
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Intrusion Detection Systems, Issues, Challenges, and Needs
Mohammad Aljanabi, Mohd Arfian Ismail, Ahmed Hussein Ali
International Journal of Computational Intelligence Systems (2021) Vol. 14, Iss. 1, pp. 560-560
Open Access | Times Cited: 52
Mohammad Aljanabi, Mohd Arfian Ismail, Ahmed Hussein Ali
International Journal of Computational Intelligence Systems (2021) Vol. 14, Iss. 1, pp. 560-560
Open Access | Times Cited: 52
Showing 1-25 of 52 citing articles:
An Efficient Optimization Approach for Designing Machine Models Based on Combined Algorithm
Ata Larijani, Farbod Dehghani
FinTech (2023) Vol. 3, Iss. 1, pp. 40-54
Open Access | Times Cited: 23
Ata Larijani, Farbod Dehghani
FinTech (2023) Vol. 3, Iss. 1, pp. 40-54
Open Access | Times Cited: 23
A Review of Enhancing Intrusion Detection Systems for Cybersecurity Using Artificial Intelligence (AI)
Michal Markevych, Maurice Dawson
International conference KNOWLEDGE-BASED ORGANIZATION (2023) Vol. 29, Iss. 3, pp. 30-37
Closed Access | Times Cited: 20
Michal Markevych, Maurice Dawson
International conference KNOWLEDGE-BASED ORGANIZATION (2023) Vol. 29, Iss. 3, pp. 30-37
Closed Access | Times Cited: 20
Detecting Cyber Threats With a Graph-Based NIDPS
Brendan Ooi Tze Wen, Najihah Syahriza, Nicholas Chan Wei Xian, et al.
Advances in logistics, operations, and management science book series (2023), pp. 36-74
Closed Access | Times Cited: 16
Brendan Ooi Tze Wen, Najihah Syahriza, Nicholas Chan Wei Xian, et al.
Advances in logistics, operations, and management science book series (2023), pp. 36-74
Closed Access | Times Cited: 16
Intrusion detection in wireless sensor network using enhanced empirical based component analysis
Zhiqiang Liu, Ghulam Mohi-Ud-Din, Jiangbin Zheng, et al.
Future Generation Computer Systems (2022) Vol. 135, pp. 181-193
Closed Access | Times Cited: 26
Zhiqiang Liu, Ghulam Mohi-Ud-Din, Jiangbin Zheng, et al.
Future Generation Computer Systems (2022) Vol. 135, pp. 181-193
Closed Access | Times Cited: 26
A two-stage stacked ensemble intrusion detection system using five base classifiers and MLP with optimal feature selection
Earum Mushtaq, Aneela Zameer, Asifullah Khan
Microprocessors and Microsystems (2022) Vol. 94, pp. 104660-104660
Closed Access | Times Cited: 23
Earum Mushtaq, Aneela Zameer, Asifullah Khan
Microprocessors and Microsystems (2022) Vol. 94, pp. 104660-104660
Closed Access | Times Cited: 23
Safeguarding Connected Health: Leveraging Trustworthy AI Techniques to Harden Intrusion Detection Systems Against Data Poisoning Threats in IoMT Environments
Mohammad Aljanabi
Babylonian Journal of Internet of Things (2023) Vol. 2023, pp. 31-37
Open Access | Times Cited: 13
Mohammad Aljanabi
Babylonian Journal of Internet of Things (2023) Vol. 2023, pp. 31-37
Open Access | Times Cited: 13
Systematic literature review on intrusion detection systems: Research trends, algorithms, methods, datasets, and limitations
M. Issa, Mohammad Aljanabi, Hassan Mohamed Muhi-Aldeen
Journal of Intelligent Systems (2024) Vol. 33, Iss. 1
Open Access | Times Cited: 4
M. Issa, Mohammad Aljanabi, Hassan Mohamed Muhi-Aldeen
Journal of Intelligent Systems (2024) Vol. 33, Iss. 1
Open Access | Times Cited: 4
Optuna and Decision Tree Based Network Intrusion Detection System for Internet of Things
Paritosh Kumar Yadav, Sudhakar Pandey, Parth Pandey, et al.
Communications in computer and information science (2025), pp. 3-19
Closed Access
Paritosh Kumar Yadav, Sudhakar Pandey, Parth Pandey, et al.
Communications in computer and information science (2025), pp. 3-19
Closed Access
Modelling intrusion detection systems using swarm intelligence
Wamashudu Sigogo, Rodney Mushininga
International Journal of Research in Business and Social Science (2147-4478) (2025) Vol. 14, Iss. 1, pp. 222-236
Open Access
Wamashudu Sigogo, Rodney Mushininga
International Journal of Research in Business and Social Science (2147-4478) (2025) Vol. 14, Iss. 1, pp. 222-236
Open Access
Optimal feature selection for machine learning based intrusion detection system by exploiting attribute dependence
Ghanshyam Prasad Dubey, Rakesh Kumar Bhujade
Materials Today Proceedings (2021) Vol. 47, pp. 6325-6331
Closed Access | Times Cited: 21
Ghanshyam Prasad Dubey, Rakesh Kumar Bhujade
Materials Today Proceedings (2021) Vol. 47, pp. 6325-6331
Closed Access | Times Cited: 21
Optimizing Intrusion Detection Systems in Three Phases on the CSE-CIC-IDS-2018 Dataset
Surasit Songma, Theera Sathuphan, Thanakorn Pamutha
Computers (2023) Vol. 12, Iss. 12, pp. 245-245
Open Access | Times Cited: 8
Surasit Songma, Theera Sathuphan, Thanakorn Pamutha
Computers (2023) Vol. 12, Iss. 12, pp. 245-245
Open Access | Times Cited: 8
Framing Network Flow for Anomaly Detection Using Image Recognition and Federated Learning
Jevgenijus Toldinas, Algimantas Venčkauskas, Agnius Liutkevičius, et al.
Electronics (2022) Vol. 11, Iss. 19, pp. 3138-3138
Open Access | Times Cited: 13
Jevgenijus Toldinas, Algimantas Venčkauskas, Agnius Liutkevičius, et al.
Electronics (2022) Vol. 11, Iss. 19, pp. 3138-3138
Open Access | Times Cited: 13
ENHANCED INTRUSION DETECTION MODEL BASED ON PRINCIPAL COMPONENT ANALYSIS AND VARIABLE ENSEMBLE MACHINE LEARNING ALGORITHM
Ayuba John, Ismail Fauzi Isnin, Syed Hamid Hussain Madni, et al.
Intelligent Systems with Applications (2024), pp. 200442-200442
Open Access | Times Cited: 2
Ayuba John, Ismail Fauzi Isnin, Syed Hamid Hussain Madni, et al.
Intelligent Systems with Applications (2024), pp. 200442-200442
Open Access | Times Cited: 2
NLFlowLyzer: Toward generating an intrusion detection dataset and intruders behavior profiling through network layer traffic analysis and pattern extraction
MohammadMoein Shafi, Arash Habibi Lashkari, Arousha Haghighian Roudsari
Computers & Security (2024), pp. 104160-104160
Closed Access | Times Cited: 2
MohammadMoein Shafi, Arash Habibi Lashkari, Arousha Haghighian Roudsari
Computers & Security (2024), pp. 104160-104160
Closed Access | Times Cited: 2
Strengthening intrusion detection system for adversarial attacks: improved handling of imbalance classification problem
Chutipon Pimsarn, Tossapon Boongoen, Natthakan Iam-On, et al.
Complex & Intelligent Systems (2022) Vol. 8, Iss. 6, pp. 4863-4880
Open Access | Times Cited: 11
Chutipon Pimsarn, Tossapon Boongoen, Natthakan Iam-On, et al.
Complex & Intelligent Systems (2022) Vol. 8, Iss. 6, pp. 4863-4880
Open Access | Times Cited: 11
Anomaly Detection in Intrusion Detection Systems
Siamak Parhizkari
Artificial intelligence (2023)
Open Access | Times Cited: 5
Siamak Parhizkari
Artificial intelligence (2023)
Open Access | Times Cited: 5
BiLSTM-CNN Hybrid Intrusion Detection System for IoT Application
Sapna Sadhwani, Mohammed Abdul Hafeez Khan, Raja Muthalagu, et al.
Research Square (Research Square) (2024)
Open Access | Times Cited: 1
Sapna Sadhwani, Mohammed Abdul Hafeez Khan, Raja Muthalagu, et al.
Research Square (Research Square) (2024)
Open Access | Times Cited: 1
A New Industrial Intrusion Detection Method Based on CNN-BiLSTM
Jun Wang, Changfu Si, Zhen Wang, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 3, pp. 4297-4318
Open Access | Times Cited: 1
Jun Wang, Changfu Si, Zhen Wang, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 3, pp. 4297-4318
Open Access | Times Cited: 1
An enhanced strategy for minority class detection using bidirectional GRU employing penalized cross-entropy and self-attention mechanisms for imbalance network traffic
Asima Akber Abbasi, Aneela Zameer, Muhammad Asif Zahoor Raja
The European Physical Journal Plus (2024) Vol. 139, Iss. 6
Closed Access | Times Cited: 1
Asima Akber Abbasi, Aneela Zameer, Muhammad Asif Zahoor Raja
The European Physical Journal Plus (2024) Vol. 139, Iss. 6
Closed Access | Times Cited: 1
Investigating the Impact of Feature Reduction Through Information Gain and Correlation on the Performance of Error Back Propagation Based IDS
Ghanshyam Prasad Dubey
International Journal of Electrical and Electronics Research (2021) Vol. 9, Iss. 3, pp. 27-34
Open Access | Times Cited: 11
Ghanshyam Prasad Dubey
International Journal of Electrical and Electronics Research (2021) Vol. 9, Iss. 3, pp. 27-34
Open Access | Times Cited: 11
A Detailed Analysis on Intrusion Detection Systems, Datasets, and Challenges
Chetan Gupta, Amit Kumar, Neelesh Kumar Jain
Lecture notes in electrical engineering (2023), pp. 259-267
Closed Access | Times Cited: 3
Chetan Gupta, Amit Kumar, Neelesh Kumar Jain
Lecture notes in electrical engineering (2023), pp. 259-267
Closed Access | Times Cited: 3
Intrusion Detection System Based on Feature Reduced Back Propagation Neural Network Using Ant Colony Optimization
Ghanshyam Prasad Dubey, Rakesh Kumar Bhujade
Lecture notes in networks and systems (2022), pp. 169-179
Closed Access | Times Cited: 4
Ghanshyam Prasad Dubey, Rakesh Kumar Bhujade
Lecture notes in networks and systems (2022), pp. 169-179
Closed Access | Times Cited: 4
A Comparative Study of AI Algorithms for Anomaly-based Intrusion Detection
Vishnu Priya Gandi, Nikhil Sai Lalith Jatla, Gayathri Sadhineni, et al.
2022 6th International Conference on Computing Methodologies and Communication (ICCMC) (2023), pp. 530-534
Closed Access | Times Cited: 2
Vishnu Priya Gandi, Nikhil Sai Lalith Jatla, Gayathri Sadhineni, et al.
2022 6th International Conference on Computing Methodologies and Communication (ICCMC) (2023), pp. 530-534
Closed Access | Times Cited: 2
Anomaly Detection - Recent Advances, AI and ML Perspectives and Applications [Working Title]
Artificial intelligence (2023)
Open Access | Times Cited: 2
Artificial intelligence (2023)
Open Access | Times Cited: 2
Developing an Integrated Framework for Securing Internet of Things traffics in Smart Cities Using Machine Learning Techniques
Moody Alhanaya, H. Khalil
(2023)
Open Access | Times Cited: 2
Moody Alhanaya, H. Khalil
(2023)
Open Access | Times Cited: 2