OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Dependable intrusion detection system using deep convolutional neural network: A Novel framework and performance evaluation approach
Vanlalruata Hnamte, Jamal Hussain
Telematics and Informatics Reports (2023) Vol. 11, pp. 100077-100077
Open Access | Times Cited: 49

Showing 1-25 of 49 citing articles:

Advancing cybersecurity: a comprehensive review of AI-driven detection techniques
A Salem, Safaa M. Azzam, O. E. Emam, et al.
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 36

An end-to-end learning approach for enhancing intrusion detection in Industrial-Internet of Things
Karima Hassini, Safae Khalis, Omar Habibi, et al.
Knowledge-Based Systems (2024) Vol. 294, pp. 111785-111785
Closed Access | Times Cited: 19

DDoS attack detection and mitigation using deep neural network in SDN environment
Vanlalruata Hnamte, Ashfaq Ahmad Najar, Hong-Nhung Nguyen, et al.
Computers & Security (2023) Vol. 138, pp. 103661-103661
Closed Access | Times Cited: 35

Enhanced CNN-LSTM Deep Learning for SCADA IDS Featuring Hurst Parameter Self-Similarity
Asaad Balla, Mohamed Hadi Habaebi, Elfatih A. A. Elsheikh, et al.
IEEE Access (2024) Vol. 12, pp. 6100-6116
Open Access | Times Cited: 6

Explainable AI-based innovative hybrid ensemble model for intrusion detection
Usman Ahmed, Jiangbin Zheng, Ahmad Almogren, et al.
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 6

5G-SIID: an intelligent hybrid DDoS intrusion detector for 5G IoT networks
Sapna Sadhwani, Aakar Mathur, Raja Muthalagu, et al.
International Journal of Machine Learning and Cybernetics (2024)
Closed Access | Times Cited: 4

A comprehensive framework for cyber threat detection: leveraging AI, NLP, and malware analysis
Nachaat Mohamed
International Journal of Information Technology (2025)
Closed Access

Securing SDON with hybrid evolutionary intrusion detection system: An ensemble algorithm for feature selection and classification
Benitha Christinal J, Ameelia Roseline A
Optical Fiber Technology (2025) Vol. 93, pp. 104206-104206
Closed Access

Synergizing Machine Learning: A Comparative Exploration of Hybrid Models for Intrusion Detection
Vinod Sharma, Dharmesh Shah
Algorithms for intelligent systems (2025), pp. 145-162
Closed Access

Memory feedback transformer based intrusion detection system for IoMT healthcare networks
Jamshed Ali Shaikh, Chengliang Wang, Saifullah, et al.
Internet of Things (2025), pp. 101597-101597
Closed Access

Swarm optimized differential evolution and probabilistic extreme learning based intrusion detection in MANET
R. D. Sathiya, N. Yuvaraj
Computers & Security (2024) Vol. 144, pp. 103970-103970
Closed Access | Times Cited: 3

Detecting attacks on the internet of things network in the computing fog layer with an embedded learning approach based on clustering and blockchain
Abdolmanan Babaei Goushlavandani, Peyman Bayat, Gholamhossein Ekbatanifard
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access

Artificial Intelligence-Driven Network Intrusion Detection and Response System
Haokun Chen, Yiqun Wang, Song Zhai, et al.
Lecture notes in networks and systems (2025), pp. 508-518
Closed Access

SWADES : A blockchain enabled secure whitelisting in attack detection system to resist against DDOS attack
Rahul Saha, Sukanta Chakraborty, Abhishek Majumder, et al.
Procedia Computer Science (2025) Vol. 258, pp. 1476-1485
Open Access

Intrusion Detection With Deep Learning Classifiers: A Synergistic Approach of Probabilistic Clustering and Human Expertise to Reduce False Alarms
Abdoul-Aziz Maiga, Edwin Ataro, Stanley Githinji
IEEE Access (2024) Vol. 12, pp. 17836-17858
Open Access | Times Cited: 2

A hierarchical hybrid intrusion detection model for industrial internet of things
Zhendong Wang, Xin Yang, Zhiyuan Zeng, et al.
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 5, pp. 3385-3407
Closed Access | Times Cited: 2

Secure and Reliable Intrusion Detection Scheme for Software-Defined Networking Using LFTS-Rnn and PC-JTFOA
Manoj Kumar, T. Purusothaman, R. Lakshmana Kumar
IETE Journal of Research (2024), pp. 1-16
Closed Access | Times Cited: 2

Enhancing Network Threat Detection with Random Forest-Based NIDS and Permutation Feature Importance
Mohammed Abdelaziz, Abdelrahman Radwan, Hesham Mamdouh, et al.
Journal of Network and Systems Management (2024) Vol. 33, Iss. 1
Open Access | Times Cited: 2

Applications of Machine Learning in Cyber Security: A Review
Ioannis Vourganas, Anna Lito Michala
Journal of Cybersecurity and Privacy (2024) Vol. 4, Iss. 4, pp. 972-992
Open Access | Times Cited: 2

Application of Deep Neural Network with Frequency Domain Filtering in the Field of Intrusion Detection
Zhendong Wang, Jingfei Li, Zhenyu Xu, et al.
International Journal of Intelligent Systems (2023) Vol. 2023, pp. 1-33
Open Access | Times Cited: 4

Healthcare Intrusion Detection using Hybrid Correlation-based Feature Selection-Bat Optimization Algorithm with Convolutional Neural Network
H. Kanakadurga Bella, S. Vasundra
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 1
Open Access | Times Cited: 1

Enhancing network security with information-guided-enhanced Runge Kutta feature selection for intrusion detection
Yuan Li, Xiongjun Tian, Jiacheng Yuan, et al.
Cluster Computing (2024)
Closed Access | Times Cited: 1

OPTIONS Attack Detection in WSN using Optimized Multitask Multi-Attention Residual Shrinkage Convolutional Neural Network
Tamil Selvi S, P. Visalakshi, Senthil Kumar M
Knowledge-Based Systems (2024) Vol. 300, pp. 112227-112227
Closed Access | Times Cited: 1

Page 1 - Next Page

Scroll to top