
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Explainable AI and Random Forest Based Reliable Intrusion Detection system
Syed Wali, Irfan Khan
(2021)
Open Access | Times Cited: 16
Syed Wali, Irfan Khan
(2021)
Open Access | Times Cited: 16
Showing 16 citing articles:
Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research
Zhibo Zhang, Hussam Al Hamadi, Ernesto Damiani, et al.
IEEE Access (2022) Vol. 10, pp. 93104-93139
Open Access | Times Cited: 166
Zhibo Zhang, Hussam Al Hamadi, Ernesto Damiani, et al.
IEEE Access (2022) Vol. 10, pp. 93104-93139
Open Access | Times Cited: 166
A Novel IoT-Based Explainable Deep Learning Framework for Intrusion Detection Systems
Zakaria Abou El Houda, Bouziane Brik, Sidi‐Mohammed Senouci
IEEE Internet of Things Magazine (2022) Vol. 5, Iss. 2, pp. 20-23
Closed Access | Times Cited: 47
Zakaria Abou El Houda, Bouziane Brik, Sidi‐Mohammed Senouci
IEEE Internet of Things Magazine (2022) Vol. 5, Iss. 2, pp. 20-23
Closed Access | Times Cited: 47
Explainable artificial intelligence for cybersecurity: a literature survey
Fabien Charmet, Harry Chandra Tanuwidjaja, Solayman Ayoubi, et al.
Annals of Telecommunications (2022) Vol. 77, Iss. 11-12, pp. 789-812
Open Access | Times Cited: 45
Fabien Charmet, Harry Chandra Tanuwidjaja, Solayman Ayoubi, et al.
Annals of Telecommunications (2022) Vol. 77, Iss. 11-12, pp. 789-812
Open Access | Times Cited: 45
Explainable deep learning approach for advanced persistent threats (APTs) detection in cybersecurity: a review
Noor Hazlina Abdul Mutalib, Aznul Qalid Md Sabri, Ainuddin Wahid Abdul Wahab, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 11
Open Access | Times Cited: 4
Noor Hazlina Abdul Mutalib, Aznul Qalid Md Sabri, Ainuddin Wahid Abdul Wahab, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 11
Open Access | Times Cited: 4
Review of Machine Learning-Based Distributed Denial-of-Service (DDoS) Detection and Prevention
Md. Mostakim Billah Fahim, Md. Shafayat Hossain, Tanjela Rahman Rosni, et al.
Lecture notes in networks and systems (2025), pp. 319-326
Closed Access
Md. Mostakim Billah Fahim, Md. Shafayat Hossain, Tanjela Rahman Rosni, et al.
Lecture notes in networks and systems (2025), pp. 319-326
Closed Access
Enhancing ınternet security: a novel ML approach for intrusion detection using RS2FS and cascaded SVM/ANFIS
S. Gomathi, Khushbu Kumari
International Journal of Machine Learning and Cybernetics (2025)
Closed Access
S. Gomathi, Khushbu Kumari
International Journal of Machine Learning and Cybernetics (2025)
Closed Access
Explainable Artificial Intelligence with Single Layer Feedforward Neural Network and Improved Crowned Porcupine Optimization Algorithm for Classification Problems
S Caxton Emerald, T. Vengattaraman
Engineering Technology & Applied Science Research (2025) Vol. 15, Iss. 2, pp. 21593-21598
Open Access
S Caxton Emerald, T. Vengattaraman
Engineering Technology & Applied Science Research (2025) Vol. 15, Iss. 2, pp. 21593-21598
Open Access
Prevention in Healthcare: An Explainable AI Approach
Shahin Makubhai, Ganesh R. Pathak, Pankaj R. Chandre
International Journal on Recent and Innovation Trends in Computing and Communication (2023) Vol. 11, Iss. 5, pp. 92-100
Open Access | Times Cited: 8
Shahin Makubhai, Ganesh R. Pathak, Pankaj R. Chandre
International Journal on Recent and Innovation Trends in Computing and Communication (2023) Vol. 11, Iss. 5, pp. 92-100
Open Access | Times Cited: 8
A Roadmap of Explainable Artificial Intelligence: Explain to Whom, When, What and How?
Ziming Wang, Changwu Huang, Xin Yao
ACM Transactions on Autonomous and Adaptive Systems (2024) Vol. 19, Iss. 4, pp. 1-40
Open Access | Times Cited: 2
Ziming Wang, Changwu Huang, Xin Yao
ACM Transactions on Autonomous and Adaptive Systems (2024) Vol. 19, Iss. 4, pp. 1-40
Open Access | Times Cited: 2
An Explainable and Optimized Network Intrusion Detection Model using Deep Learning
C Haripriya, Prabhudev Jagadeesh M. P
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 1
Open Access | Times Cited: 1
C Haripriya, Prabhudev Jagadeesh M. P
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 1
Open Access | Times Cited: 1
Explainable Signature-based Machine Learning Approach for Identification of Faults in Grid-Connected Photovoltaic Systems
Syed Wali, Irfan Khan
(2022), pp. 1-6
Open Access | Times Cited: 6
Syed Wali, Irfan Khan
(2022), pp. 1-6
Open Access | Times Cited: 6
Evaluating Feature Relevance XAI in Network Intrusion Detection
Julian Tritscher, M. Wolf, Andreas Hotho, et al.
Communications in computer and information science (2023), pp. 483-497
Closed Access | Times Cited: 3
Julian Tritscher, M. Wolf, Andreas Hotho, et al.
Communications in computer and information science (2023), pp. 483-497
Closed Access | Times Cited: 3
XAI for Securing Cyber Physical Systems
Amar Prakash Patil, Joshitha Devarakonda, Manognya Singuru, et al.
(2023), pp. 671-677
Closed Access | Times Cited: 2
Amar Prakash Patil, Joshitha Devarakonda, Manognya Singuru, et al.
(2023), pp. 671-677
Closed Access | Times Cited: 2
Validating network attack concepts: A TCAV-driven approach
R. R. Rejimol Robinson, Rendhir R. Prasad, Ciza Thomas, et al.
Journal of Computer Virology and Hacking Techniques (2024)
Closed Access
R. R. Rejimol Robinson, Rendhir R. Prasad, Ciza Thomas, et al.
Journal of Computer Virology and Hacking Techniques (2024)
Closed Access
Beyond the Black Box: XAI Strategies for Safeguarding Critical Infrastructure
Arjun Singh, Sarthak Kathait, Anshi Kothari, et al.
(2024), pp. 129-154
Closed Access
Arjun Singh, Sarthak Kathait, Anshi Kothari, et al.
(2024), pp. 129-154
Closed Access
The X-Factor of Healthcare
Shahin Makubhai, Ganesh R. Pathak, Pankaj R. Chandre
Advances in healthcare information systems and administration book series (2024), pp. 113-140
Closed Access
Shahin Makubhai, Ganesh R. Pathak, Pankaj R. Chandre
Advances in healthcare information systems and administration book series (2024), pp. 113-140
Closed Access