OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Novel Framework Design of Network Intrusion Detection Based on Machine Learning Techniques
Chongzhen Zhang, Yanli Chen, Yang Meng, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-15
Open Access | Times Cited: 44

Showing 1-25 of 44 citing articles:

Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats
Zhiyan Chen, Jinxin Liu, Yu Shen, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 5, pp. 1-37
Open Access | Times Cited: 75

Deep Neural Network Based Real-Time Intrusion Detection System
Sharuka Promodya Thirimanne, Lasitha Jayawardana, S.L.P. Yasakethu, et al.
SN Computer Science (2022) Vol. 3, Iss. 2
Open Access | Times Cited: 57

Intrusion detection and prevention in fog based IoT environments: A systematic literature review
Cristiano Antonio de Souza, Carlos Becker Westphall, Renato Bobsin Machado, et al.
Computer Networks (2022) Vol. 214, pp. 109154-109154
Closed Access | Times Cited: 41

An edge based hybrid intrusion detection framework for mobile edge computing
Ashish Singh, Kakali Chatterjee, Suresh Chandra Satapathy
Complex & Intelligent Systems (2021) Vol. 8, Iss. 5, pp. 3719-3746
Open Access | Times Cited: 48

Effective network intrusion detection via representation learning: A Denoising AutoEncoder approach
Ivandro Ortet Lopes, Deqing Zou, Ihsan H. Abdulqadder, et al.
Computer Communications (2022) Vol. 194, pp. 55-65
Closed Access | Times Cited: 28

Machine Learning and Deep Learning based Intrusion Detection in Cloud Environment: A Review
A. Vinolia, N. Kanya, V.N. Rajavarman
2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT) (2023), pp. 952-960
Closed Access | Times Cited: 15

Hybrid VGG19 and 2D-CNN for intrusion detection in the FOG-cloud environment
Adel Binbusayyis
Expert Systems with Applications (2023) Vol. 238, pp. 121758-121758
Closed Access | Times Cited: 13

Balanced Multi-Class Network Intrusion Detection Using Machine Learning
Faraz Ahmad Khan, Asghar Ali Shah, Nizal Alshammry, et al.
IEEE Access (2024) Vol. 12, pp. 178222-178236
Open Access | Times Cited: 3

IoT security assisted by machine learning: Unresolved problems and difficulties in the face of advanced persistent threats
B. Pragathi, K. Srinivasa Rao, Palaniappan Ramu, et al.
AIP conference proceedings (2025) Vol. 3162, pp. 020111-020111
Closed Access

An effective intrusion detection system based on feature selection and regularized long short-term memory classifier
Sudha Rani Chikkalwar, Yugandhar Garapati
Multimedia Tools and Applications (2025)
Closed Access

An Abnormal Traffic Detection Model Combined BiIndRNN With Global Attention
Li Huang, Hongjuan Ge, Haoqi Yang, et al.
IEEE Access (2022) Vol. 10, pp. 30899-30912
Open Access | Times Cited: 13

A Survey on Network-based Intrusion Detection System using Learning Techniques
Rupal K Panchal, Rupal Snehkunj, Vinaykumar V Panchal
(2024), pp. 740-747
Closed Access | Times Cited: 2

Efficient Dynamic Distributed Resource Slicing in 6G Multi-Access Edge Computing Networks With Online ADMM and Message Passing Graph Neural Networks
Alia Asheralieva, Dusit Niyato, Yoshikazu Miyanaga
IEEE Transactions on Mobile Computing (2023) Vol. 23, Iss. 4, pp. 2614-2638
Closed Access | Times Cited: 6

QoS in multimedia application for IoT devices through edge intelligence
R. Ramya, S. Ramamoorthy
Multimedia Tools and Applications (2023) Vol. 83, Iss. 3, pp. 9227-9250
Closed Access | Times Cited: 6

Secure and Efficient Coded Multi-Access Edge Computing with Generalized Graph Neural Networks
Alia Asheralieva, Dusit Niyato
IEEE Transactions on Mobile Computing (2022), pp. 1-1
Closed Access | Times Cited: 8

A Novel CNN-LSTM Fusion-Based Intrusion Detection Method for Industrial Internet
Jinhai Song, Zhiyong Zhang, Kejing Zhao, et al.
International Journal of Information Security and Privacy (2023) Vol. 17, Iss. 1, pp. 1-18
Open Access | Times Cited: 4

Ultrareliable Low-Latency Slicing in Space–Air–Ground Multiaccess Edge Computing Networks for Next-Generation Internet of Things and Mobile Applications
Alia Asheralieva, Dusit Niyato, Xuetao Wei
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 3, pp. 3956-3978
Closed Access | Times Cited: 4

A Novel Approach for Anomaly Detection using Snort Integrated with Machine Learning
T. Preethi, Ponnuru Rakshitha Reddy, Lekkala Likhitha, et al.
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) (2024)
Closed Access | Times Cited: 1

Privacy-Preserving Federated Learning-Based Intrusion Detection Technique for Cyber-Physical Systems
Syeda Aunanya Mahmud, Nazmul Islam, Md Zahidul Islam, et al.
Mathematics (2024) Vol. 12, Iss. 20, pp. 3194-3194
Open Access | Times Cited: 1

Page 1 - Next Page

Scroll to top