
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies
Mahdi Rabbani, Yongli Wang, Reza Khoshkangini, et al.
Entropy (2021) Vol. 23, Iss. 5, pp. 529-529
Open Access | Times Cited: 37
Mahdi Rabbani, Yongli Wang, Reza Khoshkangini, et al.
Entropy (2021) Vol. 23, Iss. 5, pp. 529-529
Open Access | Times Cited: 37
Showing 1-25 of 37 citing articles:
A Novel Approach for Network Intrusion Detection Using Multistage Deep Learning Image Recognition
Jevgenijus Toldinas, Algimantas Venčkauskas, Robertas Damaševičius, et al.
Electronics (2021) Vol. 10, Iss. 15, pp. 1854-1854
Open Access | Times Cited: 91
Jevgenijus Toldinas, Algimantas Venčkauskas, Robertas Damaševičius, et al.
Electronics (2021) Vol. 10, Iss. 15, pp. 1854-1854
Open Access | Times Cited: 91
A Systematic Review on Machine Learning and Deep Learning Models for Electronic Information Security in Mobile Networks
Chaitanya Gupta, Ishita Johri, Kathiravan Srinivasan, et al.
Sensors (2022) Vol. 22, Iss. 5, pp. 2017-2017
Open Access | Times Cited: 57
Chaitanya Gupta, Ishita Johri, Kathiravan Srinivasan, et al.
Sensors (2022) Vol. 22, Iss. 5, pp. 2017-2017
Open Access | Times Cited: 57
ID-RDRL: a deep reinforcement learning-based feature selection intrusion detection model
Kezhou Ren, Yifan Zeng, Zhiqin Cao, et al.
Scientific Reports (2022) Vol. 12, Iss. 1
Open Access | Times Cited: 38
Kezhou Ren, Yifan Zeng, Zhiqin Cao, et al.
Scientific Reports (2022) Vol. 12, Iss. 1
Open Access | Times Cited: 38
A comprehensive review of machine learning's role in enhancing network security and threat detection
Akoh Atadoga, Enoch Oluwademilade Sodiya, Uchenna Joseph Umoga, et al.
World Journal of Advanced Research and Reviews (2024) Vol. 21, Iss. 2, pp. 877-886
Open Access | Times Cited: 10
Akoh Atadoga, Enoch Oluwademilade Sodiya, Uchenna Joseph Umoga, et al.
World Journal of Advanced Research and Reviews (2024) Vol. 21, Iss. 2, pp. 877-886
Open Access | Times Cited: 10
Deep learning hybridization for improved malware detection in smart Internet of Things
Abdulwahab Ali Almazroi, Nasir Ayub
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 9
Abdulwahab Ali Almazroi, Nasir Ayub
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 9
Dual replay memory reinforcement learning framework for minority attack detection
Ankit Sharma, Manjeet Singh
Engineering Applications of Artificial Intelligence (2025) Vol. 144, pp. 110083-110083
Closed Access
Ankit Sharma, Manjeet Singh
Engineering Applications of Artificial Intelligence (2025) Vol. 144, pp. 110083-110083
Closed Access
Network Anomaly Detection Using Quantum Neural Networks on Noisy Quantum Computers
Alon Kukliansky, Marko Orescanin, Chad Bollmann, et al.
IEEE Transactions on Quantum Engineering (2024) Vol. 5, pp. 1-11
Open Access | Times Cited: 4
Alon Kukliansky, Marko Orescanin, Chad Bollmann, et al.
IEEE Transactions on Quantum Engineering (2024) Vol. 5, pp. 1-11
Open Access | Times Cited: 4
Playing to Save Sisters: How Female Gaming Communities Foster Social Support within Different Cultural Contexts
Zizhong Zhang, Haixin Mu, Sida Huang
Journal of Broadcasting & Electronic Media (2023) Vol. 67, Iss. 5, pp. 693-713
Closed Access | Times Cited: 8
Zizhong Zhang, Haixin Mu, Sida Huang
Journal of Broadcasting & Electronic Media (2023) Vol. 67, Iss. 5, pp. 693-713
Closed Access | Times Cited: 8
Framing Network Flow for Anomaly Detection Using Image Recognition and Federated Learning
Jevgenijus Toldinas, Algimantas Venčkauskas, Agnius Liutkevičius, et al.
Electronics (2022) Vol. 11, Iss. 19, pp. 3138-3138
Open Access | Times Cited: 13
Jevgenijus Toldinas, Algimantas Venčkauskas, Agnius Liutkevičius, et al.
Electronics (2022) Vol. 11, Iss. 19, pp. 3138-3138
Open Access | Times Cited: 13
Proactive Threat Hunting in Critical Infrastructure Protection through Hybrid Machine Learning Algorithm Application
Shan Ali, Seunghwan Myeong
Sensors (2024) Vol. 24, Iss. 15, pp. 4888-4888
Open Access | Times Cited: 2
Shan Ali, Seunghwan Myeong
Sensors (2024) Vol. 24, Iss. 15, pp. 4888-4888
Open Access | Times Cited: 2
Non-Targeted Analytical Technology in Herbal Medicines: Applications, Challenges, and Perspectives
Chaoping Li, Yuanzhong Wang
Critical Reviews in Analytical Chemistry (2022) Vol. 54, Iss. 7, pp. 1951-1970
Closed Access | Times Cited: 11
Chaoping Li, Yuanzhong Wang
Critical Reviews in Analytical Chemistry (2022) Vol. 54, Iss. 7, pp. 1951-1970
Closed Access | Times Cited: 11
Contrastive Learning Over Random Fourier Features for IoT Network Intrusion Detection
Manuel López-Martín, Antonio Sánchez-Esguevillas, Juan Ignacio Arribas, et al.
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 10, pp. 8505-8513
Closed Access | Times Cited: 10
Manuel López-Martín, Antonio Sánchez-Esguevillas, Juan Ignacio Arribas, et al.
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 10, pp. 8505-8513
Closed Access | Times Cited: 10
An efficient blockchain‐based approach to improve the accuracy of intrusion detection systems
Ahmed Aliyu, Jinshuo Liu, Ezekia Gilliard
Electronics Letters (2023) Vol. 59, Iss. 18
Open Access | Times Cited: 4
Ahmed Aliyu, Jinshuo Liu, Ezekia Gilliard
Electronics Letters (2023) Vol. 59, Iss. 18
Open Access | Times Cited: 4
Extensive Review of Security and Privacy Issues in Heterogeneous Networks
Mmasi Patience Robai
World Journal of Advanced Research and Reviews (2024) Vol. 23, Iss. 1, pp. 2955-2984
Open Access | Times Cited: 1
Mmasi Patience Robai
World Journal of Advanced Research and Reviews (2024) Vol. 23, Iss. 1, pp. 2955-2984
Open Access | Times Cited: 1
Zero Trust Cybersecurity: Procedures and Considerations in Context
Brady Lund, Tae-Hee Lee, Ziang Wang, et al.
Encyclopedia (2024) Vol. 4, Iss. 4, pp. 1520-1533
Open Access
Brady Lund, Tae-Hee Lee, Ziang Wang, et al.
Encyclopedia (2024) Vol. 4, Iss. 4, pp. 1520-1533
Open Access
Malicious behavior detection in cloud using self‐optimized dynamic kernel convolutional neural network
Abrar M. Alajlan, Marwah Almasri
Transactions on Emerging Telecommunications Technologies (2022) Vol. 33, Iss. 5
Closed Access | Times Cited: 3
Abrar M. Alajlan, Marwah Almasri
Transactions on Emerging Telecommunications Technologies (2022) Vol. 33, Iss. 5
Closed Access | Times Cited: 3
A Comprehensive Review of Anomaly Detection in Web Logs
Mehryar Majd, Pejman Najafi, Seyed Ali Alhosseini, et al.
(2022), pp. 158-165
Closed Access | Times Cited: 3
Mehryar Majd, Pejman Najafi, Seyed Ali Alhosseini, et al.
(2022), pp. 158-165
Closed Access | Times Cited: 3
Detecting Malicious Accounts in Cyberspace: Enhancing Security in ChatGPT and Beyond
Said A. Salloum
Studies in big data (2024), pp. 653-666
Closed Access
Said A. Salloum
Studies in big data (2024), pp. 653-666
Closed Access
Improving credit card fraud detection using machine learning and GAN technology
Najwan Thair Ali, Shahad Jasim Hasan, Ahmad Ghandour, et al.
BIO Web of Conferences (2024) Vol. 97, pp. 00076-00076
Open Access
Najwan Thair Ali, Shahad Jasim Hasan, Ahmad Ghandour, et al.
BIO Web of Conferences (2024) Vol. 97, pp. 00076-00076
Open Access
Evaluating the Performance and Challenges of Machine Learning Models in Network Anomaly Detection
Sakshi Bakhare, Sudhir W. Mohod
International Journal of Scientific Research in Science Engineering and Technology (2024) Vol. 11, Iss. 3, pp. 42-52
Open Access
Sakshi Bakhare, Sudhir W. Mohod
International Journal of Scientific Research in Science Engineering and Technology (2024) Vol. 11, Iss. 3, pp. 42-52
Open Access
How to integrate cloud service, data analytic and machine learning technique to reduce cyber risks associated with the modern cloud based infrastructure
Upakar Bhatta
(2024)
Open Access
Upakar Bhatta
(2024)
Open Access
Cyber Sentinels: Illuminating Malicious Intent in Social Networks Using Dual-Powered CHAM
Sailaja Terumalasetti, S R Reeja
(2024), pp. 58-74
Closed Access
Sailaja Terumalasetti, S R Reeja
(2024), pp. 58-74
Closed Access
Zero-Trust Cybersecurity: Procedures and Considerations in Context
Brady Lund, Tae Hee Lee, Ziang Wang, et al.
(2024)
Open Access
Brady Lund, Tae Hee Lee, Ziang Wang, et al.
(2024)
Open Access
A Study on Network Anomaly Detection Using Stacking-Based Machine Learning Algorithms for ASNM Datasets
M. Thangavel, Het Patel, Adil Mustafa Khokhawala, et al.
Lecture notes in networks and systems (2024), pp. 501-512
Closed Access
M. Thangavel, Het Patel, Adil Mustafa Khokhawala, et al.
Lecture notes in networks and systems (2024), pp. 501-512
Closed Access
Novel Intrusion Detection Approach in Unbalanced Network Traffic Using Modified Random Forest Algorithm
Pallam Ravi, N. Saravanan, D. Sriramu, et al.
(2024), pp. 78-87
Closed Access
Pallam Ravi, N. Saravanan, D. Sriramu, et al.
(2024), pp. 78-87
Closed Access