
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An Efficient Alert Aggregation Method Based on Conditional Rough Entropy and Knowledge Granularity
Jiaxuan Sun, Lize Gu, Kaiyuan Chen
Entropy (2020) Vol. 22, Iss. 3, pp. 324-324
Open Access | Times Cited: 16
Jiaxuan Sun, Lize Gu, Kaiyuan Chen
Entropy (2020) Vol. 22, Iss. 3, pp. 324-324
Open Access | Times Cited: 16
Showing 16 citing articles:
A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities
Diana Levshun, Igor Kotenko
Artificial Intelligence Review (2023) Vol. 56, Iss. 8, pp. 8547-8590
Closed Access | Times Cited: 18
Diana Levshun, Igor Kotenko
Artificial Intelligence Review (2023) Vol. 56, Iss. 8, pp. 8547-8590
Closed Access | Times Cited: 18
MIF: A multi-step attack scenario reconstruction and attack chains extraction method based on multi-information fusion
Beifeng Mao, Jing Liu, Yingxu Lai, et al.
Computer Networks (2021) Vol. 198, pp. 108340-108340
Open Access | Times Cited: 34
Beifeng Mao, Jing Liu, Yingxu Lai, et al.
Computer Networks (2021) Vol. 198, pp. 108340-108340
Open Access | Times Cited: 34
Dealing with Security Alert Flooding: Using Machine Learning for Domain-independent Alert Aggregation
Max Landauer, Florian Skopik, Markus Wurzenberger, et al.
ACM Transactions on Privacy and Security (2022) Vol. 25, Iss. 3, pp. 1-36
Open Access | Times Cited: 19
Max Landauer, Florian Skopik, Markus Wurzenberger, et al.
ACM Transactions on Privacy and Security (2022) Vol. 25, Iss. 3, pp. 1-36
Open Access | Times Cited: 19
A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities
Diana Levshun, Igor Kotenko
Research Square (Research Square) (2022)
Closed Access | Times Cited: 10
Diana Levshun, Igor Kotenko
Research Square (Research Square) (2022)
Closed Access | Times Cited: 10
Attack scenario reconstruction via fusing heterogeneous threat intelligence
Xiaodong Zang, Jian Gong, Xinchang Zhang, et al.
Computers & Security (2023) Vol. 133, pp. 103420-103420
Closed Access | Times Cited: 5
Xiaodong Zang, Jian Gong, Xinchang Zhang, et al.
Computers & Security (2023) Vol. 133, pp. 103420-103420
Closed Access | Times Cited: 5
Towards Enhancement of Machine Learning Techniques Using CSE-CIC-IDS2018 Cybersecurity Dataset
Dharshini Ravikumar
(2021)
Closed Access | Times Cited: 12
Dharshini Ravikumar
(2021)
Closed Access | Times Cited: 12
Anomaly Detection in IoT Networks Based on Intelligent Security Event Correlation
Igor Kotenko, Diana Levshun
(2024), pp. 816-824
Closed Access | Times Cited: 1
Igor Kotenko, Diana Levshun
(2024), pp. 816-824
Closed Access | Times Cited: 1
A New Model for Network Security Situation Assessment of the Industrial Internet
Ming Cheng, Shiming Li, Yuhe Wang, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 75, Iss. 2, pp. 2527-2555
Open Access | Times Cited: 4
Ming Cheng, Shiming Li, Yuhe Wang, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 75, Iss. 2, pp. 2527-2555
Open Access | Times Cited: 4
Research on Alarm Reduction of Intrusion Detection System Based on Clustering and Whale Optimization Algorithm
Leiting Wang, Lize Gu, Yifan Tang
Applied Sciences (2021) Vol. 11, Iss. 23, pp. 11200-11200
Open Access | Times Cited: 8
Leiting Wang, Lize Gu, Yifan Tang
Applied Sciences (2021) Vol. 11, Iss. 23, pp. 11200-11200
Open Access | Times Cited: 8
A New Approach to Three Way Decision Through Spherical Double Hierarchy Linguistic Information
Muhammad Ali Khan, Saleem Abdullah, Faisal Khan, et al.
IEEE Access (2023) Vol. 12, pp. 599-617
Open Access | Times Cited: 2
Muhammad Ali Khan, Saleem Abdullah, Faisal Khan, et al.
IEEE Access (2023) Vol. 12, pp. 599-617
Open Access | Times Cited: 2
Autoencoder-based Deep Learning Approach for Intrusion Detection System using Firefly Optimization Algorithms
Narendra kumar Bukka, S. Jagadeesh, K. Sivanagi Reddy
Research Square (Research Square) (2024)
Open Access
Narendra kumar Bukka, S. Jagadeesh, K. Sivanagi Reddy
Research Square (Research Square) (2024)
Open Access
Near real-time intrusion alert aggregation using concept-based learning
Gordon Werner, Shanchieh Jay Yang, Katie McConky
(2021) Vol. 6, pp. 152-160
Open Access | Times Cited: 4
Gordon Werner, Shanchieh Jay Yang, Katie McConky
(2021) Vol. 6, pp. 152-160
Open Access | Times Cited: 4
A risk assessment model for similar attack scenarios in industrial control system
Yaofang Zhang, Zibo Wang, Yingzhou Wang, et al.
The Journal of Supercomputing (2023) Vol. 79, Iss. 14, pp. 15955-15979
Closed Access | Times Cited: 1
Yaofang Zhang, Zibo Wang, Yingzhou Wang, et al.
The Journal of Supercomputing (2023) Vol. 79, Iss. 14, pp. 15955-15979
Closed Access | Times Cited: 1
Knowledge Discovery of Hospital Medical Technology Based on Partial Ordered Structure Diagrams
Dingju Zhu, Jianbin Tan, Guangbo Luo, et al.
International Journal of Software Science and Computational Intelligence (2023) Vol. 15, Iss. 1, pp. 1-16
Open Access
Dingju Zhu, Jianbin Tan, Guangbo Luo, et al.
International Journal of Software Science and Computational Intelligence (2023) Vol. 15, Iss. 1, pp. 1-16
Open Access
Discovery of Rare yet Co-occurring Actions with Temporal Characteristics in Episodic Cyberattack Streams
Gordon Werner, Shanchieh Jay Yang
(2022), pp. 1-10
Closed Access
Gordon Werner, Shanchieh Jay Yang
(2022), pp. 1-10
Closed Access
Near Real-time Learning and Extraction of Attack Models from Intrusion Alerts
Shanchieh Jay Yang, Ahmet Okutan, Gordon Werner, et al.
arXiv (Cornell University) (2021)
Open Access
Shanchieh Jay Yang, Ahmet Okutan, Gordon Werner, et al.
arXiv (Cornell University) (2021)
Open Access