
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A systematic literature review for network intrusion detection system (IDS)
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed
International Journal of Information Security (2023) Vol. 22, Iss. 5, pp. 1125-1162
Closed Access | Times Cited: 71
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed
International Journal of Information Security (2023) Vol. 22, Iss. 5, pp. 1125-1162
Closed Access | Times Cited: 71
Showing 1-25 of 71 citing articles:
Modified genetic algorithm and fine-tuned long short-term memory network for intrusion detection in the internet of things networks with edge capabilities
Yakub Kayode Saheed, Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht
Applied Soft Computing (2024) Vol. 155, pp. 111434-111434
Closed Access | Times Cited: 38
Yakub Kayode Saheed, Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht
Applied Soft Computing (2024) Vol. 155, pp. 111434-111434
Closed Access | Times Cited: 38
Towards an efficient model for network intrusion detection system (IDS): systematic literature review
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed
Wireless Networks (2023) Vol. 30, Iss. 1, pp. 453-482
Closed Access | Times Cited: 27
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed
Wireless Networks (2023) Vol. 30, Iss. 1, pp. 453-482
Closed Access | Times Cited: 27
XIDINTFL-VAE: XGBoost-based intrusion detection of imbalance network traffic via class-wise focal loss variational autoencoder
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed, et al.
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access | Times Cited: 15
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed, et al.
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access | Times Cited: 15
ResNet50-1D-CNN: A new lightweight resNet50-One-dimensional convolution neural network transfer learning-based approach for improved intrusion detection in cyber-physical systems
Yakub Kayode Saheed, Oluwadamilare Harazeem Abdulganiyu, Kaloma Usman Majikumna, et al.
International Journal of Critical Infrastructure Protection (2024) Vol. 45, pp. 100674-100674
Closed Access | Times Cited: 14
Yakub Kayode Saheed, Oluwadamilare Harazeem Abdulganiyu, Kaloma Usman Majikumna, et al.
International Journal of Critical Infrastructure Protection (2024) Vol. 45, pp. 100674-100674
Closed Access | Times Cited: 14
XAIEnsembleTL-IoV: A New eXplainable Artificial Intelligence Ensemble Transfer Learning for Zero-Day Botnet Attack Detection in the Internet of Vehicles
Yakub Kayode Saheed, Joshua Ebere Chukwuere
Results in Engineering (2024), pp. 103171-103171
Open Access | Times Cited: 11
Yakub Kayode Saheed, Joshua Ebere Chukwuere
Results in Engineering (2024), pp. 103171-103171
Open Access | Times Cited: 11
Ensemble averaging deep neural network for botnet detection in heterogeneous Internet of Things devices
Aulia Arif Wardana, Grzegorz Kołaczek, Arkadiusz Warzyński, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 9
Aulia Arif Wardana, Grzegorz Kołaczek, Arkadiusz Warzyński, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 9
Evolving cybersecurity frontiers: A comprehensive survey on concept drift and feature dynamics aware machine and deep learning in intrusion detection systems
Methaq A. Shyaa, Noor Farizah Ibrahim, Zurinahni Zainol, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 137, pp. 109143-109143
Open Access | Times Cited: 9
Methaq A. Shyaa, Noor Farizah Ibrahim, Zurinahni Zainol, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 137, pp. 109143-109143
Open Access | Times Cited: 9
Privacy-Preserving Security of IoT Networks: A Comparative Analysis of Methods and Applications
Abubakar Wakili, Sara Bakkali
Cyber Security and Applications (2025), pp. 100084-100084
Open Access | Times Cited: 1
Abubakar Wakili, Sara Bakkali
Cyber Security and Applications (2025), pp. 100084-100084
Open Access | Times Cited: 1
Cybersecurity in the AI era: analyzing the impact of machine learning on intrusion detection
Huiyao Dong, Igor Kotenko
Knowledge and Information Systems (2025)
Closed Access | Times Cited: 1
Huiyao Dong, Igor Kotenko
Knowledge and Information Systems (2025)
Closed Access | Times Cited: 1
Design of advanced intrusion detection systems based on hybrid machine learning techniques in hierarchically wireless sensor networks
Gebrekiros Gebreyesus Gebremariam, Jeebananda Panda, S. Indu
Connection Science (2023) Vol. 35, Iss. 1
Open Access | Times Cited: 19
Gebrekiros Gebreyesus Gebremariam, Jeebananda Panda, S. Indu
Connection Science (2023) Vol. 35, Iss. 1
Open Access | Times Cited: 19
Finsformer: A Novel Approach to Detecting Financial Attacks Using Transformer and Cluster-Attention
Hao An, Ruotong Ma, Yuhan Yan, et al.
Applied Sciences (2024) Vol. 14, Iss. 1, pp. 460-460
Open Access | Times Cited: 8
Hao An, Ruotong Ma, Yuhan Yan, et al.
Applied Sciences (2024) Vol. 14, Iss. 1, pp. 460-460
Open Access | Times Cited: 8
Deep-IDS: A Real-Time Intrusion Detector for IoT Nodes Using Deep Learning
Sandeepkumar Racherla, Prathyusha Sripathi, Nuruzzaman Faruqui, et al.
IEEE Access (2024) Vol. 12, pp. 63584-63597
Open Access | Times Cited: 7
Sandeepkumar Racherla, Prathyusha Sripathi, Nuruzzaman Faruqui, et al.
IEEE Access (2024) Vol. 12, pp. 63584-63597
Open Access | Times Cited: 7
Enhanced Network Intrusion Detection System Using PCGSO-Optimized BI-GRU Model in AI-Driven Cybersecurity
Priyan Malarvizhi Kumar, Kavya Vedantham, S. Jeeva, et al.
(2024)
Closed Access | Times Cited: 6
Priyan Malarvizhi Kumar, Kavya Vedantham, S. Jeeva, et al.
(2024)
Closed Access | Times Cited: 6
Anomaly and intrusion detection using deep learning for software-defined networks: A survey
Vitor Gabriel da Silva Ruffo, Daniel Matheus Brandão Lent, Mateus Komarchesqui, et al.
Expert Systems with Applications (2024) Vol. 256, pp. 124982-124982
Closed Access | Times Cited: 6
Vitor Gabriel da Silva Ruffo, Daniel Matheus Brandão Lent, Mateus Komarchesqui, et al.
Expert Systems with Applications (2024) Vol. 256, pp. 124982-124982
Closed Access | Times Cited: 6
Beyond Detection: Leveraging Large Language Models for Cyber Attack Prediction in IoT Networks
Alaeddine Diaf, Abdelaziz Amara Korba, Nour Elislem Karabadji, et al.
(2024), pp. 117-123
Open Access | Times Cited: 6
Alaeddine Diaf, Abdelaziz Amara Korba, Nour Elislem Karabadji, et al.
(2024), pp. 117-123
Open Access | Times Cited: 6
Adversarial attack defense analysis: An empirical approach in cybersecurity perspective
Kousik Barik, Sanjay Misra
Software Impacts (2024) Vol. 21, pp. 100681-100681
Closed Access | Times Cited: 5
Kousik Barik, Sanjay Misra
Software Impacts (2024) Vol. 21, pp. 100681-100681
Closed Access | Times Cited: 5
Integrated Approach for Network Intrusion Detection
C. V. Suresh Babu, G. Suruthi, C. Indhumathi, et al.
Advances in systems analysis, software engineering, and high performance computing book series (2024), pp. 19-39
Closed Access | Times Cited: 5
C. V. Suresh Babu, G. Suruthi, C. Indhumathi, et al.
Advances in systems analysis, software engineering, and high performance computing book series (2024), pp. 19-39
Closed Access | Times Cited: 5
CPS-IoT-PPDNN: A new explainable privacy preserving DNN for resilient anomaly detection in Cyber-Physical Systems-enabled IoT networks
Yakub Kayode Saheed, Sanjay Misra
Chaos Solitons & Fractals (2024) Vol. 191, pp. 115939-115939
Open Access | Times Cited: 5
Yakub Kayode Saheed, Sanjay Misra
Chaos Solitons & Fractals (2024) Vol. 191, pp. 115939-115939
Open Access | Times Cited: 5
A study on characterizing energy, latency and security for Intrusion Detection Systems on heterogeneous embedded platforms
Camélia Slimani, Louis Morge-Rollet, Laurent Lemarchand, et al.
Future Generation Computer Systems (2024) Vol. 162, pp. 107473-107473
Closed Access | Times Cited: 4
Camélia Slimani, Louis Morge-Rollet, Laurent Lemarchand, et al.
Future Generation Computer Systems (2024) Vol. 162, pp. 107473-107473
Closed Access | Times Cited: 4
A Review on Machine Learning Framework for Detection of Intrusion
Satya N. Nandan, Mr. Pradeep Nayak, Bastien Amar, et al.
International Journal of Advanced Research in Science Communication and Technology (2025), pp. 90-94
Open Access
Satya N. Nandan, Mr. Pradeep Nayak, Bastien Amar, et al.
International Journal of Advanced Research in Science Communication and Technology (2025), pp. 90-94
Open Access
An Ensemble Voting Classifier Based On Machine Learning Models for Phishing Detection
Enas Mohammed Hussien Saeed
International Journal of Scientific Research in Science Engineering and Technology (2025) Vol. 12, Iss. 1, pp. 15-27
Open Access
Enas Mohammed Hussien Saeed
International Journal of Scientific Research in Science Engineering and Technology (2025) Vol. 12, Iss. 1, pp. 15-27
Open Access
ES-SDPC: A secure and trusted SDP framework
Zheng Zhang, Quan Ren, Jie Lu, et al.
Computer Networks (2025) Vol. 258, pp. 111038-111038
Closed Access
Zheng Zhang, Quan Ren, Jie Lu, et al.
Computer Networks (2025) Vol. 258, pp. 111038-111038
Closed Access
Deep Learning-driven Methods for Network-based Intrusion Detection Systems: A Systematic Review
Ramya Chinnasamy, Malliga Subramanian, Sathishkumar Veerappampalayam Easwaramoorthy, et al.
ICT Express (2025)
Open Access
Ramya Chinnasamy, Malliga Subramanian, Sathishkumar Veerappampalayam Easwaramoorthy, et al.
ICT Express (2025)
Open Access
Dual-hybrid intrusion detection system to detect False Data Injection in smart grids
Saad Hammood Mohammed, Mandeep Singh, Abdulmajeed Al-Jumaily, et al.
PLoS ONE (2025) Vol. 20, Iss. 1, pp. e0316536-e0316536
Open Access
Saad Hammood Mohammed, Mandeep Singh, Abdulmajeed Al-Jumaily, et al.
PLoS ONE (2025) Vol. 20, Iss. 1, pp. e0316536-e0316536
Open Access
Application of deep reinforcement learning for intrusion detection in Internet of Things: A systematic review
Saeid Jamshidi, Amin Nikanjam, Kawser Wazed Nafi, et al.
Internet of Things (2025), pp. 101531-101531
Closed Access
Saeid Jamshidi, Amin Nikanjam, Kawser Wazed Nafi, et al.
Internet of Things (2025), pp. 101531-101531
Closed Access