OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Efficient Intrusion Detection System in the Cloud Using Fusion Feature Selection Approaches and an Ensemble Classifier
Mhamad Bakro, Rakesh Ranjan Kumar, Amerah Alabrah, et al.
Electronics (2023) Vol. 12, Iss. 11, pp. 2427-2427
Open Access | Times Cited: 27

Showing 1-25 of 27 citing articles:

An Improved Design for a Cloud Intrusion Detection System Using Hybrid Features Selection Approach With ML Classifier
Mhamad Bakro, Rakesh Ranjan Kumar, Amerah Alabrah, et al.
IEEE Access (2023) Vol. 11, pp. 64228-64247
Open Access | Times Cited: 30

Perspective Chapter: Intrusion Detection Systems in Cloud Environment
Waleed Almuseelem
IntechOpen eBooks (2025)
Closed Access

HIDS-RPL: A Hybrid Deep Learning-Based Intrusion Detection System for RPL in Internet of Medical Thing Networks
Abdelwahed Berguiga, Ahlem Harchay, Ayman Massaoudi
IEEE Access (2025) Vol. 13, pp. 38404-38429
Open Access

Enhanced cloud security: a novel intrusion detection system using ARSO algorithm and Bi-LSTM classifier
E. Silambarasan, Rajashree Suryawanshi, S. Reshma
International Journal of Information Technology (2024) Vol. 16, Iss. 6, pp. 3837-3845
Closed Access | Times Cited: 3

Network Security Enhanced with Deep Neural Network-Based Intrusion Detection System
Fatma S. Alrayes, Mohammed Zakariah, Syed Umar Amin, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 80, Iss. 1, pp. 1457-1490
Open Access | Times Cited: 3

An Efficient NIDPS with Improved Salp Swarm Feature Optimization Method
Amerah Alabrah
Applied Sciences (2023) Vol. 13, Iss. 12, pp. 7002-7002
Open Access | Times Cited: 7

Machine learning-enhanced hybrid cryptography and image steganography algorithm for securing cloud data
G.P.C. Venkata Krishna, D. Vivekananda Reddy
Journal of Intelligent & Fuzzy Systems (2024) Vol. 46, Iss. 2, pp. 4657-4667
Closed Access | Times Cited: 2

Fractal feature selection model for enhancing high-dimensional biological problems
Ali Hakem Alsaeedi, Haider Hameed R. Al-Mahmood, Zainab fahad mhawes Al-naseri, et al.
BMC Bioinformatics (2024) Vol. 25, Iss. 1
Open Access | Times Cited: 2

Using Machine Learning to Detect Cyber Attacks
R.Banu Prakash, Prof Rajeshwari K
International Journal of Research Publication and Reviews (2024) Vol. 5, Iss. 2, pp. 2793-2806
Open Access | Times Cited: 1

Review Paper on Cloud Intrusion Detection System
Prof. R. G. Waghmare, Kaustubh M. Karale, Omkar A. Raut
International Journal of Advanced Research in Science Communication and Technology (2024), pp. 159-163
Open Access | Times Cited: 1

Enhancing Cybersecurity in Cloud Computing and WSNs: A Hybrid IDS Approach
K. Sundaramoorthy, K. E. Purushothaman, J. Jeba Sonia, et al.
Computers & Security (2024) Vol. 147, pp. 104081-104081
Closed Access

Healthcare Intrusion Detection using Hybrid Correlation-based Feature Selection-Bat Optimization Algorithm with Convolutional Neural Network
H. Kanakadurga Bella, S. Vasundra
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 1
Open Access

Cloud Intrusion Detection System
Prof. R. G. Waghmare, Kaustubh M. Karale, Omkar A. Raut
International Journal of Advanced Research in Science Communication and Technology (2024), pp. 150-155
Open Access

Using Triple Modular Redundancy for Threshold Determination in DDOS Intrusion Detection Systems
Aleksa Maksimović, Vojkan Nikolić, Dejan V. Vidojević, et al.
IEEE Access (2024) Vol. 12, pp. 53785-53804
Open Access

A bizarre synthesized cascaded optimized predictor (BizSCOP) model for enhancing security in cloud systems
R. Julian Menezes, P. Jesu Jayarin, A. Chandrasekar
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access

Hybrid optimization based deep stacked autoencoder for routing and intrusion detection
Mythili Boopathi
Web Intelligence (2024), pp. 1-20
Closed Access

A Comprehensive Survey of Intrusion Detection System Using Machine Learning and Deep Learning Approaches
Kotnur Abhiram, M. Hariharan, Sindhu Ravindran, et al.
2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS) (2024), pp. 1927-1932
Closed Access

TwinSecIDS: An Enhanced Intrusion Detection System in SDN‐Digital‐Twin‐Based Industrial Cyber‐Physical Systems
S. Krishnaveni, S. Krishnaveni, B. Jothi, et al.
Concurrency and Computation Practice and Experience (2024)
Closed Access

Deep Learning to Mitigate Economic Denial of Sustainability (EDoS) Attacks: Cloud Computing
Husam Ibrahiem Husain Alsaadi, Maad Kamal Al-Anni, Fanar Emad Khazaal Al-Khuzaie
(2023), pp. 1-7
Closed Access | Times Cited: 1

A Survey on Recent Intrusion Detection Systems in Cloud Environment
Belcaid Saad, Siham Aouad, Mostapha Zbakh
(2023), pp. 01-06
Closed Access | Times Cited: 1

A Survey on Cyber Attack Detection: Techniques, Datasets, and Challenge
G. Geetha, R. Manjula, K Purna Chand
(2023), pp. 1-7
Closed Access | Times Cited: 1

IP-MCCLSTM: A Network Intrusion Detection Model Based on IP Filtering
Feng Qin, Lin Zhang, Bing Liang
2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP) (2023) Vol. 4, pp. 1-6
Closed Access

Page 1 - Next Page

Scroll to top