
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
On evaluation of Network Intrusion Detection Systems: Statistical analysis of CIDDS-001 dataset using Machine Learning Techniques
Abhishek Verma, Virender Ranga
(2019)
Open Access | Times Cited: 24
Abhishek Verma, Virender Ranga
(2019)
Open Access | Times Cited: 24
Showing 24 citing articles:
Machine Learning Based Intrusion Detection Systems for IoT Applications
Abhishek Verma, Virender Ranga
Wireless Personal Communications (2019) Vol. 111, Iss. 4, pp. 2287-2310
Open Access | Times Cited: 295
Abhishek Verma, Virender Ranga
Wireless Personal Communications (2019) Vol. 111, Iss. 4, pp. 2287-2310
Open Access | Times Cited: 295
Benchmarking of Machine Learning for Anomaly Based Intrusion Detection Systems in the CICIDS2017 Dataset
Ziadoon Kamil Maseer, Robiah Yusof, Nazrulazhar Bahaman, et al.
IEEE Access (2021) Vol. 9, pp. 22351-22370
Open Access | Times Cited: 278
Ziadoon Kamil Maseer, Robiah Yusof, Nazrulazhar Bahaman, et al.
IEEE Access (2021) Vol. 9, pp. 22351-22370
Open Access | Times Cited: 278
DeepIoT.IDS: Hybrid Deep Learning for Enhancing IoT Network Intrusion Detection
Ziadoon Kamil Maseer, Robiah Yusof, Salama A. Mostafa, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2021) Vol. 69, Iss. 3, pp. 3945-3966
Open Access | Times Cited: 56
Ziadoon Kamil Maseer, Robiah Yusof, Salama A. Mostafa, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2021) Vol. 69, Iss. 3, pp. 3945-3966
Open Access | Times Cited: 56
An Adaptive Protection of Flooding Attacks Model for Complex Network Environments
Bashar Ahmad Khalaf, Salama A. Mostafa, Aida Mustapha, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-17
Open Access | Times Cited: 47
Bashar Ahmad Khalaf, Salama A. Mostafa, Aida Mustapha, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-17
Open Access | Times Cited: 47
Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection Using Progressive Dataset
Tuan-Hong Chua, Iftekhar Salam
Symmetry (2023) Vol. 15, Iss. 6, pp. 1251-1251
Open Access | Times Cited: 17
Tuan-Hong Chua, Iftekhar Salam
Symmetry (2023) Vol. 15, Iss. 6, pp. 1251-1251
Open Access | Times Cited: 17
An Intrusion Detection System Using a Machine Learning Approach in IOT-based Smart Cities
Lil oja, Dr.P. Ranjana
Journal of Internet Services and Information Security (2023) Vol. 13, Iss. 1, pp. 11-21
Open Access | Times Cited: 16
Lil oja, Dr.P. Ranjana
Journal of Internet Services and Information Security (2023) Vol. 13, Iss. 1, pp. 11-21
Open Access | Times Cited: 16
Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges
Ziadoon Kamil Maseer, Qusay Kanaan Kadhim, Baidaa Al‐Bander, et al.
IET Networks (2024) Vol. 13, Iss. 5-6, pp. 339-376
Open Access | Times Cited: 6
Ziadoon Kamil Maseer, Qusay Kanaan Kadhim, Baidaa Al‐Bander, et al.
IET Networks (2024) Vol. 13, Iss. 5-6, pp. 339-376
Open Access | Times Cited: 6
Intrusion Detection System with Customized Machine Learning Techniques for NSL-KDD Dataset
Mohammed Zakariah, Salman A. AlQahtani, Abdulaziz M. Alawwad, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 77, Iss. 3, pp. 4025-4054
Open Access | Times Cited: 13
Mohammed Zakariah, Salman A. AlQahtani, Abdulaziz M. Alawwad, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 77, Iss. 3, pp. 4025-4054
Open Access | Times Cited: 13
Predictive Analysis of Network based Attacks by Hybrid Machine Learning Algorithms utilizing Bayesian Optimization, Logistic Regression and Random Forest Algorithm
Manisankar Sannigrahi, R. Thandeeswaran
IEEE Access (2024) Vol. 12, pp. 142721-142732
Open Access | Times Cited: 3
Manisankar Sannigrahi, R. Thandeeswaran
IEEE Access (2024) Vol. 12, pp. 142721-142732
Open Access | Times Cited: 3
Voting‐based intrusion detection framework for securing software‐defined networks
Rochak Swami, Mayank Dave, Virender Ranga
Concurrency and Computation Practice and Experience (2020) Vol. 32, Iss. 24
Open Access | Times Cited: 30
Rochak Swami, Mayank Dave, Virender Ranga
Concurrency and Computation Practice and Experience (2020) Vol. 32, Iss. 24
Open Access | Times Cited: 30
A GBDT-Paralleled Quadratic Ensemble Learning for Intrusion Detection System
Jun Yang, Yiqiang Sheng, Jinlin Wang
IEEE Access (2020) Vol. 8, pp. 175467-175482
Open Access | Times Cited: 30
Jun Yang, Yiqiang Sheng, Jinlin Wang
IEEE Access (2020) Vol. 8, pp. 175467-175482
Open Access | Times Cited: 30
CSO-DQN: Circle Search Optimization-based Deep Q-Learning Network for Intrusion Detection System in Cloud Environment
A. Pravin, T. Prem Jacob, R. Raja Kumar
IETE Journal of Research (2024) Vol. 70, Iss. 9, pp. 7469-7483
Closed Access | Times Cited: 2
A. Pravin, T. Prem Jacob, R. Raja Kumar
IETE Journal of Research (2024) Vol. 70, Iss. 9, pp. 7469-7483
Closed Access | Times Cited: 2
Ensemble Feature Selection for Improving Intrusion Detection Classification Accuracy
Wenhao He, Hongjiao Li, Jinguo Li
(2019), pp. 28-33
Closed Access | Times Cited: 15
Wenhao He, Hongjiao Li, Jinguo Li
(2019), pp. 28-33
Closed Access | Times Cited: 15
Detection of DDOS Attacks in IIoT Case Using Machine Learning Algorithms
Miharu Idhan Fikriansyah, Siti Amatullah Karimah, Farisya Setiadi
(2024) Vol. 10, pp. 117-121
Closed Access | Times Cited: 1
Miharu Idhan Fikriansyah, Siti Amatullah Karimah, Farisya Setiadi
(2024) Vol. 10, pp. 117-121
Closed Access | Times Cited: 1
Improving Intrusion Detection System using Artificial Neural Network
Marwan Ali Albahar, Muhammad Binsawad, Jameel Almalki, et al.
International Journal of Advanced Computer Science and Applications (2020) Vol. 11, Iss. 6
Open Access | Times Cited: 10
Marwan Ali Albahar, Muhammad Binsawad, Jameel Almalki, et al.
International Journal of Advanced Computer Science and Applications (2020) Vol. 11, Iss. 6
Open Access | Times Cited: 10
Ensemble Methods Classifier Comparison for Anomaly Based Intrusion Detection System on CIDDS-002 Dataset
Ainurrochman, Arianto Nugroho, Raditia Wahyuwidayat, et al.
(2021), pp. 62-67
Closed Access | Times Cited: 7
Ainurrochman, Arianto Nugroho, Raditia Wahyuwidayat, et al.
(2021), pp. 62-67
Closed Access | Times Cited: 7
An efficient cyber‐physical system using hybridized enhanced support‐vector machine with Ada‐Boost classification algorithm
Durgesh M. Sharma, Shishir Kumar Shandilya
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 21
Closed Access | Times Cited: 4
Durgesh M. Sharma, Shishir Kumar Shandilya
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 21
Closed Access | Times Cited: 4
Multi pattern matching algorithm for embedded computer network engineering intrusion detection system
Yingying Cai
Intelligent Decision Technologies (2024) Vol. 18, Iss. 2, pp. 705-716
Closed Access
Yingying Cai
Intelligent Decision Technologies (2024) Vol. 18, Iss. 2, pp. 705-716
Closed Access
Internet of Things (IoT) Technologies With Intrusion Detection Systems in Deep Learning
Nancy Jasmine Goldena, R. Rashia SubaShree
Advances in information security, privacy, and ethics book series (2024), pp. 143-165
Closed Access
Nancy Jasmine Goldena, R. Rashia SubaShree
Advances in information security, privacy, and ethics book series (2024), pp. 143-165
Closed Access
Voting based Intrusion Detection Framework for Securing Software-Defined Networks
Rochak Swami, Mayank Dave, Virender Ranga
(2020)
Open Access | Times Cited: 3
Rochak Swami, Mayank Dave, Virender Ranga
(2020)
Open Access | Times Cited: 3
Dataset Selection for Attacker Group Identification Methods
A.V. Pavlov, Natalia Voloshina
(2021)
Closed Access | Times Cited: 3
A.V. Pavlov, Natalia Voloshina
(2021)
Closed Access | Times Cited: 3
Voting based Intrusion Detection Framework for Securing Software-Defined Networks
Rochak Swami, Mayank Dave, Virender Ranga
(2020)
Open Access | Times Cited: 1
Rochak Swami, Mayank Dave, Virender Ranga
(2020)
Open Access | Times Cited: 1
Intrusion Detection in Internet of Things using Machine Learning Classifiers
Shweta Bhardwaj, Praveen Kumar, Hima Bindu Maringanti
2021 International Conference on Technological Advancements and Innovations (ICTAI) (2021), pp. 571-575
Closed Access | Times Cited: 1
Shweta Bhardwaj, Praveen Kumar, Hima Bindu Maringanti
2021 International Conference on Technological Advancements and Innovations (ICTAI) (2021), pp. 571-575
Closed Access | Times Cited: 1
DETECTION OF NETWORK INTRUSIONS USING MACHINE LEARNING ALGORITHMS AND FUZZY LOGIC
Yevhen Chychkarov, O. Zinchenko, A. P. Bondarchuk, et al.
Cybersecurity Education Science Technique (2023), pp. 209-225
Open Access
Yevhen Chychkarov, O. Zinchenko, A. P. Bondarchuk, et al.
Cybersecurity Education Science Technique (2023), pp. 209-225
Open Access