OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Apache Spark and MLlib-Based Intrusion Detection System or How the Big Data Technologies Can Secure the Data
Otmane Azeroual, Anastasija Nikiforova
Information (2022) Vol. 13, Iss. 2, pp. 58-58
Open Access | Times Cited: 26

Showing 1-25 of 26 citing articles:

Incentive Mechanisms for Smart Grid: State of the Art, Challenges, Open Issues, Future Directions
Sweta Bhattacharya, Rajeswari Chengoden, Gautam Srivastava, et al.
Big Data and Cognitive Computing (2022) Vol. 6, Iss. 2, pp. 47-47
Open Access | Times Cited: 46

Development of effective ‘intrusion_detection_system’ by using hybrid-machine learning techniques on bigdata environment: A review
Shoshana Daniel, Varsha Jotwani
AIP conference proceedings (2025) Vol. 3280, pp. 020012-020012
Closed Access

Enhancing Cyber Threat Intelligence with AI and ML: An Ensembled Approach
Shreyas Dingankar, B. Maruthi Shankar, Aarti Kalnawat, et al.
Smart innovation, systems and technologies (2025), pp. 517-526
Closed Access

Spatiotemporal data partitioning for distributed random forest algorithm: Air quality prediction using imbalanced big spatiotemporal data on spark distributed framework
Marjan Asgari, Wanhong Yang, Mahdi Farnaghi
Environmental Technology & Innovation (2022) Vol. 27, pp. 102776-102776
Open Access | Times Cited: 21

Reducing the False Negative Rate in Deep Learning Based Network Intrusion Detection Systems
Jovana Mijalkovic, Angelo Spognardi
Algorithms (2022) Vol. 15, Iss. 8, pp. 258-258
Open Access | Times Cited: 20

Cost based Random Forest Classifier for Intrusion Detection System in Internet of Things
K. Pramilarani, P. Vasanthi Kumari
Applied Soft Computing (2023) Vol. 151, pp. 111125-111125
Closed Access | Times Cited: 10

An Intrusion Detection Method for Industrial Control System Based on Machine Learning
Yixin Cao, Lei Zhang, Xiaosong Zhao, et al.
Information (2022) Vol. 13, Iss. 7, pp. 322-322
Open Access | Times Cited: 11

Apache Spark in Healthcare: Advancing Data-Driven Innovations and Better Patient Care
Lalit Shrotriya, Kanhaiya Sharma, Deepak Parashar, et al.
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 6
Open Access | Times Cited: 6

Recommender System with Apache Spark
Ha Thi Thanh Nga, A. Nguyen Thi Thuy
Lecture notes in networks and systems (2024), pp. 487-497
Closed Access | Times Cited: 1

Money Laundering in the Age of Cybercrime and Emerging Technologies
José Salazar, María Jesús Segovia Vargas
IntechOpen eBooks (2024)
Open Access | Times Cited: 1

Machine learning based data collection protocol for intelligent transport systems: a real-time implementation on Dublin M50, Ireland
Maryam Gillani, Hafiz Adnan Niaz
Complex & Intelligent Systems (2023) Vol. 10, Iss. 2, pp. 1879-1897
Open Access | Times Cited: 4

Anomaly Detection Approach in Industrial Control Systems Based on Measurement Data
Xiaosong Zhao, Lei Zhang, Yixin Cao, et al.
Information (2022) Vol. 13, Iss. 10, pp. 450-450
Open Access | Times Cited: 7

NoSQL Security: Can My Data-driven Decision-making Be Influenced from Outside?
Anastasija Nikiforova, Artjoms Daskevics, Otmane Azeroual
Emerald Publishing Limited eBooks (2023), pp. 59-73
Open Access | Times Cited: 3

Fuzzy Local Information and Bhattacharya-Based C-Means Clustering and Optimized Deep Learning in Spark Framework for Intrusion Detection
Brunel Elvire Bouya-Moko, Edward Kwadwo Boahen, Changda Wang
Electronics (2022) Vol. 11, Iss. 11, pp. 1675-1675
Open Access | Times Cited: 3

Deployment of Honeypot and SIEM Tools for Cyber Security Education Model In UITM
Muhammad Azizi Mohd Ariffin, Mohamed Yusof Darus, Haryani Haron, et al.
International Journal of Emerging Technologies in Learning (iJET) (2022) Vol. 17, Iss. 20, pp. 149-172
Open Access | Times Cited: 3

Application research of credit fraud detection based on distributed rotation deep forest
Hongwei Chen, Dewei Shi, Xun Zhou, et al.
Intelligent Data Analysis (2024) Vol. 28, Iss. 4, pp. 1067-1091
Closed Access

Victimization (V) of Big Data: A Solution Using Federated Learning
S. Shivkumar, M. H. Supriya
Lecture notes in networks and systems (2024), pp. 171-182
Closed Access

An Exploratory Study of Vulnerabilities in Big Data Systems
Nikolas Tyllis, Faheem Ullah, Muhammad Uzair
2021 IEEE International Conference on Big Data (Big Data) (2023), pp. 1360-1367
Closed Access | Times Cited: 1

From Pixels to Insights: Image Datasets for AI/ML in Software-Defined Networking
Pranav Pant, Rishikant Mallick, Santosh Kumar Sahu, et al.
(2023), pp. 903-908
Closed Access | Times Cited: 1

Enhancing the Intrusion Detection Efficiency using a Partitioning-based Recursive Feature Elimination in Big Cloud Environment
Hesham Elmasry, Ayman E. Khedr, Hatem Abdelkader
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 1
Open Access | Times Cited: 1

Apache Spark Big data Analysis, Performance Tuning, and Spark Application Optimization
Chaganti Sri Karthikeya Sahith, Satish Muppidi, Suneetha Merugula
(2023), pp. 1-8
Closed Access | Times Cited: 1

Frameworks, Applications and Challenges in Streaming Big Data Analytics: A Review
Syed Muhammd Nabeel Mustafa, Muhammad Umer Farooque, Muhammad Tahir, et al.
(2022), pp. 1-6
Closed Access | Times Cited: 2

Identifying similar sentences when processed by Apache Spark
R S V Mukhesh, Aashnna Soni
(2022), pp. 504-510
Closed Access | Times Cited: 1

Hybrid Machine Learning-Based Approach for Anomaly Detection using Apache Spark
Hanane Chliah, Amal Battou, Maryem Ait El Hadj, et al.
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 4
Open Access

AI for Cybersecurity: Robust models for Authentication, Threat and Anomaly Detection
Francesco Bergadano, Giorgio Giacinto, Olga Tushkanova, et al.
MDPI eBooks (2023)
Open Access

Page 1 - Next Page

Scroll to top