
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic
Farhan Ullah, Shamsher Ullah, Gautam Srivastava, et al.
Digital Communications and Networks (2023) Vol. 10, Iss. 1, pp. 190-204
Open Access | Times Cited: 65
Farhan Ullah, Shamsher Ullah, Gautam Srivastava, et al.
Digital Communications and Networks (2023) Vol. 10, Iss. 1, pp. 190-204
Open Access | Times Cited: 65
Showing 1-25 of 65 citing articles:
FlowTransformer: A transformer framework for flow-based network intrusion detection systems
Liam Daly Manocchio, Siamak Layeghy, Wai Weng Lo, et al.
Expert Systems with Applications (2023) Vol. 241, pp. 122564-122564
Open Access | Times Cited: 36
Liam Daly Manocchio, Siamak Layeghy, Wai Weng Lo, et al.
Expert Systems with Applications (2023) Vol. 241, pp. 122564-122564
Open Access | Times Cited: 36
CNN-GRU-FF: a double-layer feature fusion-based network intrusion detection system using convolutional neural network and gated recurrent units
Yakubu Imrana, Yanping Xiang, Liaqat Ali, et al.
Complex & Intelligent Systems (2024) Vol. 10, Iss. 3, pp. 3353-3370
Open Access | Times Cited: 10
Yakubu Imrana, Yanping Xiang, Liaqat Ali, et al.
Complex & Intelligent Systems (2024) Vol. 10, Iss. 3, pp. 3353-3370
Open Access | Times Cited: 10
A Review of Advancements and Applications of Pre-Trained Language Models in Cybersecurity
Zefang Liu
(2024), pp. 1-10
Closed Access | Times Cited: 9
Zefang Liu
(2024), pp. 1-10
Closed Access | Times Cited: 9
Elevated few-shot network intrusion detection via self-attention mechanisms and iterative refinement
Congyuan Xu, Yong Zhao Zhan, Guanghui Chen, et al.
PLoS ONE (2025) Vol. 20, Iss. 1, pp. e0317713-e0317713
Open Access | Times Cited: 1
Congyuan Xu, Yong Zhao Zhan, Guanghui Chen, et al.
PLoS ONE (2025) Vol. 20, Iss. 1, pp. e0317713-e0317713
Open Access | Times Cited: 1
Optimized detection of cyber-attacks on IoT networks via hybrid deep learning models
Ahmed Bensaoud, Jugal Kalita
Ad Hoc Networks (2025) Vol. 170, pp. 103770-103770
Open Access | Times Cited: 1
Ahmed Bensaoud, Jugal Kalita
Ad Hoc Networks (2025) Vol. 170, pp. 103770-103770
Open Access | Times Cited: 1
Explainable TabNet Transformer-based on Google Vizier Optimizer for Anomaly Intrusion Detection System
Ibrahim Ahmed Fares, Mohamed Abd Elaziz
Knowledge-Based Systems (2025), pp. 113351-113351
Closed Access | Times Cited: 1
Ibrahim Ahmed Fares, Mohamed Abd Elaziz
Knowledge-Based Systems (2025), pp. 113351-113351
Closed Access | Times Cited: 1
APELID: Enhancing real-time intrusion detection with augmented WGAN and parallel ensemble learning
Hoang V. Vo, Hanh P. Du, Hoa N. Nguyen
Computers & Security (2023) Vol. 136, pp. 103567-103567
Closed Access | Times Cited: 19
Hoang V. Vo, Hanh P. Du, Hoa N. Nguyen
Computers & Security (2023) Vol. 136, pp. 103567-103567
Closed Access | Times Cited: 19
Explainable deep learning approach for advanced persistent threats (APTs) detection in cybersecurity: a review
Noor Hazlina Abdul Mutalib, Aznul Qalid Md Sabri, Ainuddin Wahid Abdul Wahab, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 11
Open Access | Times Cited: 8
Noor Hazlina Abdul Mutalib, Aznul Qalid Md Sabri, Ainuddin Wahid Abdul Wahab, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 11
Open Access | Times Cited: 8
Enhanced Network Intrusion Detection System for Internet of Things Security Using Multimodal Big Data Representation with Transfer Learning and Game Theory
Farhan Ullah, Ali Turab, Shamsher Ullah, et al.
Sensors (2024) Vol. 24, Iss. 13, pp. 4152-4152
Open Access | Times Cited: 7
Farhan Ullah, Ali Turab, Shamsher Ullah, et al.
Sensors (2024) Vol. 24, Iss. 13, pp. 4152-4152
Open Access | Times Cited: 7
Enhanced Network Intrusion Detection System Using PCGSO-Optimized BI-GRU Model in AI-Driven Cybersecurity
Priyan Malarvizhi Kumar, Kavya Vedantham, S. Jeeva, et al.
(2024)
Closed Access | Times Cited: 6
Priyan Malarvizhi Kumar, Kavya Vedantham, S. Jeeva, et al.
(2024)
Closed Access | Times Cited: 6
A novel intrusion detection framework for optimizing IoT security
Abdul Qaddos, Muhammad Usman Yaseen, Ahmad Sami Al-Shamayleh, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 6
Abdul Qaddos, Muhammad Usman Yaseen, Ahmad Sami Al-Shamayleh, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 6
Intrusion Detection Model Based on Improved Transformer
Yi Liu, Lanjian Wu
Applied Sciences (2023) Vol. 13, Iss. 10, pp. 6251-6251
Open Access | Times Cited: 15
Yi Liu, Lanjian Wu
Applied Sciences (2023) Vol. 13, Iss. 10, pp. 6251-6251
Open Access | Times Cited: 15
Empowering Network Security: BERT Transformer Learning Approach and MLP for Intrusion Detection in Imbalanced Network Traffic
Zeeshan Ali, Walter Tiberti, Andrea Marotta, et al.
IEEE Access (2024) Vol. 12, pp. 137618-137633
Open Access | Times Cited: 5
Zeeshan Ali, Walter Tiberti, Andrea Marotta, et al.
IEEE Access (2024) Vol. 12, pp. 137618-137633
Open Access | Times Cited: 5
Large Language Models Meet Next-Generation Networking Technologies: A Review
Ching Nam Hang, Pei-Duo Yu, Roberto Morabito, et al.
Future Internet (2024) Vol. 16, Iss. 10, pp. 365-365
Open Access | Times Cited: 5
Ching Nam Hang, Pei-Duo Yu, Roberto Morabito, et al.
Future Internet (2024) Vol. 16, Iss. 10, pp. 365-365
Open Access | Times Cited: 5
FPE–Transformer: A Feature Positional Encoding-Based Transformer Model for Attack Detection
Hande Çavşi Zaim, Esra YOLAÇAN
Applied Sciences (2025) Vol. 15, Iss. 3, pp. 1252-1252
Open Access
Hande Çavşi Zaim, Esra YOLAÇAN
Applied Sciences (2025) Vol. 15, Iss. 3, pp. 1252-1252
Open Access
USB-GATE: USB-based GAN-augmented transformer reinforced defense framework for adversarial keystroke injection attacks
Anil Kumar Chillara, Paresh Saxena, Rajib Ranjan Maiti
International Journal of Information Security (2025) Vol. 24, Iss. 2
Closed Access
Anil Kumar Chillara, Paresh Saxena, Rajib Ranjan Maiti
International Journal of Information Security (2025) Vol. 24, Iss. 2
Closed Access
DIFT: A Diffusion-Transformer for Intrusion Detection of IoT with Imbalanced Learning
Peng Wang, Yafei Song, Xiaodan Wang, et al.
Journal of Network and Systems Management (2025) Vol. 33, Iss. 3
Closed Access
Peng Wang, Yafei Song, Xiaodan Wang, et al.
Journal of Network and Systems Management (2025) Vol. 33, Iss. 3
Closed Access
A Comparative Study for New-Age Attacks in a Machine Learning-Based Intrusion Detection System
Diya, Vibha Pratap
Lecture notes in networks and systems (2025), pp. 619-640
Closed Access
Diya, Vibha Pratap
Lecture notes in networks and systems (2025), pp. 619-640
Closed Access
Multi-layered security architecture for IoMT systems: integrating dynamic key management, decentralized storage, and dependable intrusion detection framework
Nikhil Sharma, Prashant Giridhar Shambharkar
International Journal of Machine Learning and Cybernetics (2025)
Closed Access
Nikhil Sharma, Prashant Giridhar Shambharkar
International Journal of Machine Learning and Cybernetics (2025)
Closed Access
Dual replay memory reinforcement learning framework for minority attack detection
Ankit Sharma, Manjeet Singh
Engineering Applications of Artificial Intelligence (2025) Vol. 144, pp. 110083-110083
Closed Access
Ankit Sharma, Manjeet Singh
Engineering Applications of Artificial Intelligence (2025) Vol. 144, pp. 110083-110083
Closed Access
Fine-Grained Encrypted Traffic Classification Using Dual Embedding and Graph Neural Networks
Zhengyang Liu, Qiang Wei, Qisong Song, et al.
Electronics (2025) Vol. 14, Iss. 4, pp. 778-778
Open Access
Zhengyang Liu, Qiang Wei, Qisong Song, et al.
Electronics (2025) Vol. 14, Iss. 4, pp. 778-778
Open Access
ADFCNN-BiLSTM: A Deep Neural Network Based on Attention and Deformable Convolution for Network Intrusion Detection
Bin Li, Jie Li, Mingyu Jia
Sensors (2025) Vol. 25, Iss. 5, pp. 1382-1382
Open Access
Bin Li, Jie Li, Mingyu Jia
Sensors (2025) Vol. 25, Iss. 5, pp. 1382-1382
Open Access
An Adaptive Framework for Intrusion Detection in IoT Security Using MAML (Model-Agnostic Meta-Learning)
Fatma S. Alrayes, Syed Umar Amin, Nada Ali Hakami
Sensors (2025) Vol. 25, Iss. 8, pp. 2487-2487
Open Access
Fatma S. Alrayes, Syed Umar Amin, Nada Ali Hakami
Sensors (2025) Vol. 25, Iss. 8, pp. 2487-2487
Open Access
Deep neural networks and stochastic methods for cognitive modeling of rat behavioral dynamics in $$\mathbb {T}$$-mazes
Ali Turab, Josué Antonio Nescolarde‐Selva, Farhan Ullah, et al.
Cognitive Neurodynamics (2025) Vol. 19, Iss. 1
Open Access
Ali Turab, Josué Antonio Nescolarde‐Selva, Farhan Ullah, et al.
Cognitive Neurodynamics (2025) Vol. 19, Iss. 1
Open Access
An advanced attack categorization in NIDS using enhanced deep learning based EOptResfEANet methodology with hybrid feature extraction
Vinolia Alexander Moudiappa, K. R. Nataraj, V.N. Rajavarman
Cluster Computing (2025) Vol. 28, Iss. 5
Closed Access
Vinolia Alexander Moudiappa, K. R. Nataraj, V.N. Rajavarman
Cluster Computing (2025) Vol. 28, Iss. 5
Closed Access