OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

The Weighted Word2vec Paragraph Vectors for Anomaly Detection Over HTTP Traffic
Jieling Li, Hao Zhang, Z Wei
IEEE Access (2020) Vol. 8, pp. 141787-141798
Open Access | Times Cited: 43

Showing 1-25 of 43 citing articles:

IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic
Farhan Ullah, Shamsher Ullah, Gautam Srivastava, et al.
Digital Communications and Networks (2023) Vol. 10, Iss. 1, pp. 190-204
Open Access | Times Cited: 65

Ensemble learning for intrusion detection systems: A systematic mapping study and cross-benchmark evaluation
Bayu Adhi Tama, Sunghoon Lim
Computer Science Review (2020) Vol. 39, pp. 100357-100357
Open Access | Times Cited: 131

iNIDS: SWOT Analysis and TOWS Inferences of State-of-the-Art NIDS solutions for the development of Intelligent Network Intrusion Detection System
Jyoti Verma, Abhinav Bhandari, Gurpreet Singh
Computer Communications (2022) Vol. 195, pp. 227-247
Closed Access | Times Cited: 29

Deep Learning-driven Methods for Network-based Intrusion Detection Systems: A Systematic Review
Ramya Chinnasamy, Malliga Subramanian, Sathishkumar Veerappampalayam Easwaramoorthy, et al.
ICT Express (2025)
Open Access

Network traffic inspection to enhance anomaly detection in the Internet of Things using attention-driven Deep Learning
Mireya Lucia Hernandez-Jaimes, Alfonso Martínez-Cruz, Kelsey Alejandra Ramírez-Gutiérrez, et al.
Integration (2025), pp. 102398-102398
Closed Access

Network Intrusion Detection using Natural Language Processing and Ensemble Machine Learning
Saikat Das, Mohammad Ashrafuzzaman, Frederick T. Sheldon, et al.
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2020), pp. 829-835
Closed Access | Times Cited: 24

Encrypted Malicious Traffic Detection Based on Word2Vec
Andrey Ferriyan, Achmad Husni Thamrin, Keiji Takeda, et al.
Electronics (2022) Vol. 11, Iss. 5, pp. 679-679
Open Access | Times Cited: 16

Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evolution Model Based on Distributed Representations
Zohaib Ahmad Khan, Yuanqing Xia, Shahzad Ali, et al.
IEEE Access (2023) Vol. 11, pp. 98787-98804
Open Access | Times Cited: 7

Analysis of Feature Extraction Techniques for Sentiment Analysis of Tweets
Satyendra Sıngh, Krishan Kumar, Brajesh Kumar
Turkish Journal of Engineering (2024) Vol. 8, Iss. 4, pp. 741-753
Open Access | Times Cited: 2

SimCSE for Encrypted Traffic Detection and Zero-Day Attack Detection
Rotem Bar, Chen Hajaj
IEEE Access (2022) Vol. 10, pp. 56952-56960
Open Access | Times Cited: 10

Sec2vec: Anomaly Detection in HTTP Traffic and Malicious URLs
Mateusz Gniewkowski, Henryk Maciejewski, Tomasz Surmacz, et al.
Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing (2023), pp. 1154-1162
Open Access | Times Cited: 6

NIDS-VSB: Network Intrusion Detection System for VANET Using Spark-Based Big Data Optimization and Transfer Learning
Farhan Ullah, Gautam Srivastava, Shamsher Ullah, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 1, pp. 1798-1809
Closed Access | Times Cited: 6

A critical review of the techniques used for anomaly detection of HTTP-based attacks: taxonomy, limitations and open challenges
Jesús E. Dı́az-Verdejo, Rafael Estepa, Antonio Estepa, et al.
Computers & Security (2022) Vol. 124, pp. 102997-102997
Closed Access | Times Cited: 8

Performance analysis of ensemble learning algorithms in intrusion detection systems: A survey
Anitha, Rajiv Gandhi
AIP conference proceedings (2024) Vol. 2915, pp. 020017-020017
Closed Access | Times Cited: 1

Feature Extraction Methods for Depression Detection Through Social Media Text
Cangnai Fang, Gracia Dianatobing, Talia Atara, et al.
(2022), pp. 117-121
Closed Access | Times Cited: 7

Natural language processing for web browsing analytics: Challenges, lessons learned, and opportunities
Daniel Perdices, Javier Ramos, José Luis García‐Dorado, et al.
Computer Networks (2021) Vol. 198, pp. 108357-108357
Open Access | Times Cited: 8

Text Mining - A Comparative Review of Twitter Sentiments Analysis
Sushma Patil, Dewang Subil, Noureen Nasar, et al.
Recent Advances in Computer Science and Communications (2023) Vol. 17, Iss. 1
Closed Access | Times Cited: 3

Feature Selection Algorithm Characterization for NIDS using Machine and Deep learning
Jyoti Verma, Abhinav Bhandari, Gurpreet Singh
2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS) (2022), pp. 1-7
Closed Access | Times Cited: 5

Multimodal Sentiment Analysis of Online Product Information Based on Text Mining Under the Influence of Social Media
Xiao Zeng, Ziqi Zhong
Journal of Organizational and End User Computing (2022) Vol. 34, Iss. 8, pp. 1-18
Open Access | Times Cited: 5

Web Intrusion Detection Using Character Level Machine Learning Approaches with Upsampled Data
Talya Tümer Sivri, Nergis Pervan Akman, Ali Berkol, et al.
Annals of Computer Science and Information Systems (2022) Vol. 32, pp. 269-274
Open Access | Times Cited: 4

Machine Learning Based Web Application Firewall
Batuhan Isiker, İbrahim Soğukpınar
(2021), pp. 1-6
Closed Access | Times Cited: 5

A Survey of techniques for fine-grained web traffic identification and classification
Xiaolin Gui, Yuanlong Cao, Ilsun You, et al.
Mathematical Biosciences & Engineering (2022) Vol. 19, Iss. 3, pp. 2996-3021
Open Access | Times Cited: 3

A Novel Classification Method Based on a Two-Phase Technique for Learning Imbalanced Text Data
Der‐Chiang Li, Szu-Chou Chen, Yao-San Lin, et al.
Symmetry (2022) Vol. 14, Iss. 3, pp. 567-567
Open Access | Times Cited: 3

Page 1 - Next Page

Scroll to top