
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Machine Learning Based Two-Stage Wi-Fi Network Intrusion Detection System
Abel A. Reyes, Francisco D. Vaca, Gabriel A. Castro Aguayo, et al.
Electronics (2020) Vol. 9, Iss. 10, pp. 1689-1689
Open Access | Times Cited: 34
Abel A. Reyes, Francisco D. Vaca, Gabriel A. Castro Aguayo, et al.
Electronics (2020) Vol. 9, Iss. 10, pp. 1689-1689
Open Access | Times Cited: 34
Showing 1-25 of 34 citing articles:
Explainable Artificial Intelligence in CyberSecurity: A Survey
Nicola Capuano, Giuseppe Fenza, Vincenzo Loia, et al.
IEEE Access (2022) Vol. 10, pp. 93575-93600
Open Access | Times Cited: 132
Nicola Capuano, Giuseppe Fenza, Vincenzo Loia, et al.
IEEE Access (2022) Vol. 10, pp. 93575-93600
Open Access | Times Cited: 132
An investigation of feature reduction, transferability, and generalization in AWID datasets for secure Wi-Fi networks
Nashmia Khalid, Sadaf Hina, Shabih Zaidi, et al.
PLoS ONE (2025) Vol. 20, Iss. 1, pp. e0306747-e0306747
Open Access | Times Cited: 1
Nashmia Khalid, Sadaf Hina, Shabih Zaidi, et al.
PLoS ONE (2025) Vol. 20, Iss. 1, pp. e0306747-e0306747
Open Access | Times Cited: 1
Empirical Evaluation of Attacks Against IEEE 802.11 Enterprise Networks: The AWID3 Dataset
Efstratios Chatzoglou, Georgios Kambourakis, Constantinos Kolias
IEEE Access (2021) Vol. 9, pp. 34188-34205
Open Access | Times Cited: 75
Efstratios Chatzoglou, Georgios Kambourakis, Constantinos Kolias
IEEE Access (2021) Vol. 9, pp. 34188-34205
Open Access | Times Cited: 75
SoK: Explainable Machine Learning for Computer Security Applications
Azqa Nadeem, Daniël Vos, Clinton Cao, et al.
(2023), pp. 221-240
Open Access | Times Cited: 27
Azqa Nadeem, Daniël Vos, Clinton Cao, et al.
(2023), pp. 221-240
Open Access | Times Cited: 27
Intrusion Detection System for Wireless Sensor Networks: A Machine Learning Based Approach
Halima Sadia, Saima Farhan, Yasin Ul Haq, et al.
IEEE Access (2024) Vol. 12, pp. 52565-52582
Open Access | Times Cited: 8
Halima Sadia, Saima Farhan, Yasin Ul Haq, et al.
IEEE Access (2024) Vol. 12, pp. 52565-52582
Open Access | Times Cited: 8
Pick Quality Over Quantity: Expert Feature Selection and Data Preprocessing for 802.11 Intrusion Detection Systems
Efstratios Chatzoglou, Georgios Kambourakis, Constantinos Kolias, et al.
IEEE Access (2022) Vol. 10, pp. 64761-64784
Open Access | Times Cited: 30
Efstratios Chatzoglou, Georgios Kambourakis, Constantinos Kolias, et al.
IEEE Access (2022) Vol. 10, pp. 64761-64784
Open Access | Times Cited: 30
Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges
Ziadoon Kamil Maseer, Qusay Kanaan Kadhim, Baidaa Al‐Bander, et al.
IET Networks (2024) Vol. 13, Iss. 5-6, pp. 339-376
Open Access | Times Cited: 6
Ziadoon Kamil Maseer, Qusay Kanaan Kadhim, Baidaa Al‐Bander, et al.
IET Networks (2024) Vol. 13, Iss. 5-6, pp. 339-376
Open Access | Times Cited: 6
Optimizing intrusion detection using intelligent feature selection with machine learning model
Nojood O. Aljehane, Hanan Abdullah Mengash, Siwar Ben Haj Hassine, et al.
Alexandria Engineering Journal (2024) Vol. 91, pp. 39-49
Open Access | Times Cited: 5
Nojood O. Aljehane, Hanan Abdullah Mengash, Siwar Ben Haj Hassine, et al.
Alexandria Engineering Journal (2024) Vol. 91, pp. 39-49
Open Access | Times Cited: 5
Explainable artificial intelligence models in intrusion detection systems
Samed Al, Şeref Sağıroğlu
Engineering Applications of Artificial Intelligence (2025) Vol. 144, pp. 110145-110145
Closed Access
Samed Al, Şeref Sağıroğlu
Engineering Applications of Artificial Intelligence (2025) Vol. 144, pp. 110145-110145
Closed Access
Rule-Based System with Machine Learning Support for Detecting Anomalies in 5G WLANs
Krzysztof Uszko, Maciej Kasprzyk, Marek Natkaniec, et al.
Electronics (2023) Vol. 12, Iss. 11, pp. 2355-2355
Open Access | Times Cited: 13
Krzysztof Uszko, Maciej Kasprzyk, Marek Natkaniec, et al.
Electronics (2023) Vol. 12, Iss. 11, pp. 2355-2355
Open Access | Times Cited: 13
Predicting Color Development and Texture Changes in Tomatoes Treated With Hot Water and Exposed to High‐Temperature Ethylene Using Support Vector Regression
G. Madasamy Raja, P. Selvaraju, P. Pathmanaban, et al.
Journal of Texture Studies (2025) Vol. 56, Iss. 1
Open Access
G. Madasamy Raja, P. Selvaraju, P. Pathmanaban, et al.
Journal of Texture Studies (2025) Vol. 56, Iss. 1
Open Access
Explainable AI Frameworks: Navigating the Present Challenges and Unveiling Innovative Applications
Neeraj Anand Sharma, Rishal Ravikesh Chand, Zain Buksh, et al.
Algorithms (2024) Vol. 17, Iss. 6, pp. 227-227
Open Access | Times Cited: 3
Neeraj Anand Sharma, Rishal Ravikesh Chand, Zain Buksh, et al.
Algorithms (2024) Vol. 17, Iss. 6, pp. 227-227
Open Access | Times Cited: 3
Explainable Artificial Intelligence in Cybersecurity: A Brief Review
Swetha Hariharan, Anusha Velicheti, A.S. Anagha, et al.
(2021), pp. 1-12
Closed Access | Times Cited: 20
Swetha Hariharan, Anusha Velicheti, A.S. Anagha, et al.
(2021), pp. 1-12
Closed Access | Times Cited: 20
Comparing Machine Learning Classifiers for Continuous Authentication on Mobile Devices by Keystroke Dynamics
Luis de‐Marcos, José-Javier Martínez-Herráiz, Javier Junquera-Sánchez, et al.
Electronics (2021) Vol. 10, Iss. 14, pp. 1622-1622
Open Access | Times Cited: 13
Luis de‐Marcos, José-Javier Martínez-Herráiz, Javier Junquera-Sánchez, et al.
Electronics (2021) Vol. 10, Iss. 14, pp. 1622-1622
Open Access | Times Cited: 13
An Efficient Deep Learning Approach To IoT Intrusion Detection
Jin Cao, Liwei Lin, Ruhui Ma, et al.
The Computer Journal (2022) Vol. 65, Iss. 11, pp. 2870-2879
Closed Access | Times Cited: 9
Jin Cao, Liwei Lin, Ruhui Ma, et al.
The Computer Journal (2022) Vol. 65, Iss. 11, pp. 2870-2879
Closed Access | Times Cited: 9
Advances in artificial intelligence for detecting algorithmically generated domains: Current trends and future prospects
Hamed Alqahtani, Gulshan Kumar
Engineering Applications of Artificial Intelligence (2024) Vol. 138, pp. 109410-109410
Closed Access | Times Cited: 1
Hamed Alqahtani, Gulshan Kumar
Engineering Applications of Artificial Intelligence (2024) Vol. 138, pp. 109410-109410
Closed Access | Times Cited: 1
RIDS: Real-time Intrusion Detection System for WPA3 enabled Enterprise Networks
Rahul Saini, Debajyoti Halder, Anand M. Baswade
GLOBECOM 2022 - 2022 IEEE Global Communications Conference (2022), pp. 43-48
Open Access | Times Cited: 7
Rahul Saini, Debajyoti Halder, Anand M. Baswade
GLOBECOM 2022 - 2022 IEEE Global Communications Conference (2022), pp. 43-48
Open Access | Times Cited: 7
Lightweight real-time WiFi-based intrusion detection system using LightGBM
Areeb Ahmed Bhutta, Mehr un Nisa, Adnan Noor Mian
Wireless Networks (2023) Vol. 30, Iss. 2, pp. 749-761
Closed Access | Times Cited: 4
Areeb Ahmed Bhutta, Mehr un Nisa, Adnan Noor Mian
Wireless Networks (2023) Vol. 30, Iss. 2, pp. 749-761
Closed Access | Times Cited: 4
Machine Learning and Fuzzy Logic in Electronics: Applying Intelligence in Practice
Malinka Ivanova, Petya Petkova, N. Petkov
Electronics (2021) Vol. 10, Iss. 22, pp. 2878-2878
Open Access | Times Cited: 7
Malinka Ivanova, Petya Petkova, N. Petkov
Electronics (2021) Vol. 10, Iss. 22, pp. 2878-2878
Open Access | Times Cited: 7
An Adversarial Approach for Intrusion Detection Using Hybrid Deep Learning Model
Md Asaduzzaman, Md. Mahbubur Rahman
(2022), pp. 18-23
Closed Access | Times Cited: 5
Md Asaduzzaman, Md. Mahbubur Rahman
(2022), pp. 18-23
Closed Access | Times Cited: 5
Network intrusion detection system using bacterial foraging optimization with random forest
Sudha Chikkalwar, Yugandhar Garapati
International Journal of Advanced Technology and Engineering Exploration (2023) Vol. 10, Iss. 105
Open Access | Times Cited: 2
Sudha Chikkalwar, Yugandhar Garapati
International Journal of Advanced Technology and Engineering Exploration (2023) Vol. 10, Iss. 105
Open Access | Times Cited: 2
Transfer and CNN-Based De-Authentication (Disassociation) DoS Attack Detection in IoT Wi-Fi Networks
Samson Kahsay Gebresilassie, Joseph Rafferty, Liming Chen, et al.
Electronics (2023) Vol. 12, Iss. 17, pp. 3731-3731
Open Access | Times Cited: 2
Samson Kahsay Gebresilassie, Joseph Rafferty, Liming Chen, et al.
Electronics (2023) Vol. 12, Iss. 17, pp. 3731-3731
Open Access | Times Cited: 2
Leveraging Explainable AI Methods Towards Identifying Classification Issues on IDS Datasets
Eric Lanfer, Sophia Sylvester, Nils Aschenbruck, et al.
(2023), pp. 1-4
Closed Access | Times Cited: 2
Eric Lanfer, Sophia Sylvester, Nils Aschenbruck, et al.
(2023), pp. 1-4
Closed Access | Times Cited: 2
Enhanced Cybersecurity for Network Intrusion Detection System Based Artificial Intelligence (AI) Techniques
Mani Gopalsamy
International Journal of Advanced Research in Science Communication and Technology (2021), pp. 671-681
Open Access | Times Cited: 5
Mani Gopalsamy
International Journal of Advanced Research in Science Communication and Technology (2021), pp. 671-681
Open Access | Times Cited: 5
A Novel Deep Neural Network Model for Computer Network Intrusion Detection Considering Connection Efficiency of Network Systems
Tuqian Zhang, Shumei Bao
2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT) (2022), pp. 962-965
Closed Access | Times Cited: 3
Tuqian Zhang, Shumei Bao
2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT) (2022), pp. 962-965
Closed Access | Times Cited: 3