OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Towards an Intelligent Intrusion Detection System to Detect Malicious Activities in Cloud Computing
Hanaa Attou, Mouaad Mohy-eddine, Azidine Guezzaz, et al.
Applied Sciences (2023) Vol. 13, Iss. 17, pp. 9588-9588
Open Access | Times Cited: 31

Showing 1-25 of 31 citing articles:

Double fuzzy clustering-driven context neural network for intrusion detection in cloud computing
S. Anu Velavan, C. Sureshkumar
Wireless Networks (2025)
Closed Access | Times Cited: 1

Detecting Cyber Threats With a Graph-Based NIDPS
Brendan Ooi Tze Wen, Najihah Syahriza, Nicholas Chan Wei Xian, et al.
Advances in logistics, operations, and management science book series (2023), pp. 36-74
Closed Access | Times Cited: 16

Performance Comparison Analysis of Classification Methodologies for Effective Detection of Intrusions
Rajesh Bingu, Salina Adinarayana, Jagjit Singh Dhatterwal, et al.
Computers & Security (2024) Vol. 143, pp. 103893-103893
Closed Access | Times Cited: 7

Intrusion detection based on ensemble learning for big data classification
Farah Jemili, Rahma Meddeb, Ouajdi Korbaa
Cluster Computing (2023) Vol. 27, Iss. 3, pp. 3771-3798
Closed Access | Times Cited: 13

Cloud Network Anomaly Detection Using Machine and Deep Learning Techniques— Recent Research Advancements
Amira Mahamat Abdallah, Aysha Saif Rashed Obaid Alkaabi, Ghaya Bark Nasser Douman Alameri, et al.
IEEE Access (2024) Vol. 12, pp. 56749-56773
Open Access | Times Cited: 5

Comparative Analysis of Edge-based and Cloud-based Intrusion Detection Systems: A Systematic Literature Review
Sahar Ebadinezhad, Ali Hussein Abdulrazzaq Alsaroah
(2025), pp. 707-714
Closed Access

An Efficient Cyber Security Attack Detection With Encryption Using Capsule Convolutional Polymorphic Graph Attention
P. J. Sathish Kumar, B. R. Tapas Bapu, Shreya Sridhar, et al.
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 3
Closed Access

A new cloud-based cyber-attack detection architecture for hyper-automation process in industrial internet of things
Alireza Souri, Monire Norouzi, Yousef Alsenani
Cluster Computing (2023) Vol. 27, Iss. 3, pp. 3639-3655
Closed Access | Times Cited: 9

Enhancing Cloud Security—Proactive Threat Monitoring and Detection Using a SIEM-Based Approach
Emmanuel Tuyishime, Titus Bălan, Petru Adrian Cotfas, et al.
Applied Sciences (2023) Vol. 13, Iss. 22, pp. 12359-12359
Open Access | Times Cited: 9

Insider threat mitigation: Systematic literature review
Usman Inayat, Mashaim Farzan, Sajid Mahmood, et al.
Ain Shams Engineering Journal (2024), pp. 103068-103068
Open Access | Times Cited: 3

A Consistent Augmented Stacking Polynomial Optimized Tool (ASPOT) for Improving Security of Cloud-IoT Systems
Divya Ramachandran, R. Chithambaramani, S. Sankar Ganesh, et al.
Journal of Advanced Research in Applied Sciences and Engineering Technology (2024) Vol. 37, Iss. 1, pp. 16-36
Open Access | Times Cited: 2

Network Intrusion Detection in Cloud Environments: A Comparative Analysis of Approaches
Sina Ahmadi
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 3
Open Access | Times Cited: 2

CSO-DQN: Circle Search Optimization-based Deep Q-Learning Network for Intrusion Detection System in Cloud Environment
A. Pravin, T. Prem Jacob, R. Raja Kumar
IETE Journal of Research (2024) Vol. 70, Iss. 9, pp. 7469-7483
Closed Access | Times Cited: 2

A Novel IDS Based on Jaya Optimizer and Smote-ENN for Cyberattacks Detection
Fawzia Omer Albasheer, Raghavendra Ramesh Haibatti, Mayank Agarwal, et al.
IEEE Access (2024) Vol. 12, pp. 101506-101527
Open Access | Times Cited: 2

A hybrid deep learning approach for enhanced network intrusion detection
K. Prabu, P. Sudhakar
Indonesian Journal of Electrical Engineering and Computer Science (2024) Vol. 33, Iss. 3, pp. 1915-1915
Open Access | Times Cited: 1

Cloud Computing Security via Intelligent Intrusion Detection Mechanisms
Hamza Nasir, Azeem Ayaz, Shahzmaan Nizamani, et al.
International Journal of Information Systems and Computer Technologies (2024) Vol. 3, Iss. 1, pp. 84-92
Open Access | Times Cited: 1

Automatic Intrusion Detection Model with Secure Data Storage on Cloud Using Adaptive Cyclic Shift Transposition with Enhanced ANFIS Classifier
K V K Chithanya, V. Lokeswara Reddy
Cyber Security and Applications (2024), pp. 100073-100073
Open Access | Times Cited: 1

Hybrid Deep Learning Cloud Intrusion Detection
Lokanayaki Karnan, S. Mahalakshmi, V. Thirunavukkarasu
(2024), pp. 1-6
Closed Access

Horse Herd optimization with deep learning based intrusion detection in cloud computing environment
Samineni Nagamani, S. Arivalagan, Mallika Prem Senthil, et al.
International Journal of Information Technology (2024)
Closed Access

Enhancing cloud security with intelligent load balancing and malicious request classification
Krishna Sowjanya K, S K Mouleeswaran
Cluster Computing (2024) Vol. 28, Iss. 1
Closed Access

Enhancing data security in cloud computing: a blockchain-based Feistel cipher encryption and multiclass vector side-channel attack detection approach
Ramakrishna Subbareddy, Tamil selvan
International Journal of Advanced Technology and Engineering Exploration (2024) Vol. 11, Iss. 112
Open Access

ALRN-RCS: Advanced Approach to Network Intrusion Detection Using Attention Long-Term Recurrent Networks and Chaotic Optimization
N. P. Ponnuviji, E. Nirmala, Mary Harin Fernandez F, et al.
IETE Journal of Research (2024) Vol. 70, Iss. 11, pp. 8006-8017
Closed Access

Page 1 - Next Page

Scroll to top