OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Data Transformation Schemes for CNN-Based Network Traffic Analysis: A Survey
Jacek Krupski, Waldemar Graniszewski, Marcin Iwanowski
Electronics (2021) Vol. 10, Iss. 16, pp. 2042-2042
Open Access | Times Cited: 34

Showing 1-25 of 34 citing articles:

A clustering-based approach for classifying data streams using graph matching
Yuxin Du, Mingshu He, Xiaojuan Wang
Journal Of Big Data (2025) Vol. 12, Iss. 1
Open Access

Artificial intelligence advances in anomaly detection for telecom networks
Enerst Edozie, Aliyu Nuhu Shuaibu, Bashir Olaniyi Sadiq, et al.
Artificial Intelligence Review (2025) Vol. 58, Iss. 4
Open Access

SeNet-I: An approach for detecting network intrusions through serialized network traffic images
Yasir Ali Farrukh, Syed Wali, Irfan Khan, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 126, pp. 107169-107169
Closed Access | Times Cited: 12

Performance enhancement of artificial intelligence: A survey
Moez Krichen, Mohamed S. Abdalzaher
Journal of Network and Computer Applications (2024), pp. 104034-104034
Closed Access | Times Cited: 3

Dimensionality reduction for detection of anomalies in the IoT traffic data
Dominik Olszewski, Marcin Iwanowski, Waldemar Graniszewski
Future Generation Computer Systems (2023) Vol. 151, pp. 137-151
Closed Access | Times Cited: 8

The Attention-Based Autoencoder for Network Traffic Classification with Interpretable Feature Representation
Jun Cui, Longkun Bai, Xiaofeng Zhang, et al.
Symmetry (2024) Vol. 16, Iss. 5, pp. 589-589
Open Access | Times Cited: 2

Taxi origin and destination demand prediction based on deep learning: a review
Dan Peng, Mingxia Huang, Zhibo Xing
Digital Transportation and Safety (2023) Vol. 2, Iss. 3, pp. 176-189
Open Access | Times Cited: 5

Enhancing IoT Network Security: Unveiling the Power of Self-Supervised Learning against DDoS Attacks
Josue Genaro Almaraz-Rivera, José Antonio Cantoral-Ceballos, Juan Felipe Botero
Sensors (2023) Vol. 23, Iss. 21, pp. 8701-8701
Open Access | Times Cited: 5

CNNPRE: A CNN-Based Protocol Reverse Engineering Method
Javad Garshasbi, Mehdi Teimouri
IEEE Access (2023) Vol. 11, pp. 116255-116268
Open Access | Times Cited: 4

Exploring the power of convolutional neural networks for encrypted industrial protocols recognition
Eva Holasová, Petr Blažek, Radek Fujdiak, et al.
Sustainable Energy Grids and Networks (2024) Vol. 38, pp. 101269-101269
Closed Access | Times Cited: 1

Comparative Analysis of Classification Methods and Suitable Datasets for Protocol Recognition in Operational Technologies
Eva Holasová, Radek Fujdiak, Jiří Mišurec
Algorithms (2024) Vol. 17, Iss. 5, pp. 208-208
Open Access | Times Cited: 1

Traffic data classification in SDN network based on machine learning algorithms
Samah Adil, Ali Saeed Dayem Alfoudi
Wasit Journal of Pure sciences (2024) Vol. 3, Iss. 2, pp. 161-171
Open Access | Times Cited: 1

Predictive modelling of mineral prospectivity using satellite remote sensing and machine learning algorithms
Muhammad Ahsan Mahboob, Turgay Çelik, Bekir Genc
Remote Sensing Applications Society and Environment (2024) Vol. 36, pp. 101316-101316
Open Access | Times Cited: 1

Extraction of Minimal Set of Traffic Features Using Ensemble of Classifiers and Rank Aggregation for Network Intrusion Detection Systems
Jacek Krupski, Marcin Iwanowski, Waldemar Graniszewski
Applied Sciences (2024) Vol. 14, Iss. 16, pp. 6995-6995
Open Access | Times Cited: 1

Deep Learning for Network Intrusion Detection in Virtual Networks
Daniel Spiekermann, Tobias Eggendorfer, Jörg Keller
Electronics (2024) Vol. 13, Iss. 18, pp. 3617-3617
Open Access | Times Cited: 1

SeNet-I: An Approach for Detecting Network Intrusions Through Serialized Network Traffic Images
Yasir Ali Farrukh, Syed Wali, Irfan Khan, et al.
(2023)
Closed Access | Times Cited: 4

Machine learning based fileless malware traffic classification using image visualization
Fikirte Ayalke Demmese, Ajaya Neupane, Sajad Khorsandroo, et al.
Cybersecurity (2023) Vol. 6, Iss. 1
Open Access | Times Cited: 4

CBS: A Deep Learning Approach for Encrypted Traffic Classification With Mixed Spatio-Temporal and Statistical Features
Mehdi Seydali, Farshad Khunjush, Behzad Akbari, et al.
IEEE Access (2023) Vol. 11, pp. 141674-141702
Open Access | Times Cited: 3

Android applications classification with deep neural networks
Mustapha Adamu Mohammed, Michael Asante, Seth Alornyo, et al.
Iran Journal of Computer Science (2023) Vol. 6, Iss. 3, pp. 221-232
Open Access | Times Cited: 2

Tabular-to-Image Transformations for the Classification of Anonymous Network Traffic Using Deep Residual Networks
Nathan Briner, Drake Cullen, James Halladay, et al.
IEEE Access (2023) Vol. 11, pp. 113100-113113
Open Access | Times Cited: 2

Cybersecurity and Data Science
Krzysztof Szczypiorski
Electronics (2022) Vol. 11, Iss. 15, pp. 2309-2309
Open Access | Times Cited: 3

BIE: Binary Image Encoding for the Classification of Tabular Data
James Halladay, Drake Cullen, Nathan Briner, et al.
Journal of Data Science (2024), pp. 1-21
Open Access

Network Security Threat Intelligence Prediction in Network Traffic Analysis Based on Machine Learning
Yankui Guan
Applied Mathematics and Nonlinear Sciences (2024) Vol. 9, Iss. 1
Open Access

Traffic Flow Prediction Based on Downsampled Interactive Spatio-Temporal Attention Network
熙来 季
Modeling and Simulation (2024) Vol. 13, Iss. 04, pp. 4090-4103
Closed Access

Image-based intrusion detection system for GPS spoofing cyberattacks in unmanned aerial vehicles
Mohamed Selim Korium, Mohamed Saber, Ahmed Mahmoud Ahmed, et al.
Ad Hoc Networks (2024) Vol. 163, pp. 103597-103597
Open Access

Page 1 - Next Page

Scroll to top