OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Filter-Based Ensemble Feature Selection and Deep Learning Model for Intrusion Detection in Cloud Computing
C. Kavitha, M. Saravanan, Thippa Reddy Gadekallu, et al.
Electronics (2023) Vol. 12, Iss. 3, pp. 556-556
Open Access | Times Cited: 18

Showing 18 citing articles:

Algorithmic Approach to Virtual Machine Migration in Cloud Computing with Updated SESA Algorithm
Amandeep Kaur, Saurabh Kumar, Deepali Gupta, et al.
Sensors (2023) Vol. 23, Iss. 13, pp. 6117-6117
Open Access | Times Cited: 29

Deep learning-based air pollution analysis on carbon monoxide in Taiwan
Cheng‐Hong Yang, Po‐Hung Chen, Chih-Hsien Wu, et al.
Ecological Informatics (2024) Vol. 80, pp. 102477-102477
Open Access | Times Cited: 10

Cloud Network Anomaly Detection Using Machine and Deep Learning Techniques— Recent Research Advancements
Amira Mahamat Abdallah, Aysha Saif Rashed Obaid Alkaabi, Ghaya Bark Nasser Douman Alameri, et al.
IEEE Access (2024) Vol. 12, pp. 56749-56773
Open Access | Times Cited: 5

An efficient approach to detect distributed denial of service attacks for software defined internet of things combining autoencoder and extreme gradient boosting with feature selection and hyperparameter tuning optimization
Mohamed Ali Setitra, Mingyu Fan, Zine El Abidine Bensalem
Transactions on Emerging Telecommunications Technologies (2023) Vol. 34, Iss. 9
Closed Access | Times Cited: 14

A Systematic Review on Game-Theoretic Models and Different Types of Security Requirements in Cloud Environment: Challenges and Opportunities
Komal Singh Gill, Anju Sharma, Sharad Saxena
Archives of Computational Methods in Engineering (2024)
Closed Access | Times Cited: 4

A Hypertuned Lightweight and Scalable LSTM Model for Hybrid Network Intrusion Detection
Aysha Bibi, Gabriel Avelino Sampedro, Ahmad Almadhor, et al.
Technologies (2023) Vol. 11, Iss. 5, pp. 121-121
Open Access | Times Cited: 8

Towards Ensemble Feature Selection for Lightweight Intrusion Detection in Resource-Constrained IoT Devices
Mahawish Fatima, Osama Rehman, Ibrahim M. H. Rahman, et al.
Future Internet (2024) Vol. 16, Iss. 10, pp. 368-368
Open Access | Times Cited: 2

Hybrid dung beetle optimization based dimensionality reduction with deep learning based cybersecurity solution on IoT environment
Amal K. Alkhalifa, Nuha Alruwais, Wahida Mansouri, et al.
Alexandria Engineering Journal (2024) Vol. 111, pp. 148-159
Open Access | Times Cited: 2

Enhancing Cloud-Based Security: A Novel Approach for Efficient Cyber-Threat Detection Using GSCSO-IHNN Model
Divya Ramachandran, Mubarak Albathan, Ayyaz Hussain, et al.
Systems (2023) Vol. 11, Iss. 10, pp. 518-518
Open Access | Times Cited: 4

TPBFS: two populations based feature selection method for medical data
Haodi Quan, Yun Zhang, Qiaoqin Li, et al.
Cluster Computing (2024) Vol. 27, Iss. 8, pp. 11553-11568
Closed Access | Times Cited: 1

Anomaly-Based Network Intrusion Detection Using Hybrid CNN, Bi-LSTM Deep Learning Techniques
Srinivas Akkepalli, K. Sagar
(2024) Vol. 11, pp. 1-6
Closed Access | Times Cited: 1

Multi-Objective Seagull Optimization Algorithm with Deep Learning-Enabled Vulnerability Detection for Secure Cloud Environments
Mohammed Aljebreen, Manal Abdullah Alohali, Hany Mahgoub, et al.
Sensors (2023) Vol. 23, Iss. 23, pp. 9383-9383
Open Access | Times Cited: 3

Intrusion detection system in cloud computing by utilizing VTR-HLSTM based on deep learning
Valavan Woothukadu Thirumaran, Nalini Joseph, G. Umarani Srikanth
Indonesian Journal of Electrical Engineering and Computer Science (2024) Vol. 33, Iss. 3, pp. 1829-1829
Open Access

MEMFO-KELM: A Deep Learning Approach for Real-Time Intrusion Detection in Cloud Environments
M. Ramanan
IETE Journal of Research (2024) Vol. 70, Iss. 10, pp. 7763-7775
Closed Access

Implementation of a Cloud Computing Based Learning Management System in Education Management
Agustin Hanivia Cindy, Habiba Walilulu, Poltjes Pattipeilohy, et al.
al-fikrah Jurnal Manajemen Pendidikan (2024) Vol. 12, Iss. 1, pp. 175-175
Open Access

A Survey on Recent Intrusion Detection Systems in Cloud Environment
Belcaid Saad, Siham Aouad, Mostapha Zbakh
(2023), pp. 01-06
Closed Access | Times Cited: 1

Enhanced Intrusion Detection System using Pearson Correlation based Long Short-Term Memory
Rekha Phadke, Sudheer Kumar Katari, Muntather Almusawi, et al.
(2023), pp. 1-5
Closed Access

Page 1

Scroll to top