OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Novel Feature Selection Approach to Classify Intrusion Attacks in Network Communications
Merve Ozkan-Okay, Refik Samet, Ömer Aslan, et al.
Applied Sciences (2023) Vol. 13, Iss. 19, pp. 11067-11067
Open Access | Times Cited: 10

Showing 10 citing articles:

HC-NIDS: Historical contextual information based network intrusion detection system in Internet of Things
Zijie Chen, Hailin Zou, Tao Hu, et al.
Computers & Security (2025), pp. 104367-104367
Closed Access

Mitigating Cyber Anomalies in Virtual Power Plants Using Artificial-Neural-Network-Based Secondary Control with a Federated Learning-Trust Adaptation
Seyed Iman Taheri, Mohammadreza Davoodi, Mohd. Hasan Ali
Energies (2024) Vol. 17, Iss. 3, pp. 619-619
Open Access | Times Cited: 3

A Novel Approach of Evasive Malware Analysis Through Binary Opcode and BERT
Shukai Wang, Bingyan Xu
Research Square (Research Square) (2024)
Open Access | Times Cited: 1

Feature Importance-Based Backdoor Attack in NSL-KDD
Jinhyeok Jang, Yoonsoo An, Dowan Kim, et al.
Electronics (2023) Vol. 12, Iss. 24, pp. 4953-4953
Open Access | Times Cited: 2

A Time Series Intrusion Detection Method Based on SSAE, TCN and Bi-LSTM
Zhenxiang He, Xunxi Wang, Chun-Wei Li
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 78, Iss. 1, pp. 845-871
Open Access | Times Cited: 2

NHAPMAD: Novel hybrid approaches for privacy‐preserved multiple attacks detection
Abhay Deep Seth, Shruti Sharma, Ankur Ratmele
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 18
Closed Access

Efficient Feature Selection for IoT Security: A Comparative Analysis of Swarm Optimization Algorithms in Attack Detection
S Kumar Reddy Mallidi, Rajeswara Rao Ramisetty
Lecture notes in networks and systems (2024), pp. 101-115
Closed Access

Page 1

Scroll to top