
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Towards an efficient model for network intrusion detection system (IDS): systematic literature review
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed
Wireless Networks (2023) Vol. 30, Iss. 1, pp. 453-482
Closed Access | Times Cited: 27
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed
Wireless Networks (2023) Vol. 30, Iss. 1, pp. 453-482
Closed Access | Times Cited: 27
Showing 1-25 of 27 citing articles:
Modified genetic algorithm and fine-tuned long short-term memory network for intrusion detection in the internet of things networks with edge capabilities
Yakub Kayode Saheed, Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht
Applied Soft Computing (2024) Vol. 155, pp. 111434-111434
Closed Access | Times Cited: 38
Yakub Kayode Saheed, Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht
Applied Soft Computing (2024) Vol. 155, pp. 111434-111434
Closed Access | Times Cited: 38
XIDINTFL-VAE: XGBoost-based intrusion detection of imbalance network traffic via class-wise focal loss variational autoencoder
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed, et al.
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access | Times Cited: 15
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed, et al.
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access | Times Cited: 15
ResNet50-1D-CNN: A new lightweight resNet50-One-dimensional convolution neural network transfer learning-based approach for improved intrusion detection in cyber-physical systems
Yakub Kayode Saheed, Oluwadamilare Harazeem Abdulganiyu, Kaloma Usman Majikumna, et al.
International Journal of Critical Infrastructure Protection (2024) Vol. 45, pp. 100674-100674
Closed Access | Times Cited: 14
Yakub Kayode Saheed, Oluwadamilare Harazeem Abdulganiyu, Kaloma Usman Majikumna, et al.
International Journal of Critical Infrastructure Protection (2024) Vol. 45, pp. 100674-100674
Closed Access | Times Cited: 14
XAIEnsembleTL-IoV: A New eXplainable Artificial Intelligence Ensemble Transfer Learning for Zero-Day Botnet Attack Detection in the Internet of Vehicles
Yakub Kayode Saheed, Joshua Ebere Chukwuere
Results in Engineering (2024), pp. 103171-103171
Open Access | Times Cited: 11
Yakub Kayode Saheed, Joshua Ebere Chukwuere
Results in Engineering (2024), pp. 103171-103171
Open Access | Times Cited: 11
Evolving cybersecurity frontiers: A comprehensive survey on concept drift and feature dynamics aware machine and deep learning in intrusion detection systems
Methaq A. Shyaa, Noor Farizah Ibrahim, Zurinahni Zainol, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 137, pp. 109143-109143
Open Access | Times Cited: 9
Methaq A. Shyaa, Noor Farizah Ibrahim, Zurinahni Zainol, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 137, pp. 109143-109143
Open Access | Times Cited: 9
A hybrid machine learning model for intrusion detection in wireless sensor networks leveraging data balancing and dimensionality reduction
Md. Alamin Talukder, Majdi Khalid, Nasrin Sultana
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access | Times Cited: 1
Md. Alamin Talukder, Majdi Khalid, Nasrin Sultana
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access | Times Cited: 1
Hybrid-CID: Securing IoT with Mongoose Optimization
S. Merlin Sheeba, R. S. Shaji
International Journal of Computational Intelligence Systems (2025) Vol. 18, Iss. 1
Open Access | Times Cited: 1
S. Merlin Sheeba, R. S. Shaji
International Journal of Computational Intelligence Systems (2025) Vol. 18, Iss. 1
Open Access | Times Cited: 1
IDS-Anta: An open-source code with a defense mechanism to detect adversarial attacks for intrusion detection system
Kousik Barik, Sanjay Misra
Software Impacts (2024) Vol. 21, pp. 100664-100664
Open Access | Times Cited: 7
Kousik Barik, Sanjay Misra
Software Impacts (2024) Vol. 21, pp. 100664-100664
Open Access | Times Cited: 7
CPS-IoT-PPDNN: A new explainable privacy preserving DNN for resilient anomaly detection in Cyber-Physical Systems-enabled IoT networks
Yakub Kayode Saheed, Sanjay Misra
Chaos Solitons & Fractals (2024) Vol. 191, pp. 115939-115939
Open Access | Times Cited: 5
Yakub Kayode Saheed, Sanjay Misra
Chaos Solitons & Fractals (2024) Vol. 191, pp. 115939-115939
Open Access | Times Cited: 5
A Review on Machine Learning Framework for Detection of Intrusion
Satya N. Nandan, Mr. Pradeep Nayak, Bastien Amar, et al.
International Journal of Advanced Research in Science Communication and Technology (2025), pp. 90-94
Open Access
Satya N. Nandan, Mr. Pradeep Nayak, Bastien Amar, et al.
International Journal of Advanced Research in Science Communication and Technology (2025), pp. 90-94
Open Access
Deep Learning-driven Methods for Network-based Intrusion Detection Systems: A Systematic Review
Ramya Chinnasamy, Malliga Subramanian, Sathishkumar Veerappampalayam Easwaramoorthy, et al.
ICT Express (2025)
Open Access
Ramya Chinnasamy, Malliga Subramanian, Sathishkumar Veerappampalayam Easwaramoorthy, et al.
ICT Express (2025)
Open Access
Enhanced Deep Autoencoder-Based Reinforcement Learning Model with Improved Flamingo Search Policy Selection for Attack Classification
Dharani Kanta Roy, Hemanta Kalita
Journal of Cybersecurity and Privacy (2025) Vol. 5, Iss. 1, pp. 3-3
Open Access
Dharani Kanta Roy, Hemanta Kalita
Journal of Cybersecurity and Privacy (2025) Vol. 5, Iss. 1, pp. 3-3
Open Access
Hybrid Neural Network-Based Intrusion Detection System: Leveraging LightGBM and MobileNetV2 for IoT Security
Yeh-Fen Yang, Ko-Chin Chang, Jia-Ning Luo
Symmetry (2025) Vol. 17, Iss. 3, pp. 314-314
Open Access
Yeh-Fen Yang, Ko-Chin Chang, Jia-Ning Luo
Symmetry (2025) Vol. 17, Iss. 3, pp. 314-314
Open Access
A Semi-Supervised Deep Learning Approach for Intrusion Detection and Classification for the Internet of Things
G. Uthradevi, Priya Thiruvasagam, S. Mythili, et al.
Deleted Journal (2025)
Closed Access
G. Uthradevi, Priya Thiruvasagam, S. Mythili, et al.
Deleted Journal (2025)
Closed Access
Optimizing cybercrime detection: A hybrid deep learning approach for enhanced intrusion detection systems
Rima Alshaya, Salim El Khediri
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 3
Closed Access
Rima Alshaya, Salim El Khediri
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 3
Closed Access
Attention-Driven Multi-Model Architecture for Unbalanced Network Traffic Intrusion Detection via Extreme Gradient Boosting
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, A. El Alaoui, et al.
Intelligent Systems with Applications (2025), pp. 200519-200519
Open Access
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, A. El Alaoui, et al.
Intelligent Systems with Applications (2025), pp. 200519-200519
Open Access
Advanced IDS: a comparative study of datasets and machine learning algorithms for network flow-based intrusion detection systems
Julio Cesar Munguía Mondragón, Paula Branco, Guy-Vincent Jourdan, et al.
Applied Intelligence (2025) Vol. 55, Iss. 7
Open Access
Julio Cesar Munguía Mondragón, Paula Branco, Guy-Vincent Jourdan, et al.
Applied Intelligence (2025) Vol. 55, Iss. 7
Open Access
The Role of Weibull Distribution for Anomaly Detection in Internet Traffic
Sumayya Zafar, Asad Arfeen
IETE Journal of Research (2025), pp. 1-18
Closed Access
Sumayya Zafar, Asad Arfeen
IETE Journal of Research (2025), pp. 1-18
Closed Access
MDP-AD: A Markov decision process-based adaptive framework for real-time detection of evolving and unknown network attacks
Fan Luo, Tingfa Xu, Jianan Li, et al.
Alexandria Engineering Journal (2025) Vol. 126, pp. 480-490
Closed Access
Fan Luo, Tingfa Xu, Jianan Li, et al.
Alexandria Engineering Journal (2025) Vol. 126, pp. 480-490
Closed Access
Modified Variational Autoencoder and Attention Mechanism‐Based Long Short‐Term Memory for Detecting Intrusions in Imbalanced Network Traffic
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed, et al.
Security and Privacy (2025) Vol. 8, Iss. 3
Closed Access
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed, et al.
Security and Privacy (2025) Vol. 8, Iss. 3
Closed Access
BOA-ACRF: An intrusion detection method for data imbalance problems
Hancheng Long, Huanzhou Li, Zhangguo Tang, et al.
Computers & Electrical Engineering (2025) Vol. 124, pp. 110320-110320
Closed Access
Hancheng Long, Huanzhou Li, Zhangguo Tang, et al.
Computers & Electrical Engineering (2025) Vol. 124, pp. 110320-110320
Closed Access
A Deep Learning Approach for the Detection of Intrusions with an Ensemble Feature Selection Method
Uday Chandra Akuthota, Lava Bhargava
SN Computer Science (2024) Vol. 5, Iss. 7
Closed Access | Times Cited: 1
Uday Chandra Akuthota, Lava Bhargava
SN Computer Science (2024) Vol. 5, Iss. 7
Closed Access | Times Cited: 1
Enhancing network intrusion detection systems with combined network and host traffic features using deep learning: deep learning and IoT perspective
Estabraq Saleem Abduljabbar Alars, Sefer Kurnaz
Deleted Journal (2024) Vol. 27, Iss. 1
Open Access | Times Cited: 1
Estabraq Saleem Abduljabbar Alars, Sefer Kurnaz
Deleted Journal (2024) Vol. 27, Iss. 1
Open Access | Times Cited: 1
Network-Based Intrusion Detection for Industrial and Robotics Systems: A Comprehensive Survey
Richard Holdbrook, Olusola T. Odeyomi, Sun Yi, et al.
Electronics (2024) Vol. 13, Iss. 22, pp. 4440-4440
Open Access | Times Cited: 1
Richard Holdbrook, Olusola T. Odeyomi, Sun Yi, et al.
Electronics (2024) Vol. 13, Iss. 22, pp. 4440-4440
Open Access | Times Cited: 1
XIDINTV: XGBoost-based intrusion detection of imbalance network traffic via variational auto-encoder
Oluwadamilare Harazeem Abdulganiyu, T. Ait Tchaoucht, Mostafa Ezziyyani, et al.
Mathematical Modeling and Computing (2024) Vol. 11, Iss. 4, pp. 930-945
Closed Access | Times Cited: 1
Oluwadamilare Harazeem Abdulganiyu, T. Ait Tchaoucht, Mostafa Ezziyyani, et al.
Mathematical Modeling and Computing (2024) Vol. 11, Iss. 4, pp. 930-945
Closed Access | Times Cited: 1