
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An intrusion detection method based on stacked sparse autoencoder and improved gaussian mixture model
Tianyue Zhang, Wei Chen, Yu-Xiao Liu, et al.
Computers & Security (2023) Vol. 128, pp. 103144-103144
Closed Access | Times Cited: 15
Tianyue Zhang, Wei Chen, Yu-Xiao Liu, et al.
Computers & Security (2023) Vol. 128, pp. 103144-103144
Closed Access | Times Cited: 15
Showing 15 citing articles:
Multi-task learning for IoT traffic classification: A comparative analysis of deep autoencoders
Huiyao Dong, Igor Kotenko
Future Generation Computer Systems (2024) Vol. 158, pp. 242-254
Closed Access | Times Cited: 5
Huiyao Dong, Igor Kotenko
Future Generation Computer Systems (2024) Vol. 158, pp. 242-254
Closed Access | Times Cited: 5
Research on Dung Beetle Optimization Based Stacked Sparse Autoencoder for Network Situation Element Extraction
Yongchao Yang, Pan Zhao
IEEE Access (2024) Vol. 12, pp. 24014-24026
Open Access | Times Cited: 3
Yongchao Yang, Pan Zhao
IEEE Access (2024) Vol. 12, pp. 24014-24026
Open Access | Times Cited: 3
Machine learning-inspired intrusion detection system for IoT: Security issues and future challenges
Tariq Ahamed Ahanger, Imdad Ullah, Shabbab Algamdi, et al.
Computers & Electrical Engineering (2025) Vol. 123, pp. 110265-110265
Closed Access
Tariq Ahamed Ahanger, Imdad Ullah, Shabbab Algamdi, et al.
Computers & Electrical Engineering (2025) Vol. 123, pp. 110265-110265
Closed Access
Network Intrusion Detection Based on Feature Image and Deformable Vision Transformer Classification
Kan He, Wei Zhang, Xuejun Zong, et al.
IEEE Access (2024) Vol. 12, pp. 44335-44350
Open Access | Times Cited: 3
Kan He, Wei Zhang, Xuejun Zong, et al.
IEEE Access (2024) Vol. 12, pp. 44335-44350
Open Access | Times Cited: 3
Damage evolution of coal gasification slag based backfill by acoustic emission and Gaussian mixed moving average filtering method
Haotian Pang, Wenyue Qi, Yanli Huang, et al.
Construction and Building Materials (2024) Vol. 439, pp. 137321-137321
Closed Access | Times Cited: 3
Haotian Pang, Wenyue Qi, Yanli Huang, et al.
Construction and Building Materials (2024) Vol. 439, pp. 137321-137321
Closed Access | Times Cited: 3
High-speed anomaly traffic detection based on staged frequency domain features
Jiayi Ni, Wei Chen, Jiacheng Tong, et al.
Journal of Information Security and Applications (2023) Vol. 77, pp. 103575-103575
Closed Access | Times Cited: 4
Jiayi Ni, Wei Chen, Jiacheng Tong, et al.
Journal of Information Security and Applications (2023) Vol. 77, pp. 103575-103575
Closed Access | Times Cited: 4
Machine learning-based attack detection for the Internet of Things
Dawit Dejene Bikila, Jan Čapek
Future Generation Computer Systems (2024), pp. 107630-107630
Closed Access | Times Cited: 1
Dawit Dejene Bikila, Jan Čapek
Future Generation Computer Systems (2024), pp. 107630-107630
Closed Access | Times Cited: 1
Machine Learning-Based Attack Detection for the Internet of Things
Dawit Dejene Bikila, Jan Čapek
(2024)
Closed Access
Dawit Dejene Bikila, Jan Čapek
(2024)
Closed Access
AED: A Novel Approach for Intrusion Detection without Abnormal Samples in Big Data Environment
Xiaodong Wang, Longyun Qi, Xingshen Wei, et al.
Journal of Data and Information Quality (2024)
Closed Access
Xiaodong Wang, Longyun Qi, Xingshen Wei, et al.
Journal of Data and Information Quality (2024)
Closed Access
Optimization of Network Intrusion Detection Model Based on Big Data Analysis
Jizhou Shan, Hong Ma
Journal of Cyber Security and Mobility (2024)
Open Access
Jizhou Shan, Hong Ma
Journal of Cyber Security and Mobility (2024)
Open Access
Autoencoder Feature Residuals for Network Intrusion Detection: One-Class Pretraining for Improved Performance
Brian Lewandowski, Randy Paffenroth
Machine Learning and Knowledge Extraction (2023) Vol. 5, Iss. 3, pp. 868-890
Open Access | Times Cited: 1
Brian Lewandowski, Randy Paffenroth
Machine Learning and Knowledge Extraction (2023) Vol. 5, Iss. 3, pp. 868-890
Open Access | Times Cited: 1
An Intrusion Detection Method Based on Attention Mechanism to Improve CNN-BiLSTM Model
Dingyu Shou, Chao Li, Zhen Wang, et al.
The Computer Journal (2023) Vol. 67, Iss. 5, pp. 1851-1865
Closed Access | Times Cited: 1
Dingyu Shou, Chao Li, Zhen Wang, et al.
The Computer Journal (2023) Vol. 67, Iss. 5, pp. 1851-1865
Closed Access | Times Cited: 1
TSSAN: Time-Space Separable Attention Network for Intrusion Detection
Rui Xu, Qi Zhang, Yunjie Zhang
IEEE Access (2024) Vol. 12, pp. 98734-98749
Open Access
Rui Xu, Qi Zhang, Yunjie Zhang
IEEE Access (2024) Vol. 12, pp. 98734-98749
Open Access
Deep Learning-Based Network Intrusion Detection Systems: A Systematic Literature Review
Leonard L. Mutembei, Makhamisa Senekane, Terence L. van Zyl
Communications in computer and information science (2024), pp. 207-234
Closed Access
Leonard L. Mutembei, Makhamisa Senekane, Terence L. van Zyl
Communications in computer and information science (2024), pp. 207-234
Closed Access
Multi-Task Learning Approach for Network Traffic Classification: A Comparative Analysis for Deep Auto Encoders
Huiyao Dong, Igor Kotenko
(2023)
Closed Access
Huiyao Dong, Igor Kotenko
(2023)
Closed Access