
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Machine Learning and Deep Learning Approaches for CyberSecurity: A Review
Asmaa Halbouni, Teddy Surya Gunawan, Mohamed Hadi Habaebi, et al.
IEEE Access (2022) Vol. 10, pp. 19572-19585
Open Access | Times Cited: 112
Asmaa Halbouni, Teddy Surya Gunawan, Mohamed Hadi Habaebi, et al.
IEEE Access (2022) Vol. 10, pp. 19572-19585
Open Access | Times Cited: 112
Showing 1-25 of 112 citing articles:
A Review on Machine Learning Styles in Computer Vision—Techniques and Future Directions
Supriya V. Mahadevkar, Bharti Khemani, Shruti Patil, et al.
IEEE Access (2022) Vol. 10, pp. 107293-107329
Open Access | Times Cited: 167
Supriya V. Mahadevkar, Bharti Khemani, Shruti Patil, et al.
IEEE Access (2022) Vol. 10, pp. 107293-107329
Open Access | Times Cited: 167
CNN-LSTM: Hybrid Deep Neural Network for Network Intrusion Detection System
Asmaa Halbouni, Teddy Surya Gunawan, Mohamed Hadi Habaebi, et al.
IEEE Access (2022) Vol. 10, pp. 99837-99849
Open Access | Times Cited: 161
Asmaa Halbouni, Teddy Surya Gunawan, Mohamed Hadi Habaebi, et al.
IEEE Access (2022) Vol. 10, pp. 99837-99849
Open Access | Times Cited: 161
Deep learning-based intrusion detection approach for securing industrial Internet of Things
Sahar Soliman, Wed Oudah, Ahamed Aljuhani
Alexandria Engineering Journal (2023) Vol. 81, pp. 371-383
Open Access | Times Cited: 59
Sahar Soliman, Wed Oudah, Ahamed Aljuhani
Alexandria Engineering Journal (2023) Vol. 81, pp. 371-383
Open Access | Times Cited: 59
Mathematical Models for the Design of GRID Systems to Solve Resource-Intensive Problems
Valeriya Valerievna Tynchenko, В С Тынченко, Vladimir A. Nelyub, et al.
Mathematics (2024) Vol. 12, Iss. 2, pp. 276-276
Open Access | Times Cited: 47
Valeriya Valerievna Tynchenko, В С Тынченко, Vladimir A. Nelyub, et al.
Mathematics (2024) Vol. 12, Iss. 2, pp. 276-276
Open Access | Times Cited: 47
Machine learning and deep learning-based approach in smart healthcare: Recent advances, applications, challenges and opportunities
Anichur Rahman, Tanoy Debnath, Dipanjali Kundu, et al.
AIMS Public Health (2024) Vol. 11, Iss. 1, pp. 58-109
Open Access | Times Cited: 39
Anichur Rahman, Tanoy Debnath, Dipanjali Kundu, et al.
AIMS Public Health (2024) Vol. 11, Iss. 1, pp. 58-109
Open Access | Times Cited: 39
Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects
Iqbal H. Sarker, Helge Janicke, Ahmad Mohsin, et al.
ICT Express (2024) Vol. 10, Iss. 4, pp. 935-958
Open Access | Times Cited: 24
Iqbal H. Sarker, Helge Janicke, Ahmad Mohsin, et al.
ICT Express (2024) Vol. 10, Iss. 4, pp. 935-958
Open Access | Times Cited: 24
A Comprehensive Review on Cyber-Attacks in Power Systems: Impact Analysis, Detection, and Cyber Security
Naveen Tatipatri, S. L. Arun
IEEE Access (2024) Vol. 12, pp. 18147-18167
Open Access | Times Cited: 23
Naveen Tatipatri, S. L. Arun
IEEE Access (2024) Vol. 12, pp. 18147-18167
Open Access | Times Cited: 23
Machine Learning-Based Intrusion Detection System: An Experimental Comparison
Imran Hidayat, Muhammad Zulfiqar Ali, Arshad Ali
Journal of Computational and Cognitive Engineering (2022) Vol. 2, Iss. 2, pp. 88-97
Open Access | Times Cited: 53
Imran Hidayat, Muhammad Zulfiqar Ali, Arshad Ali
Journal of Computational and Cognitive Engineering (2022) Vol. 2, Iss. 2, pp. 88-97
Open Access | Times Cited: 53
Paired Patterns in Logical Analysis of Data for Decision Support in Recognition
Igor Masich, Vadim S. Tyncheko, Vladimir A. Nelyub, et al.
Computation (2022) Vol. 10, Iss. 10, pp. 185-185
Open Access | Times Cited: 45
Igor Masich, Vadim S. Tyncheko, Vladimir A. Nelyub, et al.
Computation (2022) Vol. 10, Iss. 10, pp. 185-185
Open Access | Times Cited: 45
HC-DTTSVM: A Network Intrusion Detection Method Based on Decision Tree Twin Support Vector Machine and Hierarchical Clustering
Li Zou, Xuemei Luo, Yan Zhang, et al.
IEEE Access (2023) Vol. 11, pp. 21404-21416
Open Access | Times Cited: 32
Li Zou, Xuemei Luo, Yan Zhang, et al.
IEEE Access (2023) Vol. 11, pp. 21404-21416
Open Access | Times Cited: 32
Towards an Intelligent Intrusion Detection System to Detect Malicious Activities in Cloud Computing
Hanaa Attou, Mouaad Mohy-eddine, Azidine Guezzaz, et al.
Applied Sciences (2023) Vol. 13, Iss. 17, pp. 9588-9588
Open Access | Times Cited: 31
Hanaa Attou, Mouaad Mohy-eddine, Azidine Guezzaz, et al.
Applied Sciences (2023) Vol. 13, Iss. 17, pp. 9588-9588
Open Access | Times Cited: 31
Machine learning and deep learning for user authentication and authorization in cybersecurity: A state-of-the-art review
Zinniya Taffannum Pritee, Mehedi Hasan Anik, Saida Binta Alam, et al.
Computers & Security (2024) Vol. 140, pp. 103747-103747
Closed Access | Times Cited: 12
Zinniya Taffannum Pritee, Mehedi Hasan Anik, Saida Binta Alam, et al.
Computers & Security (2024) Vol. 140, pp. 103747-103747
Closed Access | Times Cited: 12
Machine learning for human emotion recognition: a comprehensive review
Eman M. G. Younis, Someya Mohsen, Essam H. Houssein, et al.
Neural Computing and Applications (2024) Vol. 36, Iss. 16, pp. 8901-8947
Open Access | Times Cited: 11
Eman M. G. Younis, Someya Mohsen, Essam H. Houssein, et al.
Neural Computing and Applications (2024) Vol. 36, Iss. 16, pp. 8901-8947
Open Access | Times Cited: 11
Designing a modified feature aggregation model with hybrid sampling techniques for network intrusion detection
NarasimhaSwamy Biyyapu, Veerapaneni Esther Jyothi, Phani Praveen Surapaneni, et al.
Cluster Computing (2024) Vol. 27, Iss. 5, pp. 5913-5931
Closed Access | Times Cited: 10
NarasimhaSwamy Biyyapu, Veerapaneni Esther Jyothi, Phani Praveen Surapaneni, et al.
Cluster Computing (2024) Vol. 27, Iss. 5, pp. 5913-5931
Closed Access | Times Cited: 10
Evolving cybersecurity frontiers: A comprehensive survey on concept drift and feature dynamics aware machine and deep learning in intrusion detection systems
Methaq A. Shyaa, Noor Farizah Ibrahim, Zurinahni Zainol, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 137, pp. 109143-109143
Open Access | Times Cited: 9
Methaq A. Shyaa, Noor Farizah Ibrahim, Zurinahni Zainol, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 137, pp. 109143-109143
Open Access | Times Cited: 9
A modified dueling DQN algorithm for robot path planning incorporating priority experience replay and artificial potential fields
Chang Li, Xiaofeng Yue, Zeyuan Liu, et al.
Applied Intelligence (2025) Vol. 55, Iss. 6
Closed Access | Times Cited: 1
Chang Li, Xiaofeng Yue, Zeyuan Liu, et al.
Applied Intelligence (2025) Vol. 55, Iss. 6
Closed Access | Times Cited: 1
Overview on Intrusion Detection Systems for Computers Networking Security
Lorenzo Diana, Pierpaolo Dini, Davide Paolini
Computers (2025) Vol. 14, Iss. 3, pp. 87-87
Open Access | Times Cited: 1
Lorenzo Diana, Pierpaolo Dini, Davide Paolini
Computers (2025) Vol. 14, Iss. 3, pp. 87-87
Open Access | Times Cited: 1
Optimizing Intrusion Detection for IoT : A Systematic Review of Machine Learning and Deep Learning Approaches With Feature Selection and Data Balancing
S Kumar Reddy Mallidi, Rajeswara Rao Ramisetty
Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery (2025) Vol. 15, Iss. 2
Closed Access | Times Cited: 1
S Kumar Reddy Mallidi, Rajeswara Rao Ramisetty
Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery (2025) Vol. 15, Iss. 2
Closed Access | Times Cited: 1
Hybrid Strategy Improved Sparrow Search Algorithm in the Field of Intrusion Detection
Tao Liu, Meng Xueqiang
IEEE Access (2023) Vol. 11, pp. 32134-32151
Open Access | Times Cited: 18
Tao Liu, Meng Xueqiang
IEEE Access (2023) Vol. 11, pp. 32134-32151
Open Access | Times Cited: 18
VANET Network Traffic Anomaly Detection Using GRU-Based Deep Learning Model
Ghayth AlMahadin, Yassine Aoudni, Mohammad Shabaz, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 1, pp. 4548-4555
Closed Access | Times Cited: 17
Ghayth AlMahadin, Yassine Aoudni, Mohammad Shabaz, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 1, pp. 4548-4555
Closed Access | Times Cited: 17
The Role of Deep Learning in Advancing Proactive Cybersecurity Measures for Smart Grid Networks: A Survey
Nima Abdi, Abdullatif Albaseer, Mohamed Abdallah
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 9, pp. 16398-16421
Open Access | Times Cited: 8
Nima Abdi, Abdullatif Albaseer, Mohamed Abdallah
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 9, pp. 16398-16421
Open Access | Times Cited: 8
Revolutionizing Agriculture: Machine and Deep Learning Solutions for Enhanced Crop Quality and Weed Control
Syed Mujtaba Hassan Rizvi, Asma Naseer, Shafiq Ur Rehman, et al.
IEEE Access (2024) Vol. 12, pp. 11865-11878
Open Access | Times Cited: 7
Syed Mujtaba Hassan Rizvi, Asma Naseer, Shafiq Ur Rehman, et al.
IEEE Access (2024) Vol. 12, pp. 11865-11878
Open Access | Times Cited: 7
Deep Learning for Intrusion Detection Systems (IDSs) in Time Series Data
Konstantinos Psychogyios, Andreas Papadakis, Stavroula Bourou, et al.
Future Internet (2024) Vol. 16, Iss. 3, pp. 73-73
Open Access | Times Cited: 7
Konstantinos Psychogyios, Andreas Papadakis, Stavroula Bourou, et al.
Future Internet (2024) Vol. 16, Iss. 3, pp. 73-73
Open Access | Times Cited: 7
DM-DQN: Dueling Munchausen deep Q network for robot path planning
Yuwan Gu, Zhitao Zhu, Jidong Lv, et al.
Complex & Intelligent Systems (2022) Vol. 9, Iss. 4, pp. 4287-4300
Open Access | Times Cited: 25
Yuwan Gu, Zhitao Zhu, Jidong Lv, et al.
Complex & Intelligent Systems (2022) Vol. 9, Iss. 4, pp. 4287-4300
Open Access | Times Cited: 25
An autoML network traffic analyzer for cyber threat detection
Αλέξανδρος Παπανικολάου, Aggelos Alevizopoulos, Christos Ilioudis, et al.
International Journal of Information Security (2023) Vol. 22, Iss. 5, pp. 1511-1530
Closed Access | Times Cited: 11
Αλέξανδρος Παπανικολάου, Aggelos Alevizopoulos, Christos Ilioudis, et al.
International Journal of Information Security (2023) Vol. 22, Iss. 5, pp. 1511-1530
Closed Access | Times Cited: 11