
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Novel Two-Stage Deep Learning Model for Network Intrusion Detection: LSTM-AE
Vanlalruata Hnamte, Hong-Nhung Nguyen, Jamal Hussain, et al.
IEEE Access (2023) Vol. 11, pp. 37131-37148
Open Access | Times Cited: 70
Vanlalruata Hnamte, Hong-Nhung Nguyen, Jamal Hussain, et al.
IEEE Access (2023) Vol. 11, pp. 37131-37148
Open Access | Times Cited: 70
Showing 1-25 of 70 citing articles:
Dependable intrusion detection system using deep convolutional neural network: A Novel framework and performance evaluation approach
Vanlalruata Hnamte, Jamal Hussain
Telematics and Informatics Reports (2023) Vol. 11, pp. 100077-100077
Open Access | Times Cited: 49
Vanlalruata Hnamte, Jamal Hussain
Telematics and Informatics Reports (2023) Vol. 11, pp. 100077-100077
Open Access | Times Cited: 49
Enhancing intrusion detection: a hybrid machine and deep learning approach
Muhammad Sajid, Kaleem Razzaq Malik, Ahmad Almogren, et al.
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 27
Muhammad Sajid, Kaleem Razzaq Malik, Ahmad Almogren, et al.
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 27
A Survey of Deep Learning Technologies for Intrusion Detection in Internet of Things
Han Liao, Mohd Zamri Murah, Mohammad Kamrul Hasan, et al.
IEEE Access (2024) Vol. 12, pp. 4745-4761
Open Access | Times Cited: 19
Han Liao, Mohd Zamri Murah, Mohammad Kamrul Hasan, et al.
IEEE Access (2024) Vol. 12, pp. 4745-4761
Open Access | Times Cited: 19
DDoS attack detection and mitigation using deep neural network in SDN environment
Vanlalruata Hnamte, Ashfaq Ahmad Najar, Hong-Nhung Nguyen, et al.
Computers & Security (2023) Vol. 138, pp. 103661-103661
Closed Access | Times Cited: 35
Vanlalruata Hnamte, Ashfaq Ahmad Najar, Hong-Nhung Nguyen, et al.
Computers & Security (2023) Vol. 138, pp. 103661-103661
Closed Access | Times Cited: 35
Effects of feature selection and normalization on network intrusion detection
Mubarak Albarka Umar, Zhanfang Chen, Khaled Shuaib, et al.
Data Science and Management (2024)
Open Access | Times Cited: 10
Mubarak Albarka Umar, Zhanfang Chen, Khaled Shuaib, et al.
Data Science and Management (2024)
Open Access | Times Cited: 10
A hybrid approach for intrusion detection in vehicular networks using feature selection and dimensionality reduction with optimized deep learning
Fayaz Hassan, Zafi Sherhan Syed, Aftab Ahmed Memon, et al.
PLoS ONE (2025) Vol. 20, Iss. 2, pp. e0312752-e0312752
Open Access | Times Cited: 1
Fayaz Hassan, Zafi Sherhan Syed, Aftab Ahmed Memon, et al.
PLoS ONE (2025) Vol. 20, Iss. 2, pp. e0312752-e0312752
Open Access | Times Cited: 1
Cybersecurity in the AI era: analyzing the impact of machine learning on intrusion detection
Huiyao Dong, Igor Kotenko
Knowledge and Information Systems (2025)
Closed Access | Times Cited: 1
Huiyao Dong, Igor Kotenko
Knowledge and Information Systems (2025)
Closed Access | Times Cited: 1
APT Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System
Safdar Hussain Javed, Maaz Bin Ahmad, Muhammad Asif, et al.
IEEE Access (2023) Vol. 11, pp. 74000-74020
Open Access | Times Cited: 18
Safdar Hussain Javed, Maaz Bin Ahmad, Muhammad Asif, et al.
IEEE Access (2023) Vol. 11, pp. 74000-74020
Open Access | Times Cited: 18
Comparative Analysis of Deep Convolutional Neural Network—Bidirectional Long Short-Term Memory and Machine Learning Methods in Intrusion Detection Systems
Miracle Udurume, Vladimir Shakhov, Insoo Koo
Applied Sciences (2024) Vol. 14, Iss. 16, pp. 6967-6967
Open Access | Times Cited: 7
Miracle Udurume, Vladimir Shakhov, Insoo Koo
Applied Sciences (2024) Vol. 14, Iss. 16, pp. 6967-6967
Open Access | Times Cited: 7
An LSTM ‐based novel near‐real‐time multiclass network intrusion detection system for complex cloud environments
Amol D. Vibhute, Minhaj Khan, Anuradha Kanade, et al.
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 11
Closed Access | Times Cited: 5
Amol D. Vibhute, Minhaj Khan, Anuradha Kanade, et al.
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 11
Closed Access | Times Cited: 5
An efficient deep learning mechanisms for IoT/Non-IoT devices classification and attack detection in SDN-enabled smart environment
P. Malini, K R Kavitha
Computers & Security (2024) Vol. 141, pp. 103818-103818
Closed Access | Times Cited: 5
P. Malini, K R Kavitha
Computers & Security (2024) Vol. 141, pp. 103818-103818
Closed Access | Times Cited: 5
An Improved Algorithm for Network Intrusion Detection Based on Deep Residual Networks
Xuntao Hu, Xiancai Meng, Shaoqing Liu, et al.
IEEE Access (2024) Vol. 12, pp. 66432-66441
Open Access | Times Cited: 4
Xuntao Hu, Xiancai Meng, Shaoqing Liu, et al.
IEEE Access (2024) Vol. 12, pp. 66432-66441
Open Access | Times Cited: 4
Generalizability Assessment of Learning‐Based Intrusion Detection Systems for IoT Security: Perspectives of Data Diversity
Zakir Ahmad Sheikh, Narinder Verma, Yashwant Singh, et al.
Security and Privacy (2025) Vol. 8, Iss. 2
Closed Access
Zakir Ahmad Sheikh, Narinder Verma, Yashwant Singh, et al.
Security and Privacy (2025) Vol. 8, Iss. 2
Closed Access
Enhanced autoencoder and deep neural network (AE&DNN) method for ddos attack recognition
P. J. Beslin Pajila, Y. Harold Robinson, Udayakumar Allimuthu, et al.
Wireless Networks (2025)
Closed Access
P. J. Beslin Pajila, Y. Harold Robinson, Udayakumar Allimuthu, et al.
Wireless Networks (2025)
Closed Access
Prediction of stress-strain behavior of rock materials under biaxial compression using a deep learning approach
Changsheng Li, Xinsong Zhang
PLoS ONE (2025) Vol. 20, Iss. 4, pp. e0321478-e0321478
Open Access
Changsheng Li, Xinsong Zhang
PLoS ONE (2025) Vol. 20, Iss. 4, pp. e0321478-e0321478
Open Access
Unveiling machine learning strategies and considerations in intrusion detection systems: a comprehensive survey
Ali Hussein Ali, Maha Charfeddine, Boudour Ammar, et al.
Frontiers in Computer Science (2024) Vol. 6
Closed Access | Times Cited: 3
Ali Hussein Ali, Maha Charfeddine, Boudour Ammar, et al.
Frontiers in Computer Science (2024) Vol. 6
Closed Access | Times Cited: 3
Intrusion Detection in IoT Systems Using Denoising Autoencoder
Fatma S. Alrayes, Mohammed Zakariah, Syed Umar Amin, et al.
IEEE Access (2024) Vol. 12, pp. 122401-122425
Open Access | Times Cited: 3
Fatma S. Alrayes, Mohammed Zakariah, Syed Umar Amin, et al.
IEEE Access (2024) Vol. 12, pp. 122401-122425
Open Access | Times Cited: 3
Intrusion detection in software defined network using deep learning approaches
M. Sami Ataa, Eman E. Sanad, Reda A. El-Khoribi
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 3
M. Sami Ataa, Eman E. Sanad, Reda A. El-Khoribi
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 3
A Robust Framework for Detecting Brute-Force Attacks through Deep Learning Techniques
Nouf Awadh, H Nasralla Zaid, Samah H. Alajmani
International Journal of Recent Technology and Engineering (IJRTE) (2025) Vol. 13, Iss. 5, pp. 27-42
Closed Access
Nouf Awadh, H Nasralla Zaid, Samah H. Alajmani
International Journal of Recent Technology and Engineering (IJRTE) (2025) Vol. 13, Iss. 5, pp. 27-42
Closed Access
End-to-end anomaly detection of service function chain through multi-source data in cloud-native systems
Xuefei Chen, Jinfeng Kou, Haiqiang Li, et al.
Computers & Security (2025), pp. 104461-104461
Closed Access
Xuefei Chen, Jinfeng Kou, Haiqiang Li, et al.
Computers & Security (2025), pp. 104461-104461
Closed Access
A Research Survey on Network Intrusion Detection for AIoT
Jian Luo, Kun Xiao, Geng Wang, et al.
Communications in computer and information science (2025), pp. 53-74
Closed Access
Jian Luo, Kun Xiao, Geng Wang, et al.
Communications in computer and information science (2025), pp. 53-74
Closed Access
MDP-AD: A Markov decision process-based adaptive framework for real-time detection of evolving and unknown network attacks
Fan Luo, Tingfa Xu, Jianan Li, et al.
Alexandria Engineering Journal (2025) Vol. 126, pp. 480-490
Closed Access
Fan Luo, Tingfa Xu, Jianan Li, et al.
Alexandria Engineering Journal (2025) Vol. 126, pp. 480-490
Closed Access
Network Intrusion Detection using Deep Convolution Neural Network
Vanlalruata Hnamte, Jamal Hussain
(2023)
Closed Access | Times Cited: 9
Vanlalruata Hnamte, Jamal Hussain
(2023)
Closed Access | Times Cited: 9
Anomaly detection using deep convolutional generative adversarial networks in the internet of things
Amit Kumar Mishra, Shweta Paliwal, Gautam Srivastava
ISA Transactions (2023)
Closed Access | Times Cited: 9
Amit Kumar Mishra, Shweta Paliwal, Gautam Srivastava
ISA Transactions (2023)
Closed Access | Times Cited: 9
An Efficient CNN + Sparse Transformer-Based Intrusion Detection Method for IoT
Yiying Zhang, Yifan Fan, Zhenkun Guo, et al.
Lecture notes in computer science (2024), pp. 482-493
Closed Access | Times Cited: 3
Yiying Zhang, Yifan Fan, Zhenkun Guo, et al.
Lecture notes in computer science (2024), pp. 482-493
Closed Access | Times Cited: 3