
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Intrusion detection system using SOEKS and deep learning for in-vehicle security
Lulu Gao, Fei Li, Xiang Xu, et al.
Cluster Computing (2018) Vol. 22, Iss. S6, pp. 14721-14729
Closed Access | Times Cited: 25
Lulu Gao, Fei Li, Xiang Xu, et al.
Cluster Computing (2018) Vol. 22, Iss. S6, pp. 14721-14729
Closed Access | Times Cited: 25
Showing 25 citing articles:
Deep Learning-Based Intrusion Detection Systems: A Systematic Review
Jan Lánský, Saqib Ali, Mokhtar Mohammadi, et al.
IEEE Access (2021) Vol. 9, pp. 101574-101599
Open Access | Times Cited: 166
Jan Lánský, Saqib Ali, Mokhtar Mohammadi, et al.
IEEE Access (2021) Vol. 9, pp. 101574-101599
Open Access | Times Cited: 166
AI-Based Intrusion Detection Systems for In-Vehicle Networks: A Survey
Sampath Rajapaksha, Harsha Kalutarage, M. Omar Al-Kadri, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 11, pp. 1-40
Open Access | Times Cited: 86
Sampath Rajapaksha, Harsha Kalutarage, M. Omar Al-Kadri, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 11, pp. 1-40
Open Access | Times Cited: 86
Safety Assessment of Intelligent Vehicles Considering Drivers’ Risk Perception Information Under Interval 2-tuple q-rung Orthopair Fuzzy Sets
Danqi Wang, Wengang Deng, Hu Lin, et al.
Applied Soft Computing (2025), pp. 112919-112919
Closed Access | Times Cited: 2
Danqi Wang, Wengang Deng, Hu Lin, et al.
Applied Soft Computing (2025), pp. 112919-112919
Closed Access | Times Cited: 2
A review of security attacks and intrusion detection in the vehicular networks
Tarak Nandy, Rafidah Md Noor, Raenu Kolandaisamy, et al.
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 2, pp. 101945-101945
Open Access | Times Cited: 13
Tarak Nandy, Rafidah Md Noor, Raenu Kolandaisamy, et al.
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 2, pp. 101945-101945
Open Access | Times Cited: 13
Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks
Mohammed Almehdhar, Abdullatif Albaseer, Muhammad Asif Khan, et al.
IEEE Open Journal of Vehicular Technology (2024) Vol. 5, pp. 869-906
Open Access | Times Cited: 12
Mohammed Almehdhar, Abdullatif Albaseer, Muhammad Asif Khan, et al.
IEEE Open Journal of Vehicular Technology (2024) Vol. 5, pp. 869-906
Open Access | Times Cited: 12
Federated learning for network attack detection using attention-based graph neural networks
Jian Wu, Qiu Guangqiu, Chunming Wu, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 12
Jian Wu, Qiu Guangqiu, Chunming Wu, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 12
Intrusion detection system using deep learning for in-vehicle security
Jiayan Zhang, Fei Li, Haoxi Zhang, et al.
Ad Hoc Networks (2019) Vol. 95, pp. 101974-101974
Closed Access | Times Cited: 68
Jiayan Zhang, Fei Li, Haoxi Zhang, et al.
Ad Hoc Networks (2019) Vol. 95, pp. 101974-101974
Closed Access | Times Cited: 68
A robust multi-stage intrusion detection system for in-vehicle network security using hierarchical federated learning
Muzun Althunayyan, Amir Javed, Omer Rana
Vehicular Communications (2024) Vol. 49, pp. 100837-100837
Open Access | Times Cited: 5
Muzun Althunayyan, Amir Javed, Omer Rana
Vehicular Communications (2024) Vol. 49, pp. 100837-100837
Open Access | Times Cited: 5
Towards the design of real-time autonomous IoT NIDS
Alaa Alhowaide, Izzat Alsmadi, Jian Tang
Cluster Computing (2021) Vol. 26, Iss. 5, pp. 2489-2502
Closed Access | Times Cited: 26
Alaa Alhowaide, Izzat Alsmadi, Jian Tang
Cluster Computing (2021) Vol. 26, Iss. 5, pp. 2489-2502
Closed Access | Times Cited: 26
Effective Intrusion Detection and Prevention for the Commercial Vehicle SAE J1939 CAN Bus
Camil Jichici, Bogdan Groza, Radu Ragobete, et al.
IEEE Transactions on Intelligent Transportation Systems (2022) Vol. 23, Iss. 10, pp. 17425-17439
Closed Access | Times Cited: 17
Camil Jichici, Bogdan Groza, Radu Ragobete, et al.
IEEE Transactions on Intelligent Transportation Systems (2022) Vol. 23, Iss. 10, pp. 17425-17439
Closed Access | Times Cited: 17
A Zero False Positive Rate of IDS Based on Swin Transformer for Hybrid Automotive In-Vehicle Networks
Shanshan Wang, Hainan Zhou, Haihang Zhao, et al.
Electronics (2024) Vol. 13, Iss. 7, pp. 1317-1317
Open Access | Times Cited: 3
Shanshan Wang, Hainan Zhou, Haihang Zhao, et al.
Electronics (2024) Vol. 13, Iss. 7, pp. 1317-1317
Open Access | Times Cited: 3
TCE-IDS: Time Interval Conditional Entropy- Based Intrusion Detection System for Automotive Controller Area Networks
Zhangwei Yu, Yan Liu, Guoqi Xie, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 2, pp. 1185-1195
Closed Access | Times Cited: 16
Zhangwei Yu, Yan Liu, Guoqi Xie, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 2, pp. 1185-1195
Closed Access | Times Cited: 16
A Fault Prediction Algorithm Based on Rough Sets and Back Propagation Neural Network for Vehicular Networks
Rong Geng, Xiaojie Wang, Ning Ye, et al.
IEEE Access (2018) Vol. 6, pp. 74984-74992
Open Access | Times Cited: 22
Rong Geng, Xiaojie Wang, Ning Ye, et al.
IEEE Access (2018) Vol. 6, pp. 74984-74992
Open Access | Times Cited: 22
Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks
Li Fei, Jiayan Zhang, Edward Szczerbicki, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2020) Vol. 65, Iss. 1, pp. 653-681
Open Access | Times Cited: 18
Li Fei, Jiayan Zhang, Edward Szczerbicki, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2020) Vol. 65, Iss. 1, pp. 653-681
Open Access | Times Cited: 18
Cybersecurity attacks on CAN bus based vehicles: a review and open challenges
Faten Fakhfakh, Mohamed Tounsi, Mohamed Mosbah
Library Hi Tech (2021) Vol. 40, Iss. 5, pp. 1179-1203
Closed Access | Times Cited: 15
Faten Fakhfakh, Mohamed Tounsi, Mohamed Mosbah
Library Hi Tech (2021) Vol. 40, Iss. 5, pp. 1179-1203
Closed Access | Times Cited: 15
An Optimized Hybrid Deep Intrusion Detection Model (HD-IDM) for Enhancing Network Security
Iftikhar Ahmad, Muhammad Imran, Abdul Qayyum, et al.
Mathematics (2023) Vol. 11, Iss. 21, pp. 4501-4501
Open Access | Times Cited: 5
Iftikhar Ahmad, Muhammad Imran, Abdul Qayyum, et al.
Mathematics (2023) Vol. 11, Iss. 21, pp. 4501-4501
Open Access | Times Cited: 5
Metaheuristic optimized complex-valued dilated recurrent neural network for attack detection in internet of vehicular communications
Prasanalakshmi Balaji, Korhan Cengiz, Sangita Babu, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2366-e2366
Open Access | Times Cited: 1
Prasanalakshmi Balaji, Korhan Cengiz, Sangita Babu, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2366-e2366
Open Access | Times Cited: 1
Blockchain integration for in-vehicle CAN bus intrusion detection systems with ISO/SAE 21434 compliant reporting
Tudor Andreica, Adrian Musuroi, Alfred Anistoroaei, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
Tudor Andreica, Adrian Musuroi, Alfred Anistoroaei, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
A Multimodal Approach to Enhancing Automobile Security
Samuel D. Okegbile, Segun Aina, Sanmi Akinmodun, et al.
International Journal of Computer Vision and Image Processing (2019) Vol. 9, Iss. 2, pp. 32-47
Closed Access | Times Cited: 1
Samuel D. Okegbile, Segun Aina, Sanmi Akinmodun, et al.
International Journal of Computer Vision and Image Processing (2019) Vol. 9, Iss. 2, pp. 32-47
Closed Access | Times Cited: 1
Situational Awareness Model of IoV Based on Fuzzy Evaluation and Markov Chain
Pengfei Zhang, Li Fei, Zuqi Liao, et al.
Communications in computer and information science (2020), pp. 543-557
Closed Access | Times Cited: 1
Pengfei Zhang, Li Fei, Zuqi Liao, et al.
Communications in computer and information science (2020), pp. 543-557
Closed Access | Times Cited: 1
Application of Machine Learning Algorithms in Network Intrusion Detection
Shuchang Zhang, Yanling Li, Yu Shi, et al.
(2022) Vol. 7, pp. 464-471
Closed Access | Times Cited: 1
Shuchang Zhang, Yanling Li, Yu Shi, et al.
(2022) Vol. 7, pp. 464-471
Closed Access | Times Cited: 1
Denetleyici Alan Ağının Güvenliğinin Sağlanması için Derin Öğrenme Tabanlı Saldırı Tespit Sistemleri Üzerine Bir Derleme
Zinnet Duygu Akşehır, Sedat Akleylek
European Journal of Science and Technology (2021)
Open Access | Times Cited: 1
Zinnet Duygu Akşehır, Sedat Akleylek
European Journal of Science and Technology (2021)
Open Access | Times Cited: 1
Embedded response technology and service cloud platform for vehicle information tracking
Muhammad Faisal, Ida Ida, Darniati Darniati, et al.
International Journal of Industrial Optimization (2023), pp. 25-37
Open Access
Muhammad Faisal, Ida Ida, Darniati Darniati, et al.
International Journal of Industrial Optimization (2023), pp. 25-37
Open Access
Internet of vehicles: A study and comparison of machine learning and deep learning-based intrusion detection approaches
Harsh Sinha, Rakesh Tripathi
AIP conference proceedings (2023) Vol. 2705, pp. 030002-030002
Closed Access
Harsh Sinha, Rakesh Tripathi
AIP conference proceedings (2023) Vol. 2705, pp. 030002-030002
Closed Access
Anomaly Detection in CAN-BUS Using Pattern Matching Algorithm
Ilia Odeski, Michael Segal
Communications in computer and information science (2021), pp. 180-196
Closed Access
Ilia Odeski, Michael Segal
Communications in computer and information science (2021), pp. 180-196
Closed Access