OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Advancing Network Security with AI: SVM-Based Deep Learning for Intrusion Detection
Khadija M. Abuali, Liyth Nissirat, Aida Al‐Samawi
Sensors (2023) Vol. 23, Iss. 21, pp. 8959-8959
Open Access | Times Cited: 13

Showing 13 citing articles:

ResInceptNet-SA: A Network Traffic Intrusion Detection Model Fusing Feature Selection and Balanced Datasets
Guorui Liu, Tianlin Zhang, Hualin Dai, et al.
Applied Sciences (2025) Vol. 15, Iss. 2, pp. 956-956
Open Access | Times Cited: 1

A comparative assessment of machine learning algorithms in the IoT-based network intrusion detection systems
Milan Samantaray, Ram Chandra Barik, Anil Kumar Biswal
Decision Analytics Journal (2024) Vol. 11, pp. 100478-100478
Open Access | Times Cited: 2

Artificial Intelligence in Cybersecurity: A Comprehensive Review and Future Direction
Lizzy Oluwatoyin Ofusori, Tebogo Bokaba, Siyabonga Mhlongo
Applied Artificial Intelligence (2024) Vol. 38, Iss. 1
Open Access | Times Cited: 1

An AI-Driven Based Cybersecurity System for Network Intrusion Detection System in Hybrid with EPO and CNNet-LAM
D. Anu Disney, R. Yugha, S.Bangaru Karachi, et al.
(2024), pp. 1397-1404
Closed Access | Times Cited: 1

An improved federated transfer learning model for intrusion detection in edge computing empowered wireless sensor networks
L. Raja, G. Sakthi, S. Vimalnath, et al.
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 24
Closed Access | Times Cited: 1

Improving Network Security with Gradient Boosting from KDD Cup Dataset
Devanshi Dwivedi, Aditya Bhushan, Ashutosh Kumar Singh, et al.
SN Computer Science (2024) Vol. 5, Iss. 7
Closed Access | Times Cited: 1

Enhancing iot network security through advanced data preprocessing and hybrid firefly-salp swarm optimized deep cnn-based intrusion detection
Bijili Jayan, G. Tamilarasi, B Binu
ITEGAM- Journal of Engineering and Technology for Industrial Applications (ITEGAM-JETIA) (2024) Vol. 10, Iss. 47
Open Access

Cybersecurity Using Hybrid Type Model for Classification Through SCO Optimization Technique
Jothi Prabha Appadurai, Lekshmi S Raveendran, R. Latha, et al.
(2024), pp. 1390-1396
Closed Access

Strengthening Cybersecurity using a Hybrid Classification Model with SCO Optimization for Enhanced Network Intrusion Detection System
Sanjaikanth E Vadakkethil Somanathan Pillai, Rohith Vallabhaneni, Piyush Kumar Pareek, et al.
(2024), pp. 1-9
Closed Access

Revolutionizing Threat Hunting in Communication Networks: Introducing a Cutting-Edge Large-Scale Multiclass Dataset
Qasem Abu Al‐Haija, Zaid Masoud, Assim Yasin, et al.
(2024), pp. 1-5
Closed Access

Organizational Readiness for Artificial Intelligence (AI) in Network Security
Benjamin Greene, Sharon L. Burton
Advances in human resources management and organizational development book series (2024), pp. 205-246
Closed Access

Predicting the Impact of Data Poisoning Attacks in Blockchain-Enabled Supply Chain Networks
Usman Javed Butt, Osama Akram Amin Metwally Hussien, Krison Hasanaj, et al.
Algorithms (2023) Vol. 16, Iss. 12, pp. 549-549
Open Access

Page 1

Scroll to top