OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A network intrusion detection method based on semantic Re-encoding and deep learning
Zhendong Wu, Jingjing Wang, Liqin Hu, et al.
Journal of Network and Computer Applications (2020) Vol. 164, pp. 102688-102688
Closed Access | Times Cited: 69

Showing 1-25 of 69 citing articles:

Design and Development of a Deep Learning-Based Model for Anomaly Detection in IoT Networks
Imtiaz Ullah, Qusay H. Mahmoud
IEEE Access (2021) Vol. 9, pp. 103906-103926
Open Access | Times Cited: 271

Federated Learning for intrusion detection system: Concepts, challenges and future directions
Shaashwat Agrawal, Sagnik Sarkar, Ons Aouedi, et al.
Computer Communications (2022) Vol. 195, pp. 346-361
Open Access | Times Cited: 213

A Novel Intrusion Detection Method Based on Lightweight Neural Network for Internet of Things
Ruijie Zhao, Guan Gui, Zhi Xue, et al.
IEEE Internet of Things Journal (2021) Vol. 9, Iss. 12, pp. 9960-9972
Open Access | Times Cited: 141

RTIDS: A Robust Transformer-Based Approach for Intrusion Detection System
Zihan Wu, Hong Zhang, Penghai Wang, et al.
IEEE Access (2022) Vol. 10, pp. 64375-64387
Open Access | Times Cited: 125

A systematic literature review for network intrusion detection system (IDS)
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed
International Journal of Information Security (2023) Vol. 22, Iss. 5, pp. 1125-1162
Closed Access | Times Cited: 71

Botnet Attack Detection Using Local Global Best Bat Algorithm for Industrial Internet of Things
Abdullah Alharbi, Wael Alosaimi, Hashem Alyami, et al.
Electronics (2021) Vol. 10, Iss. 11, pp. 1341-1341
Open Access | Times Cited: 91

Cyber Security Intrusion Detection for Agriculture 4.0: Machine Learning-Based Solutions, Datasets, and Future Directions
Mohamed Amine Ferrag, Lei Shu, Othmane Friha, et al.
IEEE/CAA Journal of Automatica Sinica (2021) Vol. 9, Iss. 3, pp. 407-436
Closed Access | Times Cited: 91

Machine learning-based zero-touch network and service management: a survey
Jorge Gallego-Madrid, Ramón Sánchez-Iborra, Pedro M. Ruiz, et al.
Digital Communications and Networks (2021) Vol. 8, Iss. 2, pp. 105-123
Open Access | Times Cited: 69

A comprehensive review on deep learning algorithms: Security and privacy issues
Muhammad Tayyab, Mohsen Marjani, N. Z. Jhanjhi, et al.
Computers & Security (2023) Vol. 131, pp. 103297-103297
Closed Access | Times Cited: 30

Scalable anomaly-based intrusion detection for secure Internet of Things using generative adversarial networks in fog environment
Wei Yao, Han Shi, Hai Zhao
Journal of Network and Computer Applications (2023) Vol. 214, pp. 103622-103622
Closed Access | Times Cited: 27

Towards an efficient model for network intrusion detection system (IDS): systematic literature review
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed
Wireless Networks (2023) Vol. 30, Iss. 1, pp. 453-482
Closed Access | Times Cited: 27

Cybersecurity in the AI era: analyzing the impact of machine learning on intrusion detection
Huiyao Dong, Igor Kotenko
Knowledge and Information Systems (2025)
Closed Access | Times Cited: 1

A survey on deep learning for challenged networks: Applications and trends
Kaylani Bochie, Mateus S. Gilbert, Luana Gantert, et al.
Journal of Network and Computer Applications (2021) Vol. 194, pp. 103213-103213
Closed Access | Times Cited: 49

An Intrusion Detection System Based on Normalized Mutual Information Antibodies Feature Selection and Adaptive Quantum Artificial Immune System
Ling Zhang, Zhang Jia Hao
International Journal on Semantic Web and Information Systems (2022) Vol. 18, Iss. 1, pp. 1-25
Open Access | Times Cited: 38

Cybersecurity Deep: Approaches, Attacks Dataset, and Comparative Study
Kousik Barik, Sanjay Misra, Karabi Konar, et al.
Applied Artificial Intelligence (2022) Vol. 36, Iss. 1
Open Access | Times Cited: 32

Hybrid deep-learning model to detect botnet attacks over internet of things environments
Mohammed Y. Alzahrani, Alwi M. Bamhdi
Soft Computing (2022) Vol. 26, Iss. 16, pp. 7721-7735
Open Access | Times Cited: 32

Network intrusion detection: a comparative study of four classifiers using the NSL-KDD and KDD’99 datasets
Ananya Devarakonda, Nilesh Kumar Sharma, Prita Saha, et al.
Journal of Physics Conference Series (2022) Vol. 2161, Iss. 1, pp. 012043-012043
Open Access | Times Cited: 30

Intrusion detection for Industrial Internet of Things based on deep learning
Yaoyao Lu, Senchun Chai, Yuhan Suo, et al.
Neurocomputing (2023) Vol. 564, pp. 126886-126886
Closed Access | Times Cited: 18

A review on deep learning applications with semantics
Emre Akdemir, Necaattin Barışçı
Expert Systems with Applications (2024) Vol. 251, pp. 124029-124029
Closed Access | Times Cited: 8

An Enhanced Hybrid Intrusion Detection Based on Crow Search Analysis Optimizations and Artificial Neural Network
Chetan Gupta, Amit Kumar, Neelesh Kumar Jain
Wireless Personal Communications (2024) Vol. 134, Iss. 1, pp. 43-68
Closed Access | Times Cited: 6

Towards a Hybrid Deep Learning Model for Anomalous Activities Detection in Internet of Things Networks
Imtiaz Ullah, Ayaz Ullah, Mazhar Sajjad
IoT (2021) Vol. 2, Iss. 3, pp. 428-448
Open Access | Times Cited: 38

A Hierarchical Intrusion Detection Model Combining Multiple Deep Learning Models With Attention Mechanism
Hongsheng Xu, Libo Sun, Ganglong Fan, et al.
IEEE Access (2023) Vol. 11, pp. 66212-66226
Open Access | Times Cited: 15

A Survey on Intrusion Detection System in IoT Networks
Md. Mahbubur Rahman, Shaharia Al Shakil, Maimunah Mustakim
Cyber Security and Applications (2024) Vol. 3, pp. 100082-100082
Open Access | Times Cited: 4

SE-DWNet: An Advanced ResNet-Based Model for Intrusion Detection with Symmetric Data Distribution
Kunsan Zhang, Rongqin Zheng, Chaopeng Li, et al.
Symmetry (2025) Vol. 17, Iss. 4, pp. 526-526
Open Access

RANet: Network intrusion detection with group-gating convolutional neural network
Xiaoqing Zhang, Fei Yang, Yue Hu, et al.
Journal of Network and Computer Applications (2021) Vol. 198, pp. 103266-103266
Closed Access | Times Cited: 26

Page 1 - Next Page

Scroll to top