OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Deep Learning-Based Intrusion Detection Systems: A Systematic Review
Jan Lánský, Saqib Ali, Mokhtar Mohammadi, et al.
IEEE Access (2021) Vol. 9, pp. 101574-101599
Open Access | Times Cited: 166

Showing 26-50 of 166 citing articles:

Intrusion Anomaly Detection with Multi-transformer
W. F. Mader, Bin Wen, Wenlong Liu, et al.
Communications in computer and information science (2025), pp. 3-16
Closed Access

Role of artificial neural networks in fortifying cybersecurity: A review
Avantika Yadav, Vishesh Aggarwal, Sulabh Bansal
AIP conference proceedings (2025) Vol. 3253, pp. 030004-030004
Closed Access

Detection of IoT Attacks Using Hybrid RNN‐DBN Model
D. Pavithra, R. Bharathraj, P. Poovizhi, et al.
(2025), pp. 209-225
Closed Access

The Mis/Dis-Information Problem Is Hard to Solve
Gregory Hagen, Reihaneh Safavi–Naini, Moti Yung
Lecture notes in computer science (2025), pp. 309-326
Closed Access

Variational Deep Clustering approaches for anomaly-based cyber-attack detection
Van Quân Nguyen, Viet Hung Nguyen, Long Thanh Ngo, et al.
Journal of Network and Computer Applications (2025), pp. 104182-104182
Closed Access

An Ensemble Method for Insider Threat Detection Based on User Activities Analysis Using Bi-LSTM and GA Optimization
A. Anju, Adline Freeda, Krithika Venket, et al.
Communications in computer and information science (2025), pp. 80-87
Closed Access

Cognitive behavioural characteristics identification for remote user authentication for cybersecurity
Ahmet Orun, Emre Orun, Fatih Kurugöllü
Journal of Parallel and Distributed Computing (2025), pp. 105102-105102
Closed Access

Toward Detecting Cyberattacks Targeting Modern Power Grids: A Deep Learning Framework
Ehsan Naderi, ‎Arash Asrari
2022 IEEE World AI IoT Congress (AIIoT) (2022), pp. 357-363
Closed Access | Times Cited: 17

Intelligent intrusion detection through deep autoencoder and stacked long short-term memory
Mehdi Moukhafi, Mouad Tantaoui, Idriss Chana, et al.
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2024) Vol. 14, Iss. 3, pp. 2908-2908
Open Access | Times Cited: 3

Unveiling machine learning strategies and considerations in intrusion detection systems: a comprehensive survey
Ali Hussein Ali, Maha Charfeddine, Boudour Ammar, et al.
Frontiers in Computer Science (2024) Vol. 6
Closed Access | Times Cited: 3

Swarm optimized differential evolution and probabilistic extreme learning based intrusion detection in MANET
R. D. Sathiya, N. Yuvaraj
Computers & Security (2024) Vol. 144, pp. 103970-103970
Closed Access | Times Cited: 3

Explainable Deep Learning-Based Feature Selection and Intrusion Detection Method on the Internet of Things
Xuejiao Chen, Minyao Liu, Z. Wang, et al.
Sensors (2024) Vol. 24, Iss. 16, pp. 5223-5223
Open Access | Times Cited: 3

Intrusion Detection System for IoT Security
Sudeshna Das, Abhishek Majumder
Lecture notes in networks and systems (2025), pp. 389-399
Closed Access

Performance Analysis of Machine Learning Classifiers on CICIDS2017 Dataset
Pochamreddy Mukesh Reddy, Lav Upadhyay, Lanka Rakesh
Lecture notes in electrical engineering (2025), pp. 365-382
Closed Access

Malicious Behavior Identification using Dual Attention based Dense Bi-Directional Gated Recurrent Network in the Cloud Computing Environment
Nandita Goyal, Kanika Taneja, Shivani Agarwal, et al.
Computers & Security (2025), pp. 104418-104418
Closed Access

Unknown DDoS Attack Detection with Sliced Iterative Normalizing Flows Technique
Chin‐Shiuh Shieh, Thanh Lâm Nguyễn, Thanh-Tuan Nguyen, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2025) Vol. 82, Iss. 3, pp. 4881-4912
Open Access

A Review of Machine Learning and Transfer Learning Strategies for Intrusion Detection Systems in 5G and Beyond
Kinzah Noor, Agbotiname Lucky Imoize, Chun‐Ta Li, et al.
Mathematics (2025) Vol. 13, Iss. 7, pp. 1088-1088
Open Access

Towards Targeted and Universal Adversarial attacks against network traffic classification
Ruiyang Ding, Lei Sun, Zhiyi Ding, et al.
Computers & Security (2025), pp. 104470-104470
Closed Access

Deep Learning-Driven Behavioral Analysis for Real-Time Threat Detection and Classification in Network Traffic
G. Nagaraju, Sridhar Gujjeti, M. Varaprasad Rao, et al.
International Journal of Electrical and Electronics Research (2025) Vol. 13, Iss. 1, pp. 80-88
Open Access

Artificial Intelligence-Driven Network Intrusion Detection and Response System
Haokun Chen, Yiqun Wang, Song Zhai, et al.
Lecture notes in networks and systems (2025), pp. 508-518
Closed Access

Exploring the malicious activities in network, intrusion detection system with machine learning
Lakshmi Makam Jagadeesha, Spandana Dinesh Sheregar, Trupthi Rao, et al.
AIP conference proceedings (2025) Vol. 3283, pp. 020024-020024
Closed Access

Enhancing Intrusion Detection Systems Using RNN, LSTM, and Hybrid RNN-LSTM Models
Sahar Ebadinezhad, Nooshin Nooraei Nia, Navid Shirzad, et al.
(2025), pp. 1108-1115
Closed Access

A review on machine learning technique for network intrusion detection systems
Mohammed Hussein, Hayder Sabah Salih, Salam Al-augby, et al.
AIP conference proceedings (2025) Vol. 3211, pp. 030046-030046
Closed Access

Machine Learning Approaches for Intrusion Detection in IoT: Literature Review
Marwa Baich, Nawal Sael, Hamim Touria
Lecture notes in networks and systems (2025), pp. 215-225
Closed Access

Federated Learning for Privacy-Preserving Intrusion Detection in Software-Defined Networks
Mubashar Raza, Muhammad Jasim Saeed, Muhammad Bilal Riaz, et al.
IEEE Access (2024) Vol. 12, pp. 69551-69567
Open Access | Times Cited: 3

Scroll to top