
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Provenance-based Intrusion Detection Systems: A Survey
Michael Zipperle, Florian Gottwalt, Elizabeth Chang, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 7, pp. 1-36
Open Access | Times Cited: 64
Michael Zipperle, Florian Gottwalt, Elizabeth Chang, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 7, pp. 1-36
Open Access | Times Cited: 64
Showing 1-25 of 64 citing articles:
Graph Neural Networks for Intrusion Detection: A Survey
Tristan Bilot, Nour El Madhoun, Khaldoun Al Agha, et al.
IEEE Access (2023) Vol. 11, pp. 49114-49139
Open Access | Times Cited: 51
Tristan Bilot, Nour El Madhoun, Khaldoun Al Agha, et al.
IEEE Access (2023) Vol. 11, pp. 49114-49139
Open Access | Times Cited: 51
A survey on graph neural networks for intrusion detection systems: Methods, trends and challenges
Meihui Zhong, Ming‐Wei Lin, Chao Zhang, et al.
Computers & Security (2024) Vol. 141, pp. 103821-103821
Closed Access | Times Cited: 33
Meihui Zhong, Ming‐Wei Lin, Chao Zhang, et al.
Computers & Security (2024) Vol. 141, pp. 103821-103821
Closed Access | Times Cited: 33
A Systematic Literature Review on Host-Based Intrusion Detection Systems
Hami Satılmış, Sedat Akleylek, Zaliha Yüce Tok
IEEE Access (2024) Vol. 12, pp. 27237-27266
Open Access | Times Cited: 22
Hami Satılmış, Sedat Akleylek, Zaliha Yüce Tok
IEEE Access (2024) Vol. 12, pp. 27237-27266
Open Access | Times Cited: 22
A comprehensive and systematic literature review on intrusion detection systems in the internet of medical things: current status, challenges, and opportunities
Arezou Naghib, Farhad Soleimanian Gharehchopogh, Azadeh Zamanifar
Artificial Intelligence Review (2025) Vol. 58, Iss. 4
Open Access | Times Cited: 3
Arezou Naghib, Farhad Soleimanian Gharehchopogh, Azadeh Zamanifar
Artificial Intelligence Review (2025) Vol. 58, Iss. 4
Open Access | Times Cited: 3
An advanced deep neural network for fundus image analysis and enhancing diabetic retinopathy detection
F. M. Javed Mehedi Shamrat, Rashiduzzaman Shakil, Sharmin, et al.
Healthcare Analytics (2024) Vol. 5, pp. 100303-100303
Open Access | Times Cited: 15
F. M. Javed Mehedi Shamrat, Rashiduzzaman Shakil, Sharmin, et al.
Healthcare Analytics (2024) Vol. 5, pp. 100303-100303
Open Access | Times Cited: 15
Security Approaches for Data Provenance in the Internet of Things: A Systematic Literature Review
Omair Faraj, David Megías, Joaquin Garcia‐Alfaro
ACM Computing Surveys (2025)
Open Access | Times Cited: 1
Omair Faraj, David Megías, Joaquin Garcia‐Alfaro
ACM Computing Surveys (2025)
Open Access | Times Cited: 1
Data Provenance in Security and Privacy
Bofeng Pan, Natalia Stakhanova, Suprio Ray
ACM Computing Surveys (2023) Vol. 55, Iss. 14s, pp. 1-35
Open Access | Times Cited: 18
Bofeng Pan, Natalia Stakhanova, Suprio Ray
ACM Computing Surveys (2023) Vol. 55, Iss. 14s, pp. 1-35
Open Access | Times Cited: 18
A Survey on Forensics and Compliance Auditing for Critical Infrastructure Protection
João Henriques, Filipe Caldeira, Tiago Cruz, et al.
IEEE Access (2024) Vol. 12, pp. 2409-2444
Open Access | Times Cited: 7
João Henriques, Filipe Caldeira, Tiago Cruz, et al.
IEEE Access (2024) Vol. 12, pp. 2409-2444
Open Access | Times Cited: 7
SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection
Giovanni Apruzzese, Pavel Laskov, Johannes Schneider
(2023), pp. 592-614
Open Access | Times Cited: 14
Giovanni Apruzzese, Pavel Laskov, Johannes Schneider
(2023), pp. 592-614
Open Access | Times Cited: 14
Machine learning-enabled hybrid intrusion detection system with host data transformation and an advanced two-stage classifier
Zhiyan Chen, Murat Şimşek, Burak Kantarcı, et al.
Computer Networks (2024) Vol. 250, pp. 110576-110576
Open Access | Times Cited: 5
Zhiyan Chen, Murat Şimşek, Burak Kantarcı, et al.
Computer Networks (2024) Vol. 250, pp. 110576-110576
Open Access | Times Cited: 5
ALSNAP: Attention-based long and short-period network security situation prediction
Dongmei Zhao, Pengcheng Shen, Shuiguang Zeng
Ad Hoc Networks (2023) Vol. 150, pp. 103279-103279
Closed Access | Times Cited: 12
Dongmei Zhao, Pengcheng Shen, Shuiguang Zeng
Ad Hoc Networks (2023) Vol. 150, pp. 103279-103279
Closed Access | Times Cited: 12
Using the ToN-IoT dataset to develop a new intrusion detection system for industrial IoT devices
Zhong Cao, Zhicai Zhao, Wenli Shang, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 4
Zhong Cao, Zhicai Zhao, Wenli Shang, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 4
MPCA: Constructing the APTs provenance graphs through multi-perspective confidence and association
Zhao Zhang, Senlin Luo, Y. H. Guan, et al.
Information and Software Technology (2025) Vol. 180, pp. 107670-107670
Closed Access
Zhao Zhang, Senlin Luo, Y. H. Guan, et al.
Information and Software Technology (2025) Vol. 180, pp. 107670-107670
Closed Access
FineGCP: Fine-grained dependency graph community partitioning for attack investigation
Zhaoyang Wang, Yanfei Hu, Wen Yu, et al.
Computers & Security (2025), pp. 104311-104311
Closed Access
Zhaoyang Wang, Yanfei Hu, Wen Yu, et al.
Computers & Security (2025), pp. 104311-104311
Closed Access
GNNexPIDS: An Interpretation Method for Provenance-Based Intrusion Detection Based on GNNExplainer
Ziyang Yu, Wentao Li, Xiu Ma, et al.
Lecture notes in computer science (2025), pp. 236-253
Closed Access
Ziyang Yu, Wentao Li, Xiu Ma, et al.
Lecture notes in computer science (2025), pp. 236-253
Closed Access
Exploring Answer Set Programming for Provenance Graph-Based Cyber Threat Detection: A Novel Approach
Fang Li, Fei Zuo, Gopal Gupta
Lecture notes in computer science (2025), pp. 233-247
Closed Access
Fang Li, Fei Zuo, Gopal Gupta
Lecture notes in computer science (2025), pp. 233-247
Closed Access
Machine learning-inspired intrusion detection system for IoT: Security issues and future challenges
Tariq Ahamed Ahanger, Imdad Ullah, Shabbab Algamdi, et al.
Computers & Electrical Engineering (2025) Vol. 123, pp. 110265-110265
Closed Access
Tariq Ahamed Ahanger, Imdad Ullah, Shabbab Algamdi, et al.
Computers & Electrical Engineering (2025) Vol. 123, pp. 110265-110265
Closed Access
Machine learning and artificial intelligence techniques adopted for IT audit
Marcin Pycka, Maciej Zastempowski
Management (2025), Iss. 1, pp. 65-87
Open Access
Marcin Pycka, Maciej Zastempowski
Management (2025), Iss. 1, pp. 65-87
Open Access
Automatic APT Attack Reconstruction Supporting Lateral Movement
Cheng Fan, Wei-Chen Wu, Cheng-Han Shie, et al.
Smart innovation, systems and technologies (2025), pp. 235-249
Closed Access
Cheng Fan, Wei-Chen Wu, Cheng-Han Shie, et al.
Smart innovation, systems and technologies (2025), pp. 235-249
Closed Access
Variational Deep Clustering approaches for anomaly-based cyber-attack detection
Van Quân Nguyen, Viet Hung Nguyen, Long Thanh Ngo, et al.
Journal of Network and Computer Applications (2025), pp. 104182-104182
Closed Access
Van Quân Nguyen, Viet Hung Nguyen, Long Thanh Ngo, et al.
Journal of Network and Computer Applications (2025), pp. 104182-104182
Closed Access
STADe: An unsupervised time-windows method of detecting anomalies in oil and gas Industrial Cyber-Physical Systems (ICPS) networks
Abubakar Sadiq Mohammed, Eirini Anthi, Omer Rana, et al.
International Journal of Critical Infrastructure Protection (2025), pp. 100762-100762
Open Access
Abubakar Sadiq Mohammed, Eirini Anthi, Omer Rana, et al.
International Journal of Critical Infrastructure Protection (2025), pp. 100762-100762
Open Access
A Study on Efficient Provenance-Based Intrusion Detection System Using Few-Shot Graph Representation Learning
Pham Tran Tien Dat, Phan The Duy, Van-Hau Pham
Communications in computer and information science (2025), pp. 431-444
Closed Access
Pham Tran Tien Dat, Phan The Duy, Van-Hau Pham
Communications in computer and information science (2025), pp. 431-444
Closed Access
CGP-Mamba: An Intrusion Detection Method Based on State Space Model
Jibo He, Gang Wang, Nai-Wei Liu, et al.
Communications in computer and information science (2025), pp. 258-272
Closed Access
Jibo He, Gang Wang, Nai-Wei Liu, et al.
Communications in computer and information science (2025), pp. 258-272
Closed Access
Feature Engineering and Model Optimization Based Classification Method for Network Intrusion Detection
Yujie Zhang, Zebin Wang
Applied Sciences (2023) Vol. 13, Iss. 16, pp. 9363-9363
Open Access | Times Cited: 7
Yujie Zhang, Zebin Wang
Applied Sciences (2023) Vol. 13, Iss. 16, pp. 9363-9363
Open Access | Times Cited: 7
Detecting APT-Exploited Processes through Semantic Fusion and Interaction Prediction
Bin Luo, Liangguo Chen, Shuhua Ruan, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 2, pp. 1731-1754
Open Access | Times Cited: 2
Bin Luo, Liangguo Chen, Shuhua Ruan, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 2, pp. 1731-1754
Open Access | Times Cited: 2