
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Three-Branch Random Forest Intrusion Detection Model
Chunying Zhang, Wenjie Wang, Lu Liu, et al.
Mathematics (2022) Vol. 10, Iss. 23, pp. 4460-4460
Open Access | Times Cited: 13
Chunying Zhang, Wenjie Wang, Lu Liu, et al.
Mathematics (2022) Vol. 10, Iss. 23, pp. 4460-4460
Open Access | Times Cited: 13
Showing 13 citing articles:
Intrusion detection using a hybrid approach based on CatBoost and an enhanced inception V1
Lieqing Lin, Qi Zhong, Jiasheng Qiu, et al.
International Journal of Machine Learning and Cybernetics (2025)
Closed Access
Lieqing Lin, Qi Zhong, Jiasheng Qiu, et al.
International Journal of Machine Learning and Cybernetics (2025)
Closed Access
Modelo de Machine Learning para la Gestión de Amenazas con un SIEM de una Institución Financiera
Maikel Martin Arbona, Roberth Abel Alcivar
LATAM Revista Latinoamericana de Ciencias Sociales y Humanidades (2025) Vol. 6, Iss. 2
Closed Access
Maikel Martin Arbona, Roberth Abel Alcivar
LATAM Revista Latinoamericana de Ciencias Sociales y Humanidades (2025) Vol. 6, Iss. 2
Closed Access
An evolutionary computation-based machine learning for network attack detection in big data traffic
Yan Wang, Haifeng Zhang, Yongjun Wei, et al.
Applied Soft Computing (2023) Vol. 138, pp. 110184-110184
Closed Access | Times Cited: 10
Yan Wang, Haifeng Zhang, Yongjun Wei, et al.
Applied Soft Computing (2023) Vol. 138, pp. 110184-110184
Closed Access | Times Cited: 10
Network Intrusion Detection Based on Feature Image and Deformable Vision Transformer Classification
Kan He, Wei Zhang, Xuejun Zong, et al.
IEEE Access (2024) Vol. 12, pp. 44335-44350
Open Access | Times Cited: 3
Kan He, Wei Zhang, Xuejun Zong, et al.
IEEE Access (2024) Vol. 12, pp. 44335-44350
Open Access | Times Cited: 3
VAE-WACGAN: An Improved Data Augmentation Method Based on VAEGAN for Intrusion Detection
Wuxin Tian, Yanping Shen, Na Guo, et al.
Sensors (2024) Vol. 24, Iss. 18, pp. 6035-6035
Open Access | Times Cited: 2
Wuxin Tian, Yanping Shen, Na Guo, et al.
Sensors (2024) Vol. 24, Iss. 18, pp. 6035-6035
Open Access | Times Cited: 2
Lithium-Ion Battery State-of-Health Prediction for New-Energy Electric Vehicles Based on Random Forest Improved Model
Zijun Liang, Ruihan Wang, Xuejuan Zhan, et al.
Applied Sciences (2023) Vol. 13, Iss. 20, pp. 11407-11407
Open Access | Times Cited: 5
Zijun Liang, Ruihan Wang, Xuejuan Zhan, et al.
Applied Sciences (2023) Vol. 13, Iss. 20, pp. 11407-11407
Open Access | Times Cited: 5
Three-Way Selection Random Forest Optimization Model for Anomaly Traffic Detection
Chunying Zhang, Meng Zhang, Guanghui Yang, et al.
Electronics (2023) Vol. 12, Iss. 8, pp. 1788-1788
Open Access | Times Cited: 4
Chunying Zhang, Meng Zhang, Guanghui Yang, et al.
Electronics (2023) Vol. 12, Iss. 8, pp. 1788-1788
Open Access | Times Cited: 4
Decision Tree Models and Machine Learning Algorithms in the Fault Recognition on Power Lines with Branches
А. Л. Куликов, Anton Loskutov, D.I. Bezdushniy, et al.
Energies (2023) Vol. 16, Iss. 14, pp. 5563-5563
Open Access | Times Cited: 4
А. Л. Куликов, Anton Loskutov, D.I. Bezdushniy, et al.
Energies (2023) Vol. 16, Iss. 14, pp. 5563-5563
Open Access | Times Cited: 4
Sensitivity Evaluation of Enveloped and Non-enveloped Viruses to Ethanol Using Machine Learning: A Systematic Review
Aken Puti Wanguyun, Wakana Oishi, Daisuke Sano
Food and Environmental Virology (2023) Vol. 16, Iss. 1, pp. 1-13
Open Access | Times Cited: 4
Aken Puti Wanguyun, Wakana Oishi, Daisuke Sano
Food and Environmental Virology (2023) Vol. 16, Iss. 1, pp. 1-13
Open Access | Times Cited: 4
Optimizing Smart Home Intrusion Detection with Harmony-Enhanced Extra Trees
Akmalbek Abdusalomov, Dusmurod Kilichev, Rashid Nasimov, et al.
(2024)
Closed Access | Times Cited: 1
Akmalbek Abdusalomov, Dusmurod Kilichev, Rashid Nasimov, et al.
(2024)
Closed Access | Times Cited: 1
An Architecture of Enhanced Profiling Assurance for IoT Networks
Nut Aroon, Vicky Liu, Luke Kane, et al.
Electronics (2024) Vol. 13, Iss. 14, pp. 2832-2832
Open Access | Times Cited: 1
Nut Aroon, Vicky Liu, Luke Kane, et al.
Electronics (2024) Vol. 13, Iss. 14, pp. 2832-2832
Open Access | Times Cited: 1
Detection of DDOS Attacks in IIoT Case Using Machine Learning Algorithms
Miharu Idhan Fikriansyah, Siti Amatullah Karimah, Farisya Setiadi
(2024) Vol. 10, pp. 117-121
Closed Access | Times Cited: 1
Miharu Idhan Fikriansyah, Siti Amatullah Karimah, Farisya Setiadi
(2024) Vol. 10, pp. 117-121
Closed Access | Times Cited: 1
Selection of Potential Regions for the Creation of Intelligent Transportation Systems Based on the Machine Learning Algorithm Random Forest
Aleksey I. Shinkevich, T. V. Malysheva, Irina Ershova
Applied Sciences (2023) Vol. 13, Iss. 6, pp. 4024-4024
Open Access | Times Cited: 2
Aleksey I. Shinkevich, T. V. Malysheva, Irina Ershova
Applied Sciences (2023) Vol. 13, Iss. 6, pp. 4024-4024
Open Access | Times Cited: 2
SOINN Intrusion Detection Model Based on Three-Way Attribute Reduction
Jing Ren, Lu Liu, Haiduan Huang, et al.
Electronics (2023) Vol. 12, Iss. 24, pp. 5023-5023
Open Access
Jing Ren, Lu Liu, Haiduan Huang, et al.
Electronics (2023) Vol. 12, Iss. 24, pp. 5023-5023
Open Access