
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Cyberattack and Fraud Detection Using Ensemble Stacking
Raha Soleymanzadeh, Mustafa Aljasim, Muhammad Waseem Qadeer, et al.
AI (2022) Vol. 3, Iss. 1, pp. 22-36
Open Access | Times Cited: 35
Raha Soleymanzadeh, Mustafa Aljasim, Muhammad Waseem Qadeer, et al.
AI (2022) Vol. 3, Iss. 1, pp. 22-36
Open Access | Times Cited: 35
Showing 1-25 of 35 citing articles:
IoT Intrusion Detection Using Machine Learning with a Novel High Performing Feature Selection Method
Khalid Albulayhi, Qasem Abu Al‐Haija, Suliman A. Alsuhibany, et al.
Applied Sciences (2022) Vol. 12, Iss. 10, pp. 5015-5015
Open Access | Times Cited: 118
Khalid Albulayhi, Qasem Abu Al‐Haija, Suliman A. Alsuhibany, et al.
Applied Sciences (2022) Vol. 12, Iss. 10, pp. 5015-5015
Open Access | Times Cited: 118
A stacking ensemble of deep learning models for IoT intrusion detection
Riccardo Lazzarini, Huaglory Tianfield, Vassilis Charissis
Knowledge-Based Systems (2023) Vol. 279, pp. 110941-110941
Open Access | Times Cited: 76
Riccardo Lazzarini, Huaglory Tianfield, Vassilis Charissis
Knowledge-Based Systems (2023) Vol. 279, pp. 110941-110941
Open Access | Times Cited: 76
Securing transactions: a hybrid dependable ensemble machine learning model using IHT-LR and grid search
Md. Alamin Talukder, Rakib Hossen, Md Ashraf Uddin, et al.
Cybersecurity (2024) Vol. 7, Iss. 1
Open Access | Times Cited: 9
Md. Alamin Talukder, Rakib Hossen, Md Ashraf Uddin, et al.
Cybersecurity (2024) Vol. 7, Iss. 1
Open Access | Times Cited: 9
Cyber Defense in the Age of Artificial Intelligence and Machine Learning for Financial Fraud Detection Application
B. Narsimha, Ch. V. Raghavendran, Pannangi Rajyalakshmi, et al.
International Journal of Electrical and Electronics Research (2022) Vol. 10, Iss. 2, pp. 87-92
Open Access | Times Cited: 35
B. Narsimha, Ch. V. Raghavendran, Pannangi Rajyalakshmi, et al.
International Journal of Electrical and Electronics Research (2022) Vol. 10, Iss. 2, pp. 87-92
Open Access | Times Cited: 35
RepuTE: A soft voting ensemble learning framework for reputation-based attack detection in fog-IoT milieu
Richa Verma, Shalini Chandra
Engineering Applications of Artificial Intelligence (2022) Vol. 118, pp. 105670-105670
Closed Access | Times Cited: 27
Richa Verma, Shalini Chandra
Engineering Applications of Artificial Intelligence (2022) Vol. 118, pp. 105670-105670
Closed Access | Times Cited: 27
Strategizing AI in Business and Education
Aleksandra Przegalińska, Dariusz Jemielniak
(2023)
Closed Access | Times Cited: 13
Aleksandra Przegalińska, Dariusz Jemielniak
(2023)
Closed Access | Times Cited: 13
An integrated multistage ensemble machine learning model for fraudulent transaction detection
Md. Alamin Talukder, Majdi Khalid, Md Ashraf Uddin
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 4
Md. Alamin Talukder, Majdi Khalid, Md Ashraf Uddin
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 4
Robust machine learning based Intrusion detection system using simple statistical techniques in feature selection
Sunil Kaushik, Akashdeep Bhardwaj, Ahmad Almogren, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Sunil Kaushik, Akashdeep Bhardwaj, Ahmad Almogren, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
A Robust Approach for Multi Classification-Based Intrusion Detection through Stacking Deep Learning Models
Samia Allaoua Chelloug
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 3, pp. 4845-4861
Open Access | Times Cited: 2
Samia Allaoua Chelloug
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 3, pp. 4845-4861
Open Access | Times Cited: 2
A Comprehensive Machine Learning Framework for Anomaly Detection in Credit Card Transactions
Fathe Jeribi
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 6
Open Access | Times Cited: 2
Fathe Jeribi
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 6
Open Access | Times Cited: 2
The role of artificial intelligence in disease prediction: using ensemble model to predict disease mellitus
Qinyuan Du, Dongli Wang, Yimin Zhang
Frontiers in Medicine (2024) Vol. 11
Open Access | Times Cited: 2
Qinyuan Du, Dongli Wang, Yimin Zhang
Frontiers in Medicine (2024) Vol. 11
Open Access | Times Cited: 2
Enhancing fraud detection efficiency in mobile transactions through the integration of bidirectional 3d Quasi-Recurrent Neural network and blockchain technologies
H.R. Ranganatha, A Syed Mustafa
Expert Systems with Applications (2024) Vol. 260, pp. 125179-125179
Closed Access | Times Cited: 2
H.R. Ranganatha, A Syed Mustafa
Expert Systems with Applications (2024) Vol. 260, pp. 125179-125179
Closed Access | Times Cited: 2
Efficient, Lightweight Cyber Intrusion Detection System for IoT Ecosystems Using MI2G Algorithm
Sunil Kaushik, Akashdeep Bhardwaj, Abdullah Alomari, et al.
Computers (2022) Vol. 11, Iss. 10, pp. 142-142
Open Access | Times Cited: 11
Sunil Kaushik, Akashdeep Bhardwaj, Abdullah Alomari, et al.
Computers (2022) Vol. 11, Iss. 10, pp. 142-142
Open Access | Times Cited: 11
Utilizing GANs for Credit Card Fraud Detection: A Comparison of Supervised Learning Algorithms
Bandar Alshawi
Engineering Technology & Applied Science Research (2023) Vol. 13, Iss. 6, pp. 12264-12270
Open Access | Times Cited: 6
Bandar Alshawi
Engineering Technology & Applied Science Research (2023) Vol. 13, Iss. 6, pp. 12264-12270
Open Access | Times Cited: 6
Meta-Learner-Based Approach for Detecting Attacks on Internet of Things Networks
Shaza Dawood Ahmed Rihan, Mohammed Anbar, Basim Ahmad Alabsi
Sensors (2023) Vol. 23, Iss. 19, pp. 8191-8191
Open Access | Times Cited: 5
Shaza Dawood Ahmed Rihan, Mohammed Anbar, Basim Ahmad Alabsi
Sensors (2023) Vol. 23, Iss. 19, pp. 8191-8191
Open Access | Times Cited: 5
Credit Card Fraud Detection Challenges and Solutions: A Review
Sumaya Saad, Ibraheem Nadher Ibraheem, Sarab M. Hameed
Iraqi Journal of Science (2024), pp. 2287-2303
Open Access | Times Cited: 1
Sumaya Saad, Ibraheem Nadher Ibraheem, Sarab M. Hameed
Iraqi Journal of Science (2024), pp. 2287-2303
Open Access | Times Cited: 1
Network intrusion detection system for IoT security using machine learning and statistical based hybrid feature selection
Supongmen Walling, Sibesh Lodh
Security and Privacy (2024)
Closed Access | Times Cited: 1
Supongmen Walling, Sibesh Lodh
Security and Privacy (2024)
Closed Access | Times Cited: 1
Empowering Extreme Communication: Propagation Characterization of a LoRa-Based Internet of Things Network Using Hybrid Machine Learning
Haider A. H. Alobaidy, Nor Fadzilah Abdullah, Rosdiadee Nordin, et al.
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 3997-4023
Open Access | Times Cited: 1
Haider A. H. Alobaidy, Nor Fadzilah Abdullah, Rosdiadee Nordin, et al.
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 3997-4023
Open Access | Times Cited: 1
Prediction of Sensor Data in a Greenhouse for Cultivation of Paprika Plants Using a Stacking Ensemble for Smart Farms
Seok-Ho Han, Husna Mutahira, Hoon‐Seok Jang
Applied Sciences (2023) Vol. 13, Iss. 18, pp. 10464-10464
Open Access | Times Cited: 3
Seok-Ho Han, Husna Mutahira, Hoon‐Seok Jang
Applied Sciences (2023) Vol. 13, Iss. 18, pp. 10464-10464
Open Access | Times Cited: 3
Credit Card Fraud Detection on Original European Credit Card Holder Dataset Using Ensemble Machine Learning Technique
Yih Bing Chu, Zhi Min Lim, Bryan Keane, et al.
Journal of Cyber Security (2023) Vol. 5, pp. 33-46
Open Access | Times Cited: 3
Yih Bing Chu, Zhi Min Lim, Bryan Keane, et al.
Journal of Cyber Security (2023) Vol. 5, pp. 33-46
Open Access | Times Cited: 3
HEMClust: An Improved Fraud Detection Model for Health Insurance using Heterogeneous Ensemble and K-prototype Clustering
Shamitha S Kotekani, V. Ilango
International Journal of Advanced Computer Science and Applications (2022) Vol. 13, Iss. 3
Open Access | Times Cited: 5
Shamitha S Kotekani, V. Ilango
International Journal of Advanced Computer Science and Applications (2022) Vol. 13, Iss. 3
Open Access | Times Cited: 5
Hosted Cuckoo Optimization Algorithm with Stacked Autoencoder-Enabled Sarcasm Detection in Online Social Networks
Dalia H. Elkamchouchi, Jaber S. Alzahrani, Mashael M. Asiri, et al.
Applied Sciences (2022) Vol. 12, Iss. 14, pp. 7119-7119
Open Access | Times Cited: 4
Dalia H. Elkamchouchi, Jaber S. Alzahrani, Mashael M. Asiri, et al.
Applied Sciences (2022) Vol. 12, Iss. 14, pp. 7119-7119
Open Access | Times Cited: 4
Development of hyper‐parameter‐tuned‐recurrent neural network for detection and mitigation of fraudulent resource consumption attack in cloud
Saleh Muhammad Rubai
Transactions on Emerging Telecommunications Technologies (2023) Vol. 34, Iss. 3
Closed Access | Times Cited: 2
Saleh Muhammad Rubai
Transactions on Emerging Telecommunications Technologies (2023) Vol. 34, Iss. 3
Closed Access | Times Cited: 2
Counterfeit Detection in the e-Commerce Industry Using Machine Learning: A Review
Jay Gohil, Rasha Kashef
2022 IEEE International Systems Conference (SysCon) (2023) Vol. 21, pp. 1-8
Closed Access | Times Cited: 2
Jay Gohil, Rasha Kashef
2022 IEEE International Systems Conference (SysCon) (2023) Vol. 21, pp. 1-8
Closed Access | Times Cited: 2
Application of Machine Learning algorithm for creating sustainable omni-channel retail ecosystem
Somedip Karmakar, Anuja Shukla
Deleted Journal (2023) Vol. 23, Iss. 2
Open Access | Times Cited: 2
Somedip Karmakar, Anuja Shukla
Deleted Journal (2023) Vol. 23, Iss. 2
Open Access | Times Cited: 2