
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Deep Learning-Based Intrusion Detection Systems: A Systematic Review
Jan Lánský, Saqib Ali, Mokhtar Mohammadi, et al.
IEEE Access (2021) Vol. 9, pp. 101574-101599
Open Access | Times Cited: 166
Jan Lánský, Saqib Ali, Mokhtar Mohammadi, et al.
IEEE Access (2021) Vol. 9, pp. 101574-101599
Open Access | Times Cited: 166
Showing 26-50 of 166 citing articles:
Intrusion Anomaly Detection with Multi-transformer
W. F. Mader, Bin Wen, Wenlong Liu, et al.
Communications in computer and information science (2025), pp. 3-16
Closed Access
W. F. Mader, Bin Wen, Wenlong Liu, et al.
Communications in computer and information science (2025), pp. 3-16
Closed Access
Role of artificial neural networks in fortifying cybersecurity: A review
Avantika Yadav, Vishesh Aggarwal, Sulabh Bansal
AIP conference proceedings (2025) Vol. 3253, pp. 030004-030004
Closed Access
Avantika Yadav, Vishesh Aggarwal, Sulabh Bansal
AIP conference proceedings (2025) Vol. 3253, pp. 030004-030004
Closed Access
Detection of IoT Attacks Using Hybrid RNN‐DBN Model
D. Pavithra, R. Bharathraj, P. Poovizhi, et al.
(2025), pp. 209-225
Closed Access
D. Pavithra, R. Bharathraj, P. Poovizhi, et al.
(2025), pp. 209-225
Closed Access
The Mis/Dis-Information Problem Is Hard to Solve
Gregory Hagen, Reihaneh Safavi–Naini, Moti Yung
Lecture notes in computer science (2025), pp. 309-326
Closed Access
Gregory Hagen, Reihaneh Safavi–Naini, Moti Yung
Lecture notes in computer science (2025), pp. 309-326
Closed Access
Variational Deep Clustering approaches for anomaly-based cyber-attack detection
Van Quân Nguyen, Viet Hung Nguyen, Long Thanh Ngo, et al.
Journal of Network and Computer Applications (2025), pp. 104182-104182
Closed Access
Van Quân Nguyen, Viet Hung Nguyen, Long Thanh Ngo, et al.
Journal of Network and Computer Applications (2025), pp. 104182-104182
Closed Access
An Ensemble Method for Insider Threat Detection Based on User Activities Analysis Using Bi-LSTM and GA Optimization
A. Anju, Adline Freeda, Krithika Venket, et al.
Communications in computer and information science (2025), pp. 80-87
Closed Access
A. Anju, Adline Freeda, Krithika Venket, et al.
Communications in computer and information science (2025), pp. 80-87
Closed Access
Cognitive behavioural characteristics identification for remote user authentication for cybersecurity
Ahmet Orun, Emre Orun, Fatih Kurugöllü
Journal of Parallel and Distributed Computing (2025), pp. 105102-105102
Closed Access
Ahmet Orun, Emre Orun, Fatih Kurugöllü
Journal of Parallel and Distributed Computing (2025), pp. 105102-105102
Closed Access
Toward Detecting Cyberattacks Targeting Modern Power Grids: A Deep Learning Framework
Ehsan Naderi, Arash Asrari
2022 IEEE World AI IoT Congress (AIIoT) (2022), pp. 357-363
Closed Access | Times Cited: 17
Ehsan Naderi, Arash Asrari
2022 IEEE World AI IoT Congress (AIIoT) (2022), pp. 357-363
Closed Access | Times Cited: 17
Intelligent intrusion detection through deep autoencoder and stacked long short-term memory
Mehdi Moukhafi, Mouad Tantaoui, Idriss Chana, et al.
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2024) Vol. 14, Iss. 3, pp. 2908-2908
Open Access | Times Cited: 3
Mehdi Moukhafi, Mouad Tantaoui, Idriss Chana, et al.
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2024) Vol. 14, Iss. 3, pp. 2908-2908
Open Access | Times Cited: 3
Unveiling machine learning strategies and considerations in intrusion detection systems: a comprehensive survey
Ali Hussein Ali, Maha Charfeddine, Boudour Ammar, et al.
Frontiers in Computer Science (2024) Vol. 6
Closed Access | Times Cited: 3
Ali Hussein Ali, Maha Charfeddine, Boudour Ammar, et al.
Frontiers in Computer Science (2024) Vol. 6
Closed Access | Times Cited: 3
Swarm optimized differential evolution and probabilistic extreme learning based intrusion detection in MANET
R. D. Sathiya, N. Yuvaraj
Computers & Security (2024) Vol. 144, pp. 103970-103970
Closed Access | Times Cited: 3
R. D. Sathiya, N. Yuvaraj
Computers & Security (2024) Vol. 144, pp. 103970-103970
Closed Access | Times Cited: 3
Explainable Deep Learning-Based Feature Selection and Intrusion Detection Method on the Internet of Things
Xuejiao Chen, Minyao Liu, Z. Wang, et al.
Sensors (2024) Vol. 24, Iss. 16, pp. 5223-5223
Open Access | Times Cited: 3
Xuejiao Chen, Minyao Liu, Z. Wang, et al.
Sensors (2024) Vol. 24, Iss. 16, pp. 5223-5223
Open Access | Times Cited: 3
Intrusion Detection System for IoT Security
Sudeshna Das, Abhishek Majumder
Lecture notes in networks and systems (2025), pp. 389-399
Closed Access
Sudeshna Das, Abhishek Majumder
Lecture notes in networks and systems (2025), pp. 389-399
Closed Access
Performance Analysis of Machine Learning Classifiers on CICIDS2017 Dataset
Pochamreddy Mukesh Reddy, Lav Upadhyay, Lanka Rakesh
Lecture notes in electrical engineering (2025), pp. 365-382
Closed Access
Pochamreddy Mukesh Reddy, Lav Upadhyay, Lanka Rakesh
Lecture notes in electrical engineering (2025), pp. 365-382
Closed Access
Malicious Behavior Identification using Dual Attention based Dense Bi-Directional Gated Recurrent Network in the Cloud Computing Environment
Nandita Goyal, Kanika Taneja, Shivani Agarwal, et al.
Computers & Security (2025), pp. 104418-104418
Closed Access
Nandita Goyal, Kanika Taneja, Shivani Agarwal, et al.
Computers & Security (2025), pp. 104418-104418
Closed Access
Unknown DDoS Attack Detection with Sliced Iterative Normalizing Flows Technique
Chin‐Shiuh Shieh, Thanh Lâm Nguyễn, Thanh-Tuan Nguyen, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2025) Vol. 82, Iss. 3, pp. 4881-4912
Open Access
Chin‐Shiuh Shieh, Thanh Lâm Nguyễn, Thanh-Tuan Nguyen, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2025) Vol. 82, Iss. 3, pp. 4881-4912
Open Access
A Review of Machine Learning and Transfer Learning Strategies for Intrusion Detection Systems in 5G and Beyond
Kinzah Noor, Agbotiname Lucky Imoize, Chun‐Ta Li, et al.
Mathematics (2025) Vol. 13, Iss. 7, pp. 1088-1088
Open Access
Kinzah Noor, Agbotiname Lucky Imoize, Chun‐Ta Li, et al.
Mathematics (2025) Vol. 13, Iss. 7, pp. 1088-1088
Open Access
Towards Targeted and Universal Adversarial attacks against network traffic classification
Ruiyang Ding, Lei Sun, Zhiyi Ding, et al.
Computers & Security (2025), pp. 104470-104470
Closed Access
Ruiyang Ding, Lei Sun, Zhiyi Ding, et al.
Computers & Security (2025), pp. 104470-104470
Closed Access
Deep Learning-Driven Behavioral Analysis for Real-Time Threat Detection and Classification in Network Traffic
G. Nagaraju, Sridhar Gujjeti, M. Varaprasad Rao, et al.
International Journal of Electrical and Electronics Research (2025) Vol. 13, Iss. 1, pp. 80-88
Open Access
G. Nagaraju, Sridhar Gujjeti, M. Varaprasad Rao, et al.
International Journal of Electrical and Electronics Research (2025) Vol. 13, Iss. 1, pp. 80-88
Open Access
Artificial Intelligence-Driven Network Intrusion Detection and Response System
Haokun Chen, Yiqun Wang, Song Zhai, et al.
Lecture notes in networks and systems (2025), pp. 508-518
Closed Access
Haokun Chen, Yiqun Wang, Song Zhai, et al.
Lecture notes in networks and systems (2025), pp. 508-518
Closed Access
Exploring the malicious activities in network, intrusion detection system with machine learning
Lakshmi Makam Jagadeesha, Spandana Dinesh Sheregar, Trupthi Rao, et al.
AIP conference proceedings (2025) Vol. 3283, pp. 020024-020024
Closed Access
Lakshmi Makam Jagadeesha, Spandana Dinesh Sheregar, Trupthi Rao, et al.
AIP conference proceedings (2025) Vol. 3283, pp. 020024-020024
Closed Access
Enhancing Intrusion Detection Systems Using RNN, LSTM, and Hybrid RNN-LSTM Models
Sahar Ebadinezhad, Nooshin Nooraei Nia, Navid Shirzad, et al.
(2025), pp. 1108-1115
Closed Access
Sahar Ebadinezhad, Nooshin Nooraei Nia, Navid Shirzad, et al.
(2025), pp. 1108-1115
Closed Access
A review on machine learning technique for network intrusion detection systems
Mohammed Hussein, Hayder Sabah Salih, Salam Al-augby, et al.
AIP conference proceedings (2025) Vol. 3211, pp. 030046-030046
Closed Access
Mohammed Hussein, Hayder Sabah Salih, Salam Al-augby, et al.
AIP conference proceedings (2025) Vol. 3211, pp. 030046-030046
Closed Access
Machine Learning Approaches for Intrusion Detection in IoT: Literature Review
Marwa Baich, Nawal Sael, Hamim Touria
Lecture notes in networks and systems (2025), pp. 215-225
Closed Access
Marwa Baich, Nawal Sael, Hamim Touria
Lecture notes in networks and systems (2025), pp. 215-225
Closed Access
Federated Learning for Privacy-Preserving Intrusion Detection in Software-Defined Networks
Mubashar Raza, Muhammad Jasim Saeed, Muhammad Bilal Riaz, et al.
IEEE Access (2024) Vol. 12, pp. 69551-69567
Open Access | Times Cited: 3
Mubashar Raza, Muhammad Jasim Saeed, Muhammad Bilal Riaz, et al.
IEEE Access (2024) Vol. 12, pp. 69551-69567
Open Access | Times Cited: 3