
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A two-stage stacked ensemble intrusion detection system using five base classifiers and MLP with optimal feature selection
Earum Mushtaq, Aneela Zameer, Asifullah Khan
Microprocessors and Microsystems (2022) Vol. 94, pp. 104660-104660
Closed Access | Times Cited: 24
Earum Mushtaq, Aneela Zameer, Asifullah Khan
Microprocessors and Microsystems (2022) Vol. 94, pp. 104660-104660
Closed Access | Times Cited: 24
Showing 24 citing articles:
Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review
Yazeed Yasin Ghadi, Tehseen Mazhar, Tamara Al Shloul, et al.
IEEE Access (2024) Vol. 12, pp. 12699-12719
Open Access | Times Cited: 28
Yazeed Yasin Ghadi, Tehseen Mazhar, Tamara Al Shloul, et al.
IEEE Access (2024) Vol. 12, pp. 12699-12719
Open Access | Times Cited: 28
Detecting and Mitigating Botnet Attacks in Software-Defined Networks Using Deep Learning Techniques
Muhammad Waqas Nadeem, Hock Guan Goh, Yichiet Aun, et al.
IEEE Access (2023) Vol. 11, pp. 49153-49171
Open Access | Times Cited: 22
Muhammad Waqas Nadeem, Hock Guan Goh, Yichiet Aun, et al.
IEEE Access (2023) Vol. 11, pp. 49153-49171
Open Access | Times Cited: 22
Shielding networks: enhancing intrusion detection with hybrid feature selection and stack ensemble learning
Ali Mohammed Alsaffar, Mostafa Nouri-Baygi, Hamed M. Zolbanin
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 7
Ali Mohammed Alsaffar, Mostafa Nouri-Baygi, Hamed M. Zolbanin
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 7
An Enhanced Hybrid Intrusion Detection Based on Crow Search Analysis Optimizations and Artificial Neural Network
Chetan Gupta, Amit Kumar, Neelesh Kumar Jain
Wireless Personal Communications (2024) Vol. 134, Iss. 1, pp. 43-68
Closed Access | Times Cited: 6
Chetan Gupta, Amit Kumar, Neelesh Kumar Jain
Wireless Personal Communications (2024) Vol. 134, Iss. 1, pp. 43-68
Closed Access | Times Cited: 6
Intrusion detection systems for wireless sensor networks using computational intelligence techniques
Vaishnavi Sivagaminathan, Manmohan Sharma, Santosh Kumar Henge
Cybersecurity (2023) Vol. 6, Iss. 1
Open Access | Times Cited: 13
Vaishnavi Sivagaminathan, Manmohan Sharma, Santosh Kumar Henge
Cybersecurity (2023) Vol. 6, Iss. 1
Open Access | Times Cited: 13
Overcoming the Challenges of Data Lack, Leakage, and Dimensionality in Intrusion Detection Systems: A Comprehensive Review
Mohamed Aly Bouke, Azizol Abdullah, Nur Izura Udzir, et al.
Journal of Communication and Information Systems (2024) Vol. 39, Iss. 2024, pp. 22-34
Open Access | Times Cited: 5
Mohamed Aly Bouke, Azizol Abdullah, Nur Izura Udzir, et al.
Journal of Communication and Information Systems (2024) Vol. 39, Iss. 2024, pp. 22-34
Open Access | Times Cited: 5
Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection systems
Mohamed Aly Bouke, Azizol Abdullah, Korhan Cengiz, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2043-e2043
Open Access | Times Cited: 5
Mohamed Aly Bouke, Azizol Abdullah, Korhan Cengiz, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2043-e2043
Open Access | Times Cited: 5
Knacks of a hybrid anomaly detection model using deep auto-encoder driven gated recurrent unit
Earum Mushtaq, Aneela Zameer, Rubina Nasir
Computer Networks (2023) Vol. 226, pp. 109681-109681
Closed Access | Times Cited: 12
Earum Mushtaq, Aneela Zameer, Rubina Nasir
Computer Networks (2023) Vol. 226, pp. 109681-109681
Closed Access | Times Cited: 12
An improved Harris Hawks optimizer based feature selection technique with effective two-staged classifier for network intrusion detection system
U Nandhini, Santhosh Kumar SVN
Peer-to-Peer Networking and Applications (2024)
Closed Access | Times Cited: 4
U Nandhini, Santhosh Kumar SVN
Peer-to-Peer Networking and Applications (2024)
Closed Access | Times Cited: 4
An Adaptive Framework for Intrusion Detection in IoT Security Using MAML (Model-Agnostic Meta-Learning)
Fatma S. Alrayes, Syed Umar Amin, Nada Ali Hakami
Sensors (2025) Vol. 25, Iss. 8, pp. 2487-2487
Open Access
Fatma S. Alrayes, Syed Umar Amin, Nada Ali Hakami
Sensors (2025) Vol. 25, Iss. 8, pp. 2487-2487
Open Access
Etemadi reliability-based multi-layer perceptrons for classification and forecasting
Sepideh Etemadi, Mehdi Khashei, Saba Tamizi
Information Sciences (2023) Vol. 651, pp. 119716-119716
Closed Access | Times Cited: 7
Sepideh Etemadi, Mehdi Khashei, Saba Tamizi
Information Sciences (2023) Vol. 651, pp. 119716-119716
Closed Access | Times Cited: 7
A multi-label network attack detection approach based on two-stage model fusion
Yongqing Huang, Jin Gou, Zongwen Fan, et al.
Journal of Information Security and Applications (2024) Vol. 83, pp. 103790-103790
Closed Access | Times Cited: 2
Yongqing Huang, Jin Gou, Zongwen Fan, et al.
Journal of Information Security and Applications (2024) Vol. 83, pp. 103790-103790
Closed Access | Times Cited: 2
Hybrid Learning Model for intrusion detection system: A combination of parametric and non-parametric classifiers
C. Rajathi, P. Rukmani
Alexandria Engineering Journal (2024) Vol. 112, pp. 384-396
Open Access | Times Cited: 2
C. Rajathi, P. Rukmani
Alexandria Engineering Journal (2024) Vol. 112, pp. 384-396
Open Access | Times Cited: 2
Enhancing Cybersecurity In Network Intrusion Detection System Based On Artificial Intelligence (AI) Techniques
Sanjay Bauskar
SSRN Electronic Journal (2024)
Closed Access | Times Cited: 1
Sanjay Bauskar
SSRN Electronic Journal (2024)
Closed Access | Times Cited: 1
Localization of Dielectric Anomalies with Multi-level Outlier Detection through Membership Function and Ensemble Classification Framework
Najumunnisa Md, Sastry ASCS, B. T. P. Madhav
Scalable Computing Practice and Experience (2024) Vol. 25, Iss. 3, pp. 1681-1701
Open Access
Najumunnisa Md, Sastry ASCS, B. T. P. Madhav
Scalable Computing Practice and Experience (2024) Vol. 25, Iss. 3, pp. 1681-1701
Open Access
A Novel Ensemble Machine Learning and Deep Learning Techniques with Feature Extraction and Selection for Fake News Stance Detection: A Comparative Analysis
A. Vaideghy, C. Thiyagarajan
(2024), pp. 1-14
Closed Access
A. Vaideghy, C. Thiyagarajan
(2024), pp. 1-14
Closed Access
An enhanced whale optimizer based feature selection technique with effective ensemble classifier for network intrusion detection system
U Nandhini, S. Vasantha Kumar
Peer-to-Peer Networking and Applications (2024) Vol. 18, Iss. 2
Closed Access
U Nandhini, S. Vasantha Kumar
Peer-to-Peer Networking and Applications (2024) Vol. 18, Iss. 2
Closed Access
Modified MMS: Minimization Approach for Model Subset Selection
C. Rajathi, P. Rukmani
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 77, Iss. 1, pp. 733-756
Open Access | Times Cited: 1
C. Rajathi, P. Rukmani
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 77, Iss. 1, pp. 733-756
Open Access | Times Cited: 1
An Optimized Bagging Learning with Ensemble Feature Selection Method for URL Phishing Detection
Ponni Ponnusamy, D. Prabha
Journal of Electrical Engineering and Technology (2023) Vol. 19, Iss. 3, pp. 1881-1889
Closed Access | Times Cited: 1
Ponni Ponnusamy, D. Prabha
Journal of Electrical Engineering and Technology (2023) Vol. 19, Iss. 3, pp. 1881-1889
Closed Access | Times Cited: 1
An Integrated Feature Extraction Based on Principal Components and Deep Auto Encoder with Extra Tree for Intrusion Detection Systems
Seshu Bhavani Mallampati, Hari Seetha
Journal of Information & Knowledge Management (2023) Vol. 23, Iss. 01
Closed Access | Times Cited: 1
Seshu Bhavani Mallampati, Hari Seetha
Journal of Information & Knowledge Management (2023) Vol. 23, Iss. 01
Closed Access | Times Cited: 1
Cost-sensitive stacked long short-term memory with an evolutionary framework for minority class detection
Asima Akber Abbasi, Aneela Zameer, Earum Mushtaq, et al.
Applied Soft Computing (2024) Vol. 165, pp. 112098-112098
Closed Access
Asima Akber Abbasi, Aneela Zameer, Earum Mushtaq, et al.
Applied Soft Computing (2024) Vol. 165, pp. 112098-112098
Closed Access
Assisted diagnosis of neuropsychiatric disorders based on functional connectivity: A survey on application and performance evaluation of graph neural network
Jin Gu, Xiaoming Zha, Jiaming Zhang, et al.
Expert Systems with Applications (2024) Vol. 265, pp. 125922-125922
Closed Access
Jin Gu, Xiaoming Zha, Jiaming Zhang, et al.
Expert Systems with Applications (2024) Vol. 265, pp. 125922-125922
Closed Access
MalNet: Detection of Malwares Using Ensemble Learning Techniques
M. Nivaashini, S Aarthi, R. Ramya
2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA) (2023), pp. 1469-1477
Closed Access
M. Nivaashini, S Aarthi, R. Ramya
2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA) (2023), pp. 1469-1477
Closed Access
Um Mapeamento Sistemático sobre Detecção de Ataques em Redes de Computadores
Gabrielly da Silva, Carina Oliveira, Reinaldo Braga
(2023), pp. 11-20
Open Access
Gabrielly da Silva, Carina Oliveira, Reinaldo Braga
(2023), pp. 11-20
Open Access