Durga Prasad, J. Vijay Arputharaj, K. Sreenivasa Rao, et al.
(2025), pp. 447-463
Closed Access

Machine learning-inspired intrusion detection system for IoT: Security issues and future challenges
Tariq Ahamed Ahanger, Imdad Ullah, Shabbab Algamdi, et al.
Computers & Electrical Engineering (2025) Vol. 123, pp. 110265-110265
Closed Access

A novel data-driven integrated detection method for network intrusion classification based on multi-feature imbalanced data
Chia‐Hung Wang, Qing Ye, J. Cai, et al.
Journal of Intelligent & Fuzzy Systems (2024) Vol. 46, Iss. 3, pp. 5893-5910
Closed Access | Times Cited: 3

Ransomware Early Detection Techniques
Asma A. Alhashmi, Abdulbasit A. Darem, Ahmed B. Alshammari, et al.
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 3, pp. 14497-14503
Open Access | Times Cited: 3

Zero-Day Threats Detection for Critical Infrastructures
Mike Nkongolo, Mahmut TOKMAK
Communications in computer and information science (2023), pp. 32-47
Closed Access | Times Cited: 7

RFSA: A Ransomware Feature Selection Algorithm for Multivariate Analysis of Malware Behavior in Cryptocurrency
Mike Nkongolo
International Journal of Computing and Digital Systems (2024) Vol. 15, Iss. 1, pp. 901-935
Open Access | Times Cited: 2

Glaucoma Stage Classification Using Image Empirical Mode Decomposition (IEMD) and Deep Learning from Fundus Images
D. Shankar, I. Sri Harsha, P. Shyamala Madhuri, et al.
(2024), pp. 385-402
Closed Access | Times Cited: 1

Ransomware Detection Using Stacked Autoencoder for Feature Selection
Mike Nkongolo, Mahmut TOKMAK
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) (2024) Vol. 12, Iss. 1
Open Access | Times Cited: 1

Federated Deep Learning Models for Intrusion Detection in IoT
El Mahfoud Ennaji, Salah El Hajla, Yassine Maleh, et al.
(2024), pp. 1-5
Closed Access | Times Cited: 1

Multi-Pattern GPU Accelerated Collision-Less Rabin-Karp for NIDS
Anas Abbas, Mahmoud Fayez, Heba Khaled
International Journal of Distributed Systems and Technologies (2024) Vol. 15, Iss. 1, pp. 1-16
Open Access

A Novel Two-Stage Classification Architecture Integrating Machine Learning and Artificial Immune System for Intrusion Detection on Balanced Dataset
K. Fatema, Samrat Kumar Dey, Rashedul Bari, et al.
Smart innovation, systems and technologies (2024), pp. 179-189
Closed Access

Lightweight Hybrid CAE-ELM and Enhanced Smote Based Intrusion Detection for Networks
D. Shankar, G Victo, Sudha George, et al.
International journal of intelligent engineering and systems (2023) Vol. 16, Iss. 6, pp. 1006-1021
Open Access

Page 1

Scroll to top