OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Survey of CNN-Based Network Intrusion Detection
Leila Mohammadpour, Teck Chaw Ling, Chee Sun Liew, et al.
Applied Sciences (2022) Vol. 12, Iss. 16, pp. 8162-8162
Open Access | Times Cited: 87

Showing 1-25 of 87 citing articles:

Artificial intelligence for visually impaired
Jiaji Wang, Shuihua Wang‎, Yudong Zhang
Displays (2023) Vol. 77, pp. 102391-102391
Open Access | Times Cited: 53

Machine Learning and Deep Learning Techniques for Internet of Things Network Anomaly Detection—Current Research Trends
Saida Hafsa Rafique, Amira Mahamat Abdallah, Nura Shifa Musa, et al.
Sensors (2024) Vol. 24, Iss. 6, pp. 1968-1968
Open Access | Times Cited: 15

Hyperparameter Optimization for 1D-CNN-Based Network Intrusion Detection Using GA and PSO
Dusmurod Kilichev, Wooseong Kim
Mathematics (2023) Vol. 11, Iss. 17, pp. 3724-3724
Open Access | Times Cited: 30

Breaking Alert Fatigue: AI-Assisted SIEM Framework for Effective Incident Response
Tao Ban, Takeshi Takahashi, Samuel Ndichu, et al.
Applied Sciences (2023) Vol. 13, Iss. 11, pp. 6610-6610
Open Access | Times Cited: 21

An integrated intrusion detection framework based on subspace clustering and ensemble learning
Jingyi Zhu, Xiufeng Liu
Computers & Electrical Engineering (2024) Vol. 115, pp. 109113-109113
Open Access | Times Cited: 6

A network intrusion detection system based on deep learning in the IoT
Xiao Wang, Lie Dai, Guang Yang
The Journal of Supercomputing (2024) Vol. 80, Iss. 16, pp. 24520-24558
Closed Access | Times Cited: 5

Thermal Image Classification of Autistic Children Using Res-Net Architecture
Ahmadiar Ahmadiar, Melinda Melinda, Zharifah Muthiah, et al.
Indonesian Journal of Electronics Electromedical Engineering and Medical Informatics (2025) Vol. 7, Iss. 1
Open Access

Cyber-attack detection for lateral control system of cloud-based intelligent connected vehicle based on BiLSTM-Attention network
Cao He, Xing Xu, Haobin Jiang, et al.
Measurement (2025), pp. 116740-116740
Closed Access

Enhancing Network Access Control using Multi-Modal Biometric Authentication Framework
A.M. Mohammed, A. A. Salama, Nasser Shebka, et al.
Engineering Technology & Applied Science Research (2025) Vol. 15, Iss. 1, pp. 20144-20150
Open Access

Enhancing Cloud Data Center Security through Deep Learning: A Comparative Analysis of RNN, CNN, and LSTM Models for Anomaly and Intrusion Detection
Shimaa A. Ahmed, Entisar H. Khalifa, Majid Nawaz, et al.
Engineering Technology & Applied Science Research (2025) Vol. 15, Iss. 1, pp. 20071-20076
Open Access

A Review of Machine Learning and Deep Learning Methods for Person Detection, Tracking and Identification, and Face Recognition with Applications
Beibut Amirgaliyev, Miras Mussabek, Tomiris Rakhimzhanova, et al.
Sensors (2025) Vol. 25, Iss. 5, pp. 1410-1410
Open Access

An Assessment of Intrusion Detection Through the Utilization of an Ensemble Deep Learning Method
S. K. Singh, Birendra Prasad, Ramesh Azmeera, et al.
Smart innovation, systems and technologies (2025), pp. 387-396
Closed Access

BERT-based network for intrusion detection system
Yong Yang, Xing Peng
EURASIP Journal on Information Security (2025) Vol. 2025, Iss. 1
Open Access

Next-generation IIoT security: Comprehensive comparative analysis of CNN-based approaches
Huiyao Dong, Igor Kotenko, Dmitry Levshun
Knowledge-Based Systems (2025), pp. 113337-113337
Closed Access

A high performance hybrid LSTM CNN secure architecture for IoT environments using deep learning
Pradip Sinha, Dinesh Kumar Sahu, Shiv Prakash, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access

An Attention-Based Convolutional Neural Network for Intrusion Detection Model
Zhen Wang, Fuad A. Ghaleb
IEEE Access (2023) Vol. 11, pp. 43116-43127
Open Access | Times Cited: 13

AI-Assisted Security Alert Data Analysis with Imbalanced Learning Methods
Samuel Ndichu, Tao Ban, Takeshi Takahashi, et al.
Applied Sciences (2023) Vol. 13, Iss. 3, pp. 1977-1977
Open Access | Times Cited: 12

Strengthening Network Security: Deep Learning Models for Intrusion Detection with Optimized Feature Subset and Effective Imbalance Handling
Bayi Xu, Lei Sun, Xiuqing Mao, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 2, pp. 1995-2022
Open Access | Times Cited: 4

Deep-SDM: A Unified Computational Framework for Sequential Data Modeling Using Deep Learning Models
Nawa Raj Pokhrel, Keshab R. Dahal, Ramchandra Rimal, et al.
Software (2024) Vol. 3, Iss. 1, pp. 47-61
Open Access | Times Cited: 4

Intrusion detection and secure data storage in the cloud were recommend by a multiscale deep bidirectional gated recurrent neural network
B. C. Preethi, R. Vasanthi, G. Sugitha, et al.
Expert Systems with Applications (2024) Vol. 255, pp. 124428-124428
Closed Access | Times Cited: 4

Advanced Deep Learning Models for 6G: Overview, Opportunities and Challenges
Licheng Jiao, Y Shao, Long Sun, et al.
IEEE Access (2024) Vol. 12, pp. 133245-133314
Open Access | Times Cited: 4

SeNet-I: An approach for detecting network intrusions through serialized network traffic images
Yasir Ali Farrukh, Syed Wali, Irfan Khan, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 126, pp. 107169-107169
Closed Access | Times Cited: 11

Hybrid Deep Learning Network Intrusion Detection System Based on Convolutional Neural Network and Bidirectional Long Short-Term Memory
Anindra Ageng Jihado, Abba Suganda Girsang
Journal of Advances in Information Technology (2024) Vol. 15, Iss. 2, pp. 219-232
Open Access | Times Cited: 3

Network Intrusion Detection Based on Feature Image and Deformable Vision Transformer Classification
Kan He, Wei Zhang, Xuejun Zong, et al.
IEEE Access (2024) Vol. 12, pp. 44335-44350
Open Access | Times Cited: 3

Page 1 - Next Page

Scroll to top