OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Discriminative spatial-temporal feature learning for modeling network intrusion detection systems
Stephen Kahara Wanjau, Geoffrey Mariga Wambugu, Aaron Mogeni Oirere, et al.
Journal of Computer Security (2023) Vol. 32, Iss. 1, pp. 1-30
Closed Access | Times Cited: 7

Showing 7 citing articles:

Deep Learning Models in Network Intrusion Detection Systems
Jian Li
Applied Mathematics and Nonlinear Sciences (2025) Vol. 10, Iss. 1
Open Access

CAEAID: An incremental contrast learning-based intrusion detection framework for IoT networks
Zinuo Yin, Hongchang Chen, Hailong Ma, et al.
Computer Networks (2025), pp. 111161-111161
Closed Access

A Secure Data-Driven Algorithm Against Malicious Intrusion Signals in Mobile Communication Networks
Yenchia Yu, Mohamed Baza, Amar Rasheed
Mobile Networks and Applications (2025)
Closed Access

Enhancing the Efficiency of a Cybersecurity Operations Center Using Biomimetic Algorithms Empowered by Deep Q-Learning
Rodrigo Olivares, Omar Salinas, Camilo Ravelo, et al.
Biomimetics (2024) Vol. 9, Iss. 6, pp. 307-307
Open Access | Times Cited: 1

Application of IoT technology in cyber security prevention system
Jiahan Dong, Chao Wang, Guangxin Guo, et al.
Applied Mathematics and Nonlinear Sciences (2024) Vol. 9, Iss. 1
Open Access

A Secure data-driven algorithm against malicious intrusion signals in mobile communication networks
Yenchia Yu, Mohamed Baza, Amar Rasheed
Research Square (Research Square) (2024)
Open Access

irpSSHa: Identifying and Reporting SSH Brute Force Attackers Ritesh Mukherjee
Ritesh Mukherjee
SSRN Electronic Journal (2024)
Closed Access

Page 1

Scroll to top