OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Evaluation of Classification Algorithms for Intrusion Detection System: A Review
Azar Abid Salih, Adnan Mohsin Abdulazeez
Journal of Soft Computing and Data Mining (2021) Vol. 2, Iss. 1
Open Access | Times Cited: 70

Showing 1-25 of 70 citing articles:

A Survey of Data Mining Implementation in Smart City Applications
Zainab Salih Ageed, Subhi R. M. Zeebaree, Mohammed Mohammed Sadeeq, et al.
Qubahan Academic Journal (2021) Vol. 1, Iss. 2, pp. 91-99
Open Access | Times Cited: 60

5G Security Challenges and Solutions: A Review by OSI Layers
Stephanie M. Sullivan, Alessandro Brighente, Sathish Kumar, et al.
IEEE Access (2021) Vol. 9, pp. 116294-116314
Open Access | Times Cited: 58

Explainable AI-Based DDOS Attack Identification Method for IoT Networks
Chathuranga Sampath Kalutharage, Xiaodong Liu, Christos Chrysoulas, et al.
Computers (2023) Vol. 12, Iss. 2, pp. 32-32
Open Access | Times Cited: 37

Student Cheating Detection in Higher Education by Implementing Machine Learning and LSTM Techniques
Waleed Alsabhan
Sensors (2023) Vol. 23, Iss. 8, pp. 4149-4149
Open Access | Times Cited: 23

Precision cancer classification using liquid biopsy and advanced machine learning techniques
Amr Eledkawy, Taher Hamza, Sara El-Metwally
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 8

An optimized LSTM-based deep learning model for anomaly network intrusion detection
Nitu Dash, Sujata Chakravarty, Amiya Kumar Rath, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access | Times Cited: 1

An edge based hybrid intrusion detection framework for mobile edge computing
Ashish Singh, Kakali Chatterjee, Suresh Chandra Satapathy
Complex & Intelligent Systems (2021) Vol. 8, Iss. 5, pp. 3719-3746
Open Access | Times Cited: 47

Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security
Heba Kadry, Ahmed Farouk, E. A. Zanaty, et al.
Alexandria Engineering Journal (2023) Vol. 71, pp. 491-500
Open Access | Times Cited: 21

Comparison of Kernel Support Vector Machine Multi-Class in PPKM Sentiment Analysis on Twitter
Andi Nurkholis, Debby Alita, Aris Munandar
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) (2022) Vol. 6, Iss. 2, pp. 227-233
Open Access | Times Cited: 23

Educational Innovation Faced with COVID-19: Deep Learning for Online Exam Cheating Detection
Intan Nurma Yulita, Fauzan Akmal Hariz, Ino Suryana, et al.
Education Sciences (2023) Vol. 13, Iss. 2, pp. 194-194
Open Access | Times Cited: 14

MAGRU-IDS: A Multi-Head Attention-Based Gated Recurrent Unit for Intrusion Detection in IIoT Networks
Safi Ullah, Wadii Boulila, Anis Koubâa, et al.
IEEE Access (2023) Vol. 11, pp. 114590-114601
Open Access | Times Cited: 14

Network Intrusion Monitoring Based on Margin Distance Pruning and RF Algorithm
X. Gou, Md Gapar Md Johar, Jacquline Tham
Results in Engineering (2025), pp. 104769-104769
Open Access

Classification of Normal and Malicious Traffic Based on an Ensemble of Machine Learning for a Vehicle CAN-Network
Easa Alalwany, Imad Mahgoub
Sensors (2022) Vol. 22, Iss. 23, pp. 9195-9195
Open Access | Times Cited: 20

A forest fire smoke detection model combining convolutional neural network and vision transformer
Ying Zheng, Gui Zhang, Sanqing Tan, et al.
Frontiers in Forests and Global Change (2023) Vol. 6
Open Access | Times Cited: 12

Perbandingan Support Vector Machine, Random Forest Classifier, dan K-Nearest Neighbour dalam Pendeteksian Anomali pada Jaringan DDos
Haeruddin Haeruddin, Erick Erick, Heru Wijayanto Aripradono
JTIM Jurnal Teknologi Informasi dan Multimedia (2025) Vol. 7, Iss. 1, pp. 23-33
Open Access

Hyperparameter search based convolution neural network with Bi-LSTM model for intrusion detection system in multimedia big data environment
Irina V. Pustokhina, Denis A. Pustokhin, E. Laxmi Lydia, et al.
Multimedia Tools and Applications (2021) Vol. 81, Iss. 24, pp. 34951-34968
Closed Access | Times Cited: 24

Collaborative Detection of Black Hole and Gray Hole Attacks for Secure Data Communication in VANETs
Shamim Younas, Faisal Rehman, Tahir Maqsood, et al.
Applied Sciences (2022) Vol. 12, Iss. 23, pp. 12448-12448
Open Access | Times Cited: 18

The Effect of Class Imbalance Handling on Datasets Toward Classification Algorithm Performance
Cherfly Kaope, Yoga Pristyanto
Matrik Jurnal Manajemen Teknik Informatika dan Rekayasa Komputer (2023) Vol. 22, Iss. 2, pp. 227-238
Open Access | Times Cited: 9

Leveraging of Gradient Boosting Algorithm in Misuse Intrusion Detection using KDD Cup 99 Dataset
Sulaiman Muhammed Sulaiman, Adnan Mohsin Abdulazeez
Indonesian Journal of Computer Science (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 3

Comparative Analysis of Machine Learning and Deep Learning Models for Bitcoin Price Prediction
Omar Ahmed Al-Zakhali, Adnan Mohsin Abdulazeez
Indonesian Journal of Computer Science (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 2

A Comparative Analysis of Intrusion Detection Systems: Leveraging Algorithm Classifications and Feature Selection Techniques
Vaman Shakir, Adnan Mohsin
Journal of Applied Science and Technology Trends (2024) Vol. 5, Iss. 01, pp. 34-45
Open Access | Times Cited: 2

Developing a Hybrid Detection Approach to Mitigating Black Hole and Gray Hole Attacks in Mobile Ad Hoc Networks
Mohammad Yazdanypoor, Stefano Cirillo, Giandomenico Solimando
Applied Sciences (2024) Vol. 14, Iss. 17, pp. 7982-7982
Open Access | Times Cited: 2

Page 1 - Next Page

Scroll to top