
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Efficient Intrusion Detection System in the Cloud Using Fusion Feature Selection Approaches and an Ensemble Classifier
Mhamad Bakro, Rakesh Ranjan Kumar, Amerah Alabrah, et al.
Electronics (2023) Vol. 12, Iss. 11, pp. 2427-2427
Open Access | Times Cited: 27
Mhamad Bakro, Rakesh Ranjan Kumar, Amerah Alabrah, et al.
Electronics (2023) Vol. 12, Iss. 11, pp. 2427-2427
Open Access | Times Cited: 27
Showing 1-25 of 27 citing articles:
An Improved Design for a Cloud Intrusion Detection System Using Hybrid Features Selection Approach With ML Classifier
Mhamad Bakro, Rakesh Ranjan Kumar, Amerah Alabrah, et al.
IEEE Access (2023) Vol. 11, pp. 64228-64247
Open Access | Times Cited: 30
Mhamad Bakro, Rakesh Ranjan Kumar, Amerah Alabrah, et al.
IEEE Access (2023) Vol. 11, pp. 64228-64247
Open Access | Times Cited: 30
Perspective Chapter: Intrusion Detection Systems in Cloud Environment
Waleed Almuseelem
IntechOpen eBooks (2025)
Closed Access
Waleed Almuseelem
IntechOpen eBooks (2025)
Closed Access
HIDS-RPL: A Hybrid Deep Learning-Based Intrusion Detection System for RPL in Internet of Medical Thing Networks
Abdelwahed Berguiga, Ahlem Harchay, Ayman Massaoudi
IEEE Access (2025) Vol. 13, pp. 38404-38429
Open Access
Abdelwahed Berguiga, Ahlem Harchay, Ayman Massaoudi
IEEE Access (2025) Vol. 13, pp. 38404-38429
Open Access
Enhanced cloud security: a novel intrusion detection system using ARSO algorithm and Bi-LSTM classifier
E. Silambarasan, Rajashree Suryawanshi, S. Reshma
International Journal of Information Technology (2024) Vol. 16, Iss. 6, pp. 3837-3845
Closed Access | Times Cited: 3
E. Silambarasan, Rajashree Suryawanshi, S. Reshma
International Journal of Information Technology (2024) Vol. 16, Iss. 6, pp. 3837-3845
Closed Access | Times Cited: 3
Network Security Enhanced with Deep Neural Network-Based Intrusion Detection System
Fatma S. Alrayes, Mohammed Zakariah, Syed Umar Amin, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 80, Iss. 1, pp. 1457-1490
Open Access | Times Cited: 3
Fatma S. Alrayes, Mohammed Zakariah, Syed Umar Amin, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 80, Iss. 1, pp. 1457-1490
Open Access | Times Cited: 3
An Efficient NIDPS with Improved Salp Swarm Feature Optimization Method
Amerah Alabrah
Applied Sciences (2023) Vol. 13, Iss. 12, pp. 7002-7002
Open Access | Times Cited: 7
Amerah Alabrah
Applied Sciences (2023) Vol. 13, Iss. 12, pp. 7002-7002
Open Access | Times Cited: 7
Machine learning-enhanced hybrid cryptography and image steganography algorithm for securing cloud data
G.P.C. Venkata Krishna, D. Vivekananda Reddy
Journal of Intelligent & Fuzzy Systems (2024) Vol. 46, Iss. 2, pp. 4657-4667
Closed Access | Times Cited: 2
G.P.C. Venkata Krishna, D. Vivekananda Reddy
Journal of Intelligent & Fuzzy Systems (2024) Vol. 46, Iss. 2, pp. 4657-4667
Closed Access | Times Cited: 2
Fractal feature selection model for enhancing high-dimensional biological problems
Ali Hakem Alsaeedi, Haider Hameed R. Al-Mahmood, Zainab fahad mhawes Al-naseri, et al.
BMC Bioinformatics (2024) Vol. 25, Iss. 1
Open Access | Times Cited: 2
Ali Hakem Alsaeedi, Haider Hameed R. Al-Mahmood, Zainab fahad mhawes Al-naseri, et al.
BMC Bioinformatics (2024) Vol. 25, Iss. 1
Open Access | Times Cited: 2
Using Machine Learning to Detect Cyber Attacks
R.Banu Prakash, Prof Rajeshwari K
International Journal of Research Publication and Reviews (2024) Vol. 5, Iss. 2, pp. 2793-2806
Open Access | Times Cited: 1
R.Banu Prakash, Prof Rajeshwari K
International Journal of Research Publication and Reviews (2024) Vol. 5, Iss. 2, pp. 2793-2806
Open Access | Times Cited: 1
Review Paper on Cloud Intrusion Detection System
Prof. R. G. Waghmare, Kaustubh M. Karale, Omkar A. Raut
International Journal of Advanced Research in Science Communication and Technology (2024), pp. 159-163
Open Access | Times Cited: 1
Prof. R. G. Waghmare, Kaustubh M. Karale, Omkar A. Raut
International Journal of Advanced Research in Science Communication and Technology (2024), pp. 159-163
Open Access | Times Cited: 1
Enhancing Firewall Packet Classification through Artificial Neural Networks and Synthetic Minority Over-Sampling Technique: An Innovative Approach with Evaluative Comparison
Adem Korkmaz, Selma Bulut, Tarık Talan, et al.
Applied Sciences (2024) Vol. 14, Iss. 16, pp. 7426-7426
Open Access | Times Cited: 1
Adem Korkmaz, Selma Bulut, Tarık Talan, et al.
Applied Sciences (2024) Vol. 14, Iss. 16, pp. 7426-7426
Open Access | Times Cited: 1
Enhancing Cybersecurity in Cloud Computing and WSNs: A Hybrid IDS Approach
K. Sundaramoorthy, K. E. Purushothaman, J. Jeba Sonia, et al.
Computers & Security (2024) Vol. 147, pp. 104081-104081
Closed Access
K. Sundaramoorthy, K. E. Purushothaman, J. Jeba Sonia, et al.
Computers & Security (2024) Vol. 147, pp. 104081-104081
Closed Access
Healthcare Intrusion Detection using Hybrid Correlation-based Feature Selection-Bat Optimization Algorithm with Convolutional Neural Network
H. Kanakadurga Bella, S. Vasundra
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 1
Open Access
H. Kanakadurga Bella, S. Vasundra
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 1
Open Access
A Comprehensive Survey: Exploring Current Trends and Challenges in Intrusion Detection and Prevention Systems in the Cloud Computing Paradigm
K. Prabu, P. Sudhakar
(2024), pp. 351-358
Closed Access
K. Prabu, P. Sudhakar
(2024), pp. 351-358
Closed Access
Cloud Intrusion Detection System
Prof. R. G. Waghmare, Kaustubh M. Karale, Omkar A. Raut
International Journal of Advanced Research in Science Communication and Technology (2024), pp. 150-155
Open Access
Prof. R. G. Waghmare, Kaustubh M. Karale, Omkar A. Raut
International Journal of Advanced Research in Science Communication and Technology (2024), pp. 150-155
Open Access
Using Triple Modular Redundancy for Threshold Determination in DDOS Intrusion Detection Systems
Aleksa Maksimović, Vojkan Nikolić, Dejan V. Vidojević, et al.
IEEE Access (2024) Vol. 12, pp. 53785-53804
Open Access
Aleksa Maksimović, Vojkan Nikolić, Dejan V. Vidojević, et al.
IEEE Access (2024) Vol. 12, pp. 53785-53804
Open Access
A bizarre synthesized cascaded optimized predictor (BizSCOP) model for enhancing security in cloud systems
R. Julian Menezes, P. Jesu Jayarin, A. Chandrasekar
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access
R. Julian Menezes, P. Jesu Jayarin, A. Chandrasekar
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access
Hybrid optimization based deep stacked autoencoder for routing and intrusion detection
Mythili Boopathi
Web Intelligence (2024), pp. 1-20
Closed Access
Mythili Boopathi
Web Intelligence (2024), pp. 1-20
Closed Access
IG-ANGO: a novel ensemble learning algorithm for breast cancer prediction using genomic data
M Shalini, S. Radhika
Evolving Systems (2024)
Closed Access
M Shalini, S. Radhika
Evolving Systems (2024)
Closed Access
A Comprehensive Survey of Intrusion Detection System Using Machine Learning and Deep Learning Approaches
Kotnur Abhiram, M. Hariharan, Sindhu Ravindran, et al.
2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS) (2024), pp. 1927-1932
Closed Access
Kotnur Abhiram, M. Hariharan, Sindhu Ravindran, et al.
2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS) (2024), pp. 1927-1932
Closed Access
S. Krishnaveni, S. Krishnaveni, B. Jothi, et al.
Concurrency and Computation Practice and Experience (2024)
Closed Access
Deep Learning to Mitigate Economic Denial of Sustainability (EDoS) Attacks: Cloud Computing
Husam Ibrahiem Husain Alsaadi, Maad Kamal Al-Anni, Fanar Emad Khazaal Al-Khuzaie
(2023), pp. 1-7
Closed Access | Times Cited: 1
Husam Ibrahiem Husain Alsaadi, Maad Kamal Al-Anni, Fanar Emad Khazaal Al-Khuzaie
(2023), pp. 1-7
Closed Access | Times Cited: 1
A Survey on Recent Intrusion Detection Systems in Cloud Environment
Belcaid Saad, Siham Aouad, Mostapha Zbakh
(2023), pp. 01-06
Closed Access | Times Cited: 1
Belcaid Saad, Siham Aouad, Mostapha Zbakh
(2023), pp. 01-06
Closed Access | Times Cited: 1
A Survey on Cyber Attack Detection: Techniques, Datasets, and Challenge
G. Geetha, R. Manjula, K Purna Chand
(2023), pp. 1-7
Closed Access | Times Cited: 1
G. Geetha, R. Manjula, K Purna Chand
(2023), pp. 1-7
Closed Access | Times Cited: 1
IP-MCCLSTM: A Network Intrusion Detection Model Based on IP Filtering
Feng Qin, Lin Zhang, Bing Liang
2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP) (2023) Vol. 4, pp. 1-6
Closed Access
Feng Qin, Lin Zhang, Bing Liang
2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP) (2023) Vol. 4, pp. 1-6
Closed Access