OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

An effective technique for detecting minority attacks in NIDS using deep learning and sampling approach
R. Harini, N. Maheswari, Sannasi Ganapathy, et al.
Alexandria Engineering Journal (2023) Vol. 78, pp. 469-482
Open Access | Times Cited: 19

Showing 19 citing articles:

Security Information Event Management data acquisition and analysis methods with machine learning principles
Noyan Tendikov, Leila Rzayeva, Bilal Saoud, et al.
Results in Engineering (2024) Vol. 22, pp. 102254-102254
Open Access | Times Cited: 8

Shielding networks: enhancing intrusion detection with hybrid feature selection and stack ensemble learning
Ali Mohammed Alsaffar, Mostafa Nouri-Baygi, Hamed M. Zolbanin
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 7

CNN Channel Attention Intrusion Detection System Using NSL-KDD Dataset
Fatma S. Alrayes, Mohammed Zakariah, Syed Umar Amin, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 3, pp. 4319-4347
Open Access | Times Cited: 5

A Robust Security Detection Strategy for Next Generation IoT Networks
Hafida Assmi, Azidine Guezzaz, Said Benkirane, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2025) Vol. 82, Iss. 1, pp. 443-466
Open Access

Dual replay memory reinforcement learning framework for minority attack detection
Ankit Sharma, Manjeet Singh
Engineering Applications of Artificial Intelligence (2025) Vol. 144, pp. 110083-110083
Closed Access

Ensemble of feature augmented convolutional neural network and deep autoencoder for efficient detection of network attacks
B. Selvakumar, M Sivaanandh, K. Muneeswaran, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access

A novel data-driven integrated detection method for network intrusion classification based on multi-feature imbalanced data
Chia‐Hung Wang, Qing Ye, J. Cai, et al.
Journal of Intelligent & Fuzzy Systems (2024) Vol. 46, Iss. 3, pp. 5893-5910
Closed Access | Times Cited: 3

A multi-classification detection model for imbalanced data in NIDS based on reconstruction and feature matching
Yue Yang, Jieren Cheng, Zhaowu Liu, et al.
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 2

SAGB: self-attention with gate and BiGRU network for intrusion detection
Zhanhui Hu, Guangzhong Liu, Yanping Li, et al.
Complex & Intelligent Systems (2024)
Open Access | Times Cited: 1

Advanced R-GAN: Generating anomaly data for improved detection in imbalanced datasets using regularized generative adversarial networks
Jun‐Hak Lee, Daewoong Jung, Jihoon Moon, et al.
Alexandria Engineering Journal (2024) Vol. 111, pp. 491-510
Open Access | Times Cited: 1

A multiscale approach for network intrusion detection based on variance–covariance subspace distance and EQL v2
Can Liu, Yu Fu, Kun Wang, et al.
Computers & Security (2024), pp. 104173-104173
Closed Access

Intrusion detection in cluster‐based wireless sensor networks: Current issues, opportunities and future research directions
Ayuba John, Ismail Fauzi Isnin, Syed Hamid Hussain Madni, et al.
IET Wireless Sensor Systems (2024)
Open Access

RID-Cloud: Spectral Recurrent Neural Network-Based Intrusion Detection in Cloud Environment
G. Aarthi, Shivam Priya, W. Aisha Banu
IETE Journal of Research (2024), pp. 1-12
Closed Access

Enhancing Intrusion Detection Systems with Dimensionality Reduction and Multi-Stacking Ensemble Techniques
Ali Mohammed Alsaffar, Mostafa Nouri-Baygi, Hamed M. Zolbanin
Algorithms (2024) Vol. 17, Iss. 12, pp. 550-550
Open Access

A Network Intrusion Detection Method for Information Systems Using Federated Learning and Improved Transformer
Qi Zhou, Zhoupu Wang
International Journal on Semantic Web and Information Systems (2023) Vol. 20, Iss. 1, pp. 1-20
Open Access | Times Cited: 1

Enhancing Sign Language Recognition through Deep CNN and Handcrafted Features
K Dinesh Kumar, K Ragul, G Pon Pravin Kumar, et al.
(2024), pp. 1-6
Closed Access

Vulnerable AI: A Survey
Akindele Segun Afolabi, Olubunmi Adewale Akinola
(2024), pp. 1-7
Closed Access

Page 1

Scroll to top