
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Comparison of Machine Learning and Deep Learning Models for Network Intrusion Detection Systems
Niraj Thapa, Zhipeng Liu, Dukka B. KC, et al.
Future Internet (2020) Vol. 12, Iss. 10, pp. 167-167
Open Access | Times Cited: 68
Niraj Thapa, Zhipeng Liu, Dukka B. KC, et al.
Future Internet (2020) Vol. 12, Iss. 10, pp. 167-167
Open Access | Times Cited: 68
Showing 1-25 of 68 citing articles:
STL-HDL: A new hybrid network intrusion detection system for imbalanced dataset on big data environment
Samed Al, Murat Dener
Computers & Security (2021) Vol. 110, pp. 102435-102435
Closed Access | Times Cited: 105
Samed Al, Murat Dener
Computers & Security (2021) Vol. 110, pp. 102435-102435
Closed Access | Times Cited: 105
CSE-IDS: Using cost-sensitive deep learning and ensemble algorithms to handle class imbalance in network-based intrusion detection systems
Neha Gupta, Vinita Jindal, Punam Bedi
Computers & Security (2021) Vol. 112, pp. 102499-102499
Closed Access | Times Cited: 104
Neha Gupta, Vinita Jindal, Punam Bedi
Computers & Security (2021) Vol. 112, pp. 102499-102499
Closed Access | Times Cited: 104
Intrusion Detection System in the Advanced Metering Infrastructure: A Cross-Layer Feature-Fusion CNN-LSTM-Based Approach
Ruizhe Yao, Ning Wang, Zhihui Liu, et al.
Sensors (2021) Vol. 21, Iss. 2, pp. 626-626
Open Access | Times Cited: 103
Ruizhe Yao, Ning Wang, Zhihui Liu, et al.
Sensors (2021) Vol. 21, Iss. 2, pp. 626-626
Open Access | Times Cited: 103
Intrusion Detection System Using Feature Extraction with Machine Learning Algorithms in IoT
Dhiaa Musleh, Meera Alotaibi, Fahd Alhaidari, et al.
Journal of Sensor and Actuator Networks (2023) Vol. 12, Iss. 2, pp. 29-29
Open Access | Times Cited: 66
Dhiaa Musleh, Meera Alotaibi, Fahd Alhaidari, et al.
Journal of Sensor and Actuator Networks (2023) Vol. 12, Iss. 2, pp. 29-29
Open Access | Times Cited: 66
A vehicular network based intelligent transport system for smart cities using machine learning algorithms
J. Prakash, L. Murali, N. Manikandan, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 31
J. Prakash, L. Murali, N. Manikandan, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 31
Research Trends in Network-Based Intrusion Detection Systems: A Review
Satish Kumar, Sunanda Gupta, Sakshi Arora
IEEE Access (2021) Vol. 9, pp. 157761-157779
Open Access | Times Cited: 70
Satish Kumar, Sunanda Gupta, Sakshi Arora
IEEE Access (2021) Vol. 9, pp. 157761-157779
Open Access | Times Cited: 70
Refined LSTM Based Intrusion Detection for Denial-of-Service Attack in Internet of Things
Kuburat Oyeranti Adefemi Alimi, Khmaies Ouahada, Adnan M. Abu‐Mahfouz, et al.
Journal of Sensor and Actuator Networks (2022) Vol. 11, Iss. 3, pp. 32-32
Open Access | Times Cited: 46
Kuburat Oyeranti Adefemi Alimi, Khmaies Ouahada, Adnan M. Abu‐Mahfouz, et al.
Journal of Sensor and Actuator Networks (2022) Vol. 11, Iss. 3, pp. 32-32
Open Access | Times Cited: 46
The impact of artificial intelligence on organisational cyber security: An outcome of a systematic literature review
Irshaad Jada, Thembekile O. Mayayise
Data and Information Management (2023) Vol. 8, Iss. 2, pp. 100063-100063
Open Access | Times Cited: 33
Irshaad Jada, Thembekile O. Mayayise
Data and Information Management (2023) Vol. 8, Iss. 2, pp. 100063-100063
Open Access | Times Cited: 33
A Comparative Analysis of Supervised and Unsupervised Models for Detecting Attacks on the Intrusion Detection Systems
Tala Talaei Khoei, Naima Kaabouch
Information (2023) Vol. 14, Iss. 2, pp. 103-103
Open Access | Times Cited: 32
Tala Talaei Khoei, Naima Kaabouch
Information (2023) Vol. 14, Iss. 2, pp. 103-103
Open Access | Times Cited: 32
Intrusion Detection System Based on One-Class Support Vector Machine and Gaussian Mixture Model
Chao Wang, Yunxiao Sun, Sicai Lv, et al.
Electronics (2023) Vol. 12, Iss. 4, pp. 930-930
Open Access | Times Cited: 23
Chao Wang, Yunxiao Sun, Sicai Lv, et al.
Electronics (2023) Vol. 12, Iss. 4, pp. 930-930
Open Access | Times Cited: 23
FL-IDS: Federated Learning-Based Intrusion Detection System Using Edge Devices for Transportation IoT
Mansi Bhavsar, Yohannes B. Bekele, Kaushik Roy, et al.
IEEE Access (2024) Vol. 12, pp. 52215-52226
Open Access | Times Cited: 12
Mansi Bhavsar, Yohannes B. Bekele, Kaushik Roy, et al.
IEEE Access (2024) Vol. 12, pp. 52215-52226
Open Access | Times Cited: 12
Towards a Lightweight Intrusion Detection Framework for In-Vehicle Networks
Dheeraj Basavaraj, Shahab Tayeb
Journal of Sensor and Actuator Networks (2022) Vol. 11, Iss. 1, pp. 6-6
Open Access | Times Cited: 37
Dheeraj Basavaraj, Shahab Tayeb
Journal of Sensor and Actuator Networks (2022) Vol. 11, Iss. 1, pp. 6-6
Open Access | Times Cited: 37
Deep learning algorithms for intrusion detection systems in internet of things using CIC-IDS 2017 dataset
Jinsi Jose, Deepa Jose
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2022) Vol. 13, Iss. 1, pp. 1134-1134
Open Access | Times Cited: 36
Jinsi Jose, Deepa Jose
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2022) Vol. 13, Iss. 1, pp. 1134-1134
Open Access | Times Cited: 36
Using Embedded Feature Selection and CNN for Classification on CCD-INID-V1—A New IoT Dataset
Zhipeng Liu, Niraj Thapa, Addison Shaver, et al.
Sensors (2021) Vol. 21, Iss. 14, pp. 4834-4834
Open Access | Times Cited: 38
Zhipeng Liu, Niraj Thapa, Addison Shaver, et al.
Sensors (2021) Vol. 21, Iss. 14, pp. 4834-4834
Open Access | Times Cited: 38
Land Cover Mapping with Convolutional Neural Networks Using Sentinel-2 Images: Case Study of Rome
Giulia Cecili, Paolo De Fioravante, Pasquale Dichicco, et al.
Land (2023) Vol. 12, Iss. 4, pp. 879-879
Open Access | Times Cited: 15
Giulia Cecili, Paolo De Fioravante, Pasquale Dichicco, et al.
Land (2023) Vol. 12, Iss. 4, pp. 879-879
Open Access | Times Cited: 15
TLBS-IDS: A New Hybrid Network Intrusion Detection System for Imbalanced Dataset in a Higher Education Setting
Hanane Chliah, Maryem Ait El Hadj, Amal Battou, et al.
SN Computer Science (2025) Vol. 6, Iss. 2
Closed Access
Hanane Chliah, Maryem Ait El Hadj, Amal Battou, et al.
SN Computer Science (2025) Vol. 6, Iss. 2
Closed Access
Machine Learning Approaches for Effective Intrusion Detection Systems
Ling Hong, Saad Aslam, Anwar P. P. Abdul Majeed, et al.
Lecture notes in networks and systems (2025), pp. 410-419
Closed Access
Ling Hong, Saad Aslam, Anwar P. P. Abdul Majeed, et al.
Lecture notes in networks and systems (2025), pp. 410-419
Closed Access
A Semi-Supervised Deep Learning Approach for Intrusion Detection and Classification for the Internet of Things
G. Uthradevi, Priya Thiruvasagam, S. Mythili, et al.
Deleted Journal (2025)
Closed Access
G. Uthradevi, Priya Thiruvasagam, S. Mythili, et al.
Deleted Journal (2025)
Closed Access
Deep-Feature-Based Autoencoder Network for Few-Shot Malicious Traffic Detection
Mingshu He, Xiaojuan Wang, Junhua Zhou, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-13
Open Access | Times Cited: 32
Mingshu He, Xiaojuan Wang, Junhua Zhou, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-13
Open Access | Times Cited: 32
Education 4.0: Teaching the Basics of KNN, LDA and Simple Perceptron Algorithms for Binary Classification Problems
Diego Lopez-Bernal, David Balderas, Pedro Ponce, et al.
Future Internet (2021) Vol. 13, Iss. 8, pp. 193-193
Open Access | Times Cited: 29
Diego Lopez-Bernal, David Balderas, Pedro Ponce, et al.
Future Internet (2021) Vol. 13, Iss. 8, pp. 193-193
Open Access | Times Cited: 29
Comparison and Investigation of AI-Based Approaches for Cyberattack Detection in Cyber-Physical Systems
Mujaheed Abdullahi, Hitham Alhussian, Norshakirah Aziz, et al.
IEEE Access (2024) Vol. 12, pp. 31988-32004
Open Access | Times Cited: 4
Mujaheed Abdullahi, Hitham Alhussian, Norshakirah Aziz, et al.
IEEE Access (2024) Vol. 12, pp. 31988-32004
Open Access | Times Cited: 4
Modular deep learning-based network intrusion detection architecture for real-world cyber-attack simulation
Vladimir Ćirić, Marija Milosevic, Danijel R. Sokolovic, et al.
Simulation Modelling Practice and Theory (2024) Vol. 133, pp. 102916-102916
Closed Access | Times Cited: 3
Vladimir Ćirić, Marija Milosevic, Danijel R. Sokolovic, et al.
Simulation Modelling Practice and Theory (2024) Vol. 133, pp. 102916-102916
Closed Access | Times Cited: 3
Intelligent intrusion detection through deep autoencoder and stacked long short-term memory
Mehdi Moukhafi, Mouad Tantaoui, Idriss Chana, et al.
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2024) Vol. 14, Iss. 3, pp. 2908-2908
Open Access | Times Cited: 3
Mehdi Moukhafi, Mouad Tantaoui, Idriss Chana, et al.
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2024) Vol. 14, Iss. 3, pp. 2908-2908
Open Access | Times Cited: 3
Benchmarking Deep Learning Methods for Behaviour-Based Network Intrusion Detection
Mário Antunes, Luís Oliveira, Afonso Seguro, et al.
Informatics (2022) Vol. 9, Iss. 1, pp. 29-29
Open Access | Times Cited: 15
Mário Antunes, Luís Oliveira, Afonso Seguro, et al.
Informatics (2022) Vol. 9, Iss. 1, pp. 29-29
Open Access | Times Cited: 15
Establishing the Contaminating Effect of Metadata Feature Inclusion in Machine-Learned Network Intrusion Detection Models
Laurens D’hooge, Miel Verkerken, Bruno Volckaert, et al.
Lecture notes in computer science (2022), pp. 23-41
Closed Access | Times Cited: 15
Laurens D’hooge, Miel Verkerken, Bruno Volckaert, et al.
Lecture notes in computer science (2022), pp. 23-41
Closed Access | Times Cited: 15