OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

An Ensemble of Prediction and Learning Mechanism for Improving Accuracy of Anomaly Detection in Network Intrusion Environments
Imran Imran, Faisal Jamil, Do‐Hyeun Kim
Sustainability (2021) Vol. 13, Iss. 18, pp. 10057-10057
Open Access | Times Cited: 56

Showing 1-25 of 56 citing articles:

An optimized ensemble prediction model using AutoML based on soft voting classifier for network intrusion detection
Murad Khan, Naeem Iqbal, Imran Imran, et al.
Journal of Network and Computer Applications (2022) Vol. 212, pp. 103560-103560
Closed Access | Times Cited: 69

HDLNIDS: Hybrid Deep-Learning-Based Network Intrusion Detection System
Emad Ul Haq Qazi, Muhammad Hamza Faheem, Tanveer Zia
Applied Sciences (2023) Vol. 13, Iss. 8, pp. 4921-4921
Open Access | Times Cited: 48

Intrusion Detection System
Amit Singh, Jay Prakash, Gaurav Kumar, et al.
Journal of Database Management (2024) Vol. 35, Iss. 1, pp. 1-25
Open Access | Times Cited: 15

A One-Dimensional Convolutional Neural Network (1D-CNN) Based Deep Learning System for Network Intrusion Detection
Emad Ul Haq Qazi, Abdulrazaq Almorjan, Tanveer Zia
Applied Sciences (2022) Vol. 12, Iss. 16, pp. 7986-7986
Open Access | Times Cited: 65

Performance of Machine Learning-Based Multi-Model Voting Ensemble Methods for Network Threat Detection in Agriculture 4.0
Νικόλαος Πεππές, Emmanouil Daskalakis, Theodoros Alexakis, et al.
Sensors (2021) Vol. 21, Iss. 22, pp. 7475-7475
Open Access | Times Cited: 58

Towards Secure and Intelligent Internet of Health Things: A Survey of Enabling Technologies and Applications
Umar Zaman, Imran Imran, Faisal Mehmood, et al.
Electronics (2022) Vol. 11, Iss. 12, pp. 1893-1893
Open Access | Times Cited: 48

Deep SARSA-based reinforcement learning approach for anomaly network intrusion detection system
Safa Mohamed, Ridha Ejbali
International Journal of Information Security (2022) Vol. 22, Iss. 1, pp. 235-247
Closed Access | Times Cited: 41

Anomaly Detection Method for Multivariate Time Series Data of Oil and Gas Stations Based on Digital Twin and MTAD-GAN
Yuanfeng Lian, Yueyao Geng, Tian Tian
Applied Sciences (2023) Vol. 13, Iss. 3, pp. 1891-1891
Open Access | Times Cited: 25

Combining Unsupervised Approaches for Near Real-Time Network Traffic Anomaly Detection
Francesco Carrera, Vincenzo Dentamaro, Stefano Galantucci, et al.
Applied Sciences (2022) Vol. 12, Iss. 3, pp. 1759-1759
Open Access | Times Cited: 28

Blockchain-Based Event Detection and Trust Verification Using Natural Language Processing and Machine Learning
Zeinab Shahbazi, Yung-Cheol Byun
IEEE Access (2021) Vol. 10, pp. 5790-5800
Open Access | Times Cited: 35

Machine Learning-Based Intrusion Detection System For Healthcare Data
Amit Kumar Balyan, Sachin Ahuja, Sanjeev Kumar Sharma, et al.
2020 IEEE VLSI DEVICE CIRCUIT AND SYSTEM (VLSI DCS) (2022), pp. 290-294
Closed Access | Times Cited: 21

RETRACTED ARTICLE: Securing health care data through blockchain enabled collaborative machine learning
C. U. Om Kumar, Sudhakaran Gajendran, Viswaksena Balaji, et al.
Soft Computing (2023) Vol. 27, Iss. 14, pp. 9941-9954
Open Access | Times Cited: 12

IoT Anomaly Detection to Strengthen Cybersecurity in the Critical Infrastructure of Smart Cities
William Villegas-Ch, Jaime Govea, Ángel Jaramillo-Alcázar
Applied Sciences (2023) Vol. 13, Iss. 19, pp. 10977-10977
Open Access | Times Cited: 10

A novel data-driven integrated detection method for network intrusion classification based on multi-feature imbalanced data
Chia‐Hung Wang, Qing Ye, J. Cai, et al.
Journal of Intelligent & Fuzzy Systems (2024) Vol. 46, Iss. 3, pp. 5893-5910
Closed Access | Times Cited: 3

Test Suite Prioritization Based on Optimization Approach Using Reinforcement Learning
Muhammad Waqar, Imran Imran, Muhammad Atif Zaman, et al.
Applied Sciences (2022) Vol. 12, Iss. 13, pp. 6772-6772
Open Access | Times Cited: 13

Network Anomaly Early Warning through Generalized Network Temperature and Deep Learning
Yufan Feng, Changda Wang
Journal of Network and Systems Management (2023) Vol. 31, Iss. 2
Closed Access | Times Cited: 7

Non-invasive coronary artery disease identification through the iris and bio-demographic health profile features using stacking learning
Ferdi Özbilgin, Çetin Kurnaz, Ertan Aydın
Image and Vision Computing (2024) Vol. 146, pp. 105046-105046
Closed Access | Times Cited: 2

A Novel IDS Based on Jaya Optimizer and Smote-ENN for Cyberattacks Detection
Fawzia Omer Albasheer, Raghavendra Ramesh Haibatti, Mayank Agarwal, et al.
IEEE Access (2024) Vol. 12, pp. 101506-101527
Open Access | Times Cited: 2

Deep Convolutional Neural Network for Active Intrusion Detection and Protect data from Passive Intrusion by Pascal Triangle
Abdulrahman Saad Alqahtani
Wireless Personal Communications (2024)
Closed Access | Times Cited: 1

Enhancing early attack detection: novel hybrid density-based isolation forest for improved anomaly detection
M. Nalini, B. Yamini, C. Ambhika, et al.
International Journal of Machine Learning and Cybernetics (2024)
Closed Access | Times Cited: 1

Machine Learning in Information and Communications Technology: A Survey
Ηλίας Δρίτσας, Μαρία Τρίγκα
Information (2024) Vol. 16, Iss. 1, pp. 8-8
Open Access | Times Cited: 1

Unsupervised and Ensemble-based Anomaly Detection Method for Network Security
Donghun Yang, Myunggwon Hwang
(2022), pp. 75-79
Closed Access | Times Cited: 7

Intrusion detection system using combination of deep residual fuzzy network and white shark-dwarf mongoose optimization
Meghana G Raj, Santosh Kumar Pani
Soft Computing (2023)
Closed Access | Times Cited: 3

Page 1 - Next Page

Scroll to top