
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Novel Feature Selection Approach to Classify Intrusion Attacks in Network Communications
Merve Ozkan-Okay, Refik Samet, Ömer Aslan, et al.
Applied Sciences (2023) Vol. 13, Iss. 19, pp. 11067-11067
Open Access | Times Cited: 10
Merve Ozkan-Okay, Refik Samet, Ömer Aslan, et al.
Applied Sciences (2023) Vol. 13, Iss. 19, pp. 11067-11067
Open Access | Times Cited: 10
Showing 10 citing articles:
Multi-Stage Learning Framework Using Convolutional Neural Network and Decision Tree-Based Classification for Detection of DDoS Pandemic Attacks in SDN-Based SCADA Systems
Onur Polat, Muammer Türkoğlu, Hüseyin Polat, et al.
Sensors (2024) Vol. 24, Iss. 3, pp. 1040-1040
Open Access | Times Cited: 13
Onur Polat, Muammer Türkoğlu, Hüseyin Polat, et al.
Sensors (2024) Vol. 24, Iss. 3, pp. 1040-1040
Open Access | Times Cited: 13
HC-NIDS: Historical contextual information based network intrusion detection system in Internet of Things
Zijie Chen, Hailin Zou, Tao Hu, et al.
Computers & Security (2025), pp. 104367-104367
Closed Access
Zijie Chen, Hailin Zou, Tao Hu, et al.
Computers & Security (2025), pp. 104367-104367
Closed Access
An improved synergistic dual-layer feature selection algorithm with two type classifier for efficient intrusion detection in IoT environment
G Logeswari, K. Thangaramya, M. Selvi, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
G Logeswari, K. Thangaramya, M. Selvi, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Mitigating Cyber Anomalies in Virtual Power Plants Using Artificial-Neural-Network-Based Secondary Control with a Federated Learning-Trust Adaptation
Seyed Iman Taheri, Mohammadreza Davoodi, Mohd. Hasan Ali
Energies (2024) Vol. 17, Iss. 3, pp. 619-619
Open Access | Times Cited: 3
Seyed Iman Taheri, Mohammadreza Davoodi, Mohd. Hasan Ali
Energies (2024) Vol. 17, Iss. 3, pp. 619-619
Open Access | Times Cited: 3
A Novel Approach of Evasive Malware Analysis Through Binary Opcode and BERT
Shukai Wang, Bingyan Xu
Research Square (Research Square) (2024)
Open Access | Times Cited: 1
Shukai Wang, Bingyan Xu
Research Square (Research Square) (2024)
Open Access | Times Cited: 1
Feature Importance-Based Backdoor Attack in NSL-KDD
Jinhyeok Jang, Yoonsoo An, Dowan Kim, et al.
Electronics (2023) Vol. 12, Iss. 24, pp. 4953-4953
Open Access | Times Cited: 2
Jinhyeok Jang, Yoonsoo An, Dowan Kim, et al.
Electronics (2023) Vol. 12, Iss. 24, pp. 4953-4953
Open Access | Times Cited: 2
A Time Series Intrusion Detection Method Based on SSAE, TCN and Bi-LSTM
Zhenxiang He, Xunxi Wang, Chun-Wei Li
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 78, Iss. 1, pp. 845-871
Open Access | Times Cited: 2
Zhenxiang He, Xunxi Wang, Chun-Wei Li
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 78, Iss. 1, pp. 845-871
Open Access | Times Cited: 2
NHAPMAD: Novel hybrid approaches for privacy‐preserved multiple attacks detection
Abhay Deep Seth, Shruti Sharma, Ankur Ratmele
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 18
Closed Access
Abhay Deep Seth, Shruti Sharma, Ankur Ratmele
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 18
Closed Access
Efficient Intrusion Detection System Data Preprocessing Using Deep Sparse Autoencoder with Differential Evolution
N. Saranya, Anandakumar Haldorai
IET Information Security (2024) Vol. 2024, Iss. 1
Open Access
N. Saranya, Anandakumar Haldorai
IET Information Security (2024) Vol. 2024, Iss. 1
Open Access
Efficient Feature Selection for IoT Security: A Comparative Analysis of Swarm Optimization Algorithms in Attack Detection
S Kumar Reddy Mallidi, Rajeswara Rao Ramisetty
Lecture notes in networks and systems (2024), pp. 101-115
Closed Access
S Kumar Reddy Mallidi, Rajeswara Rao Ramisetty
Lecture notes in networks and systems (2024), pp. 101-115
Closed Access