
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Reinforcement Learning Meets Network Intrusion Detection: A Transferable and Adaptable Framework for Anomaly Behavior Identification
Mingshu He, Xiaojuan Wang, Wei Peng, et al.
IEEE Transactions on Network and Service Management (2024) Vol. 21, Iss. 2, pp. 2477-2492
Closed Access | Times Cited: 11
Mingshu He, Xiaojuan Wang, Wei Peng, et al.
IEEE Transactions on Network and Service Management (2024) Vol. 21, Iss. 2, pp. 2477-2492
Closed Access | Times Cited: 11
Showing 11 citing articles:
Cascading Bagging and Boosting Ensemble Methods for Intrusion Detection in Cyber‐Physical Systems
Ram Ji, Arvind Selwal, Narinder Verma, et al.
Security and Privacy (2025) Vol. 8, Iss. 1
Closed Access | Times Cited: 1
Ram Ji, Arvind Selwal, Narinder Verma, et al.
Security and Privacy (2025) Vol. 8, Iss. 1
Closed Access | Times Cited: 1
Comparative Analysis of Deep Convolutional Neural Network—Bidirectional Long Short-Term Memory and Machine Learning Methods in Intrusion Detection Systems
Miracle Udurume, Vladimir Shakhov, Insoo Koo
Applied Sciences (2024) Vol. 14, Iss. 16, pp. 6967-6967
Open Access | Times Cited: 8
Miracle Udurume, Vladimir Shakhov, Insoo Koo
Applied Sciences (2024) Vol. 14, Iss. 16, pp. 6967-6967
Open Access | Times Cited: 8
Multi-Class Intrusion Detection Based on Transformer for IoT Networks Using CIC-IoT-2023 Dataset
Shu‐Ming Tseng, Yanqi Wang, Yung‐Chung Wang
Future Internet (2024) Vol. 16, Iss. 8, pp. 284-284
Open Access | Times Cited: 5
Shu‐Ming Tseng, Yanqi Wang, Yung‐Chung Wang
Future Internet (2024) Vol. 16, Iss. 8, pp. 284-284
Open Access | Times Cited: 5
Large Language Models Meet Next-Generation Networking Technologies: A Review
Ching Nam Hang, Pei-Duo Yu, Roberto Morabito, et al.
Future Internet (2024) Vol. 16, Iss. 10, pp. 365-365
Open Access | Times Cited: 5
Ching Nam Hang, Pei-Duo Yu, Roberto Morabito, et al.
Future Internet (2024) Vol. 16, Iss. 10, pp. 365-365
Open Access | Times Cited: 5
Malicious Traffic Classification Algorithm Based on Multimodal Fusion
X. L. Li, Mingshu He
Lecture notes in electrical engineering (2025), pp. 229-245
Closed Access
X. L. Li, Mingshu He
Lecture notes in electrical engineering (2025), pp. 229-245
Closed Access
Multi-temporal Domain Feature Adaptation Representation Framework for Website Fingerprinting
Zikui Lu, Luona Song, Z. Han, et al.
Lecture notes in electrical engineering (2025), pp. 127-137
Closed Access
Zikui Lu, Luona Song, Z. Han, et al.
Lecture notes in electrical engineering (2025), pp. 127-137
Closed Access
An Efficient Cyber Security Attack Detection With Encryption Using Capsule Convolutional Polymorphic Graph Attention
P. J. Sathish Kumar, B. R. Tapas Bapu, Shreya Sridhar, et al.
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 3
Closed Access
P. J. Sathish Kumar, B. R. Tapas Bapu, Shreya Sridhar, et al.
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 3
Closed Access
Defending Against Multifaceted Network Attacks: A Multi-Label Meta-Learning and Lorenz Chaos MTD based Security Paradigm
N. A. Bharathi, Ranjani Parthasarathi, V. Vetriselvi
Journal of Network and Systems Management (2025) Vol. 33, Iss. 2
Closed Access
N. A. Bharathi, Ranjani Parthasarathi, V. Vetriselvi
Journal of Network and Systems Management (2025) Vol. 33, Iss. 2
Closed Access
Cyberspace enhancement of electric vehicle charging stations in smart grids based on detection and resilience measures against hybrid cyberattacks: A multi-agent deep reinforcement learning approach
Ali Rashid Ramul, Atefeh Salimi Shahraki, Naseer K. Bachache, et al.
Energy (2025), pp. 136038-136038
Closed Access
Ali Rashid Ramul, Atefeh Salimi Shahraki, Naseer K. Bachache, et al.
Energy (2025), pp. 136038-136038
Closed Access
A Scalable Digital Assets Framework for Distributed Robot System’s Anomaly Detection Based on Hybrid Convolutional Autoencoder
Shijie Wang, Jianfeng Tao, Qincheng Jiang, et al.
Neurocomputing (2025), pp. 130516-130516
Closed Access
Shijie Wang, Jianfeng Tao, Qincheng Jiang, et al.
Neurocomputing (2025), pp. 130516-130516
Closed Access
CNN-GWO-voting & hybrid: ensemble learning inspired intrusion detection approaches for cyber-physical systems
Ram Ji, Neerendra Kumar, Devanand Padha
DELETED (2024)
Closed Access | Times Cited: 1
Ram Ji, Neerendra Kumar, Devanand Padha
DELETED (2024)
Closed Access | Times Cited: 1