OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Ensemble Classifiers for Network Intrusion Detection Using a Novel Network Attack Dataset
Ahmed Mahfouz, Abdullah Abuhussein, Deepak Venugopal, et al.
Future Internet (2020) Vol. 12, Iss. 11, pp. 180-180
Open Access | Times Cited: 78

Showing 1-25 of 78 citing articles:

Cyber risk and cybersecurity: a systematic review of data availability
Frank Cremer, Barry Sheehan, Michael Fortmann, et al.
The Geneva Papers on Risk and Insurance Issues and Practice (2022) Vol. 47, Iss. 3, pp. 698-736
Open Access | Times Cited: 183

A tree-based stacking ensemble technique with feature selection for network intrusion detection
Md. Mamunur Rashid, Joarder Kamruzzaman, Tasadduq Imam, et al.
Applied Intelligence (2022) Vol. 52, Iss. 9, pp. 9768-9781
Open Access | Times Cited: 106

Distributed denial of service attack prediction: Challenges, open issues and opportunities
Anderson B. de Neira, Burak Kantarcı, Michele Nogueira
Computer Networks (2023) Vol. 222, pp. 109553-109553
Closed Access | Times Cited: 67

A deep learning-based novel hybrid CNN-LSTM architecture for efficient detection of threats in the IoT ecosystem
Ahsan Nazir, Jingsha He, Nafei Zhu, et al.
Ain Shams Engineering Journal (2024) Vol. 15, Iss. 7, pp. 102777-102777
Open Access | Times Cited: 19

Feature Selection and Ensemble-Based Intrusion Detection System: An Efficient and Comprehensive Approach
Ebrima Jaw, Xueming Wang
Symmetry (2021) Vol. 13, Iss. 10, pp. 1764-1764
Open Access | Times Cited: 66

Anomaly detection for fault detection in wireless community networks using machine learning
Llorenç Cerdà‐Alabern, Gabriel Iuhasz, Gabriele Gemmi
Computer Communications (2023) Vol. 202, pp. 191-203
Open Access | Times Cited: 19

Using Deep Learning Networks to Identify Cyber Attacks on Intrusion Detection for In-Vehicle Networks
Hsiao-Chung Lin, Ping Wang, Kuo‐Ming Chao, et al.
Electronics (2022) Vol. 11, Iss. 14, pp. 2180-2180
Open Access | Times Cited: 27

SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection
Giovanni Apruzzese, Pavel Laskov, Johannes Schneider
(2023), pp. 592-614
Open Access | Times Cited: 13

Intrusion Detection System Using Stacked Ensemble Learning with Light Gradient Boosting Machine and Decision Tree
Anil Kumar Dasari, Saroj Kr. Biswas, Barnana Baruah, et al.
Lecture notes in networks and systems (2025), pp. 291-303
Closed Access

Fuzzy-Rule Based Optimized Hybrid Deep Learning Model for Network Intrusion Detection in SDN Enabled IoT Network
T Johnpeter, K. Sakthisudhan
Computers & Security (2025), pp. 104372-104372
Closed Access

Securing Networks: A Voting Classifier Approach for Cyberattack Detection
T. Sri Lakshmi, V. A. Narayana, Siva Skandha Sanagala
Lecture notes in networks and systems (2025), pp. 259-270
Closed Access

An Aggregated Mutual Information Based Feature Selection with Machine Learning Methods for Enhancing IoT Botnet Attack Detection
Mohammed Al-Sarem, Faisal Saeed, Eman H. Alkhammash, et al.
Sensors (2021) Vol. 22, Iss. 1, pp. 185-185
Open Access | Times Cited: 30

Intrusion Detection Systems Using Support Vector Machines on the KDDCUP’99 and NSL-KDD Datasets: A Comprehensive Survey
Mikel K. Ngueajio, Gloria Washington, Danda B. Rawat, et al.
Lecture notes in networks and systems (2022), pp. 609-629
Closed Access | Times Cited: 20

Detection and mitigation of field flooding attacks on oil and gas critical infrastructure communication
Abubakar Sadiq Mohammed, Eirini Anthi, Omer Rana, et al.
Computers & Security (2022) Vol. 124, pp. 103007-103007
Open Access | Times Cited: 20

Unsupervised network traffic anomaly detection with deep autoencoders
Vibekananda Dutta, Marek Pawlicki, Rafał Kozik, et al.
Logic Journal of IGPL (2022) Vol. 30, Iss. 6, pp. 912-925
Closed Access | Times Cited: 19

A Novel Deep Hierarchical Machine Learning Approach for Identification of Known and Unknown Multiple Security Attacks in a D2D Communications Network
S. V. Jansi Rani, Iacovos Ioannou, Prabagarane Nagaradjane, et al.
IEEE Access (2023) Vol. 11, pp. 95161-95194
Open Access | Times Cited: 9

A Two-Level Ensemble Learning Framework for Enhancing Network Intrusion Detection Systems
Osvaldo Arreche, Ismail Bibers, Mustafa Abdallah
IEEE Access (2024) Vol. 12, pp. 83830-83857
Closed Access | Times Cited: 3

DDoS Attack Detection in Cloud Computing Based on Ensemble Feature Selection and Deep Learning
Yousef Sanjalawe, Turke Althobaiti
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 75, Iss. 2, pp. 3571-3588
Open Access | Times Cited: 8

An adaptive method and a new dataset, UKM-IDS20, for the network intrusion detection system
Muataz Salam Al-Daweri, Salwani Abdullah, Khairul Akram Zainol Ariffin
Computer Communications (2021) Vol. 180, pp. 57-76
Closed Access | Times Cited: 18

Tachyon: Enhancing stacked models using Bayesian optimization for intrusion detection using different sampling approaches
T. Anitha Kumari, Sanket Mishra
Egyptian Informatics Journal (2024) Vol. 27, pp. 100520-100520
Open Access | Times Cited: 2

A novel hybrid-based approach of snort automatic rule generator and security event correlation (SARG-SEC)
Ebrima Jaw, Xueming Wang
PeerJ Computer Science (2022) Vol. 8, pp. e900-e900
Open Access | Times Cited: 11

An optimal feature based network intrusion detection system using bagging ensemble method for real-time traffic analysis
Ratul Chowdhury, Shibaprasad Sen, Arindam Roy, et al.
Multimedia Tools and Applications (2022) Vol. 81, Iss. 28, pp. 41225-41247
Closed Access | Times Cited: 11

Systemic Acquired Critique of Credit Card Deception Exposure through Machine Learning
Rui Miguel Dantas, Raheela Firdaus, Farrokh Jaleel, et al.
Journal of Open Innovation Technology Market and Complexity (2022) Vol. 8, Iss. 4, pp. 192-192
Open Access | Times Cited: 11

Ensemble-based Intrusion Detection for Internet of Things Devices
Priscilla Kyei Danso, Euclides Carlos Pinto Neto, Sajjad Dadkhah, et al.
(2022), pp. 034-039
Closed Access | Times Cited: 11

MuDeLA: multi-level deep learning approach for intrusion detection systems
Wathiq Laftah Al-Yaseen, Ali Kadhum Idrees
International Journal of Computers and Applications (2023) Vol. 45, Iss. 12, pp. 755-763
Closed Access | Times Cited: 6

Page 1 - Next Page

Scroll to top