
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Novel Framework Design of Network Intrusion Detection Based on Machine Learning Techniques
Chongzhen Zhang, Yanli Chen, Yang Meng, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-15
Open Access | Times Cited: 44
Chongzhen Zhang, Yanli Chen, Yang Meng, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-15
Open Access | Times Cited: 44
Showing 1-25 of 44 citing articles:
Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats
Zhiyan Chen, Jinxin Liu, Yu Shen, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 5, pp. 1-37
Open Access | Times Cited: 75
Zhiyan Chen, Jinxin Liu, Yu Shen, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 5, pp. 1-37
Open Access | Times Cited: 75
Deep Neural Network Based Real-Time Intrusion Detection System
Sharuka Promodya Thirimanne, Lasitha Jayawardana, S.L.P. Yasakethu, et al.
SN Computer Science (2022) Vol. 3, Iss. 2
Open Access | Times Cited: 57
Sharuka Promodya Thirimanne, Lasitha Jayawardana, S.L.P. Yasakethu, et al.
SN Computer Science (2022) Vol. 3, Iss. 2
Open Access | Times Cited: 57
Intrusion detection and prevention in fog based IoT environments: A systematic literature review
Cristiano Antonio de Souza, Carlos Becker Westphall, Renato Bobsin Machado, et al.
Computer Networks (2022) Vol. 214, pp. 109154-109154
Closed Access | Times Cited: 41
Cristiano Antonio de Souza, Carlos Becker Westphall, Renato Bobsin Machado, et al.
Computer Networks (2022) Vol. 214, pp. 109154-109154
Closed Access | Times Cited: 41
Enhancing Cloud Security with Deep Learning-Based Intrusion Detection in Cloud Computing Environments
T. Aswini Devi, Arpit Jain
(2024)
Closed Access | Times Cited: 14
T. Aswini Devi, Arpit Jain
(2024)
Closed Access | Times Cited: 14
An edge based hybrid intrusion detection framework for mobile edge computing
Ashish Singh, Kakali Chatterjee, Suresh Chandra Satapathy
Complex & Intelligent Systems (2021) Vol. 8, Iss. 5, pp. 3719-3746
Open Access | Times Cited: 48
Ashish Singh, Kakali Chatterjee, Suresh Chandra Satapathy
Complex & Intelligent Systems (2021) Vol. 8, Iss. 5, pp. 3719-3746
Open Access | Times Cited: 48
Effective network intrusion detection via representation learning: A Denoising AutoEncoder approach
Ivandro Ortet Lopes, Deqing Zou, Ihsan H. Abdulqadder, et al.
Computer Communications (2022) Vol. 194, pp. 55-65
Closed Access | Times Cited: 28
Ivandro Ortet Lopes, Deqing Zou, Ihsan H. Abdulqadder, et al.
Computer Communications (2022) Vol. 194, pp. 55-65
Closed Access | Times Cited: 28
Machine Learning and Deep Learning based Intrusion Detection in Cloud Environment: A Review
A. Vinolia, N. Kanya, V.N. Rajavarman
2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT) (2023), pp. 952-960
Closed Access | Times Cited: 15
A. Vinolia, N. Kanya, V.N. Rajavarman
2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT) (2023), pp. 952-960
Closed Access | Times Cited: 15
Hybrid VGG19 and 2D-CNN for intrusion detection in the FOG-cloud environment
Adel Binbusayyis
Expert Systems with Applications (2023) Vol. 238, pp. 121758-121758
Closed Access | Times Cited: 13
Adel Binbusayyis
Expert Systems with Applications (2023) Vol. 238, pp. 121758-121758
Closed Access | Times Cited: 13
Advanced Hybrid Transformer-CNN Deep Learning Model for Effective Intrusion Detection Systems with Class Imbalance Mitigation Using Resampling Techniques
Hesham M. Kamal, Maggie Mashaly
Future Internet (2024) Vol. 16, Iss. 12, pp. 481-481
Open Access | Times Cited: 5
Hesham M. Kamal, Maggie Mashaly
Future Internet (2024) Vol. 16, Iss. 12, pp. 481-481
Open Access | Times Cited: 5
Enhancing Intrusion Detection Systems With Advanced Machine Learning Techniques: An Ensemble and Explainable Artificial Intelligence (AI ) Approach
Mohammed Naif Alatawi
Security and Privacy (2025) Vol. 8, Iss. 1
Closed Access
Mohammed Naif Alatawi
Security and Privacy (2025) Vol. 8, Iss. 1
Closed Access
Robust Intrusion Detection System Using an Improved Hybrid Deep Learning Model for Binary and Multi-Class Classification in IoT Networks
Hesham M. Kamal, Maggie Mashaly
Technologies (2025) Vol. 13, Iss. 3, pp. 102-102
Open Access
Hesham M. Kamal, Maggie Mashaly
Technologies (2025) Vol. 13, Iss. 3, pp. 102-102
Open Access
Balanced Multi-Class Network Intrusion Detection Using Machine Learning
Faraz Ahmad Khan, Asghar Ali Shah, Nizal Alshammry, et al.
IEEE Access (2024) Vol. 12, pp. 178222-178236
Open Access | Times Cited: 3
Faraz Ahmad Khan, Asghar Ali Shah, Nizal Alshammry, et al.
IEEE Access (2024) Vol. 12, pp. 178222-178236
Open Access | Times Cited: 3
IoT security assisted by machine learning: Unresolved problems and difficulties in the face of advanced persistent threats
B. Pragathi, K. Srinivasa Rao, Palaniappan Ramu, et al.
AIP conference proceedings (2025) Vol. 3162, pp. 020111-020111
Closed Access
B. Pragathi, K. Srinivasa Rao, Palaniappan Ramu, et al.
AIP conference proceedings (2025) Vol. 3162, pp. 020111-020111
Closed Access
An effective intrusion detection system based on feature selection and regularized long short-term memory classifier
Sudha Rani Chikkalwar, Yugandhar Garapati
Multimedia Tools and Applications (2025)
Closed Access
Sudha Rani Chikkalwar, Yugandhar Garapati
Multimedia Tools and Applications (2025)
Closed Access
An Abnormal Traffic Detection Model Combined BiIndRNN With Global Attention
Li Huang, Hongjuan Ge, Haoqi Yang, et al.
IEEE Access (2022) Vol. 10, pp. 30899-30912
Open Access | Times Cited: 13
Li Huang, Hongjuan Ge, Haoqi Yang, et al.
IEEE Access (2022) Vol. 10, pp. 30899-30912
Open Access | Times Cited: 13
Ensemble random forest and deep convolutional neural networks in detecting and classifying the multiple intrusions from near real‐time cloud datasets
Minhaj Khan, Mohd Haroon
Security and Privacy (2024) Vol. 7, Iss. 5
Closed Access | Times Cited: 2
Minhaj Khan, Mohd Haroon
Security and Privacy (2024) Vol. 7, Iss. 5
Closed Access | Times Cited: 2
Statistical Implementation for SD-RNN Model for Multi-Class Classification for Network Intrusion Detection System
Nekita Chavhan
Deleted Journal (2024) Vol. 31, Iss. 2s, pp. 546-560
Open Access | Times Cited: 2
Nekita Chavhan
Deleted Journal (2024) Vol. 31, Iss. 2s, pp. 546-560
Open Access | Times Cited: 2
A Survey on Network-based Intrusion Detection System using Learning Techniques
Rupal K Panchal, Rupal Snehkunj, Vinaykumar V Panchal
(2024), pp. 740-747
Closed Access | Times Cited: 2
Rupal K Panchal, Rupal Snehkunj, Vinaykumar V Panchal
(2024), pp. 740-747
Closed Access | Times Cited: 2
Efficient Dynamic Distributed Resource Slicing in 6G Multi-Access Edge Computing Networks With Online ADMM and Message Passing Graph Neural Networks
Alia Asheralieva, Dusit Niyato, Yoshikazu Miyanaga
IEEE Transactions on Mobile Computing (2023) Vol. 23, Iss. 4, pp. 2614-2638
Closed Access | Times Cited: 6
Alia Asheralieva, Dusit Niyato, Yoshikazu Miyanaga
IEEE Transactions on Mobile Computing (2023) Vol. 23, Iss. 4, pp. 2614-2638
Closed Access | Times Cited: 6
QoS in multimedia application for IoT devices through edge intelligence
R. Ramya, S. Ramamoorthy
Multimedia Tools and Applications (2023) Vol. 83, Iss. 3, pp. 9227-9250
Closed Access | Times Cited: 6
R. Ramya, S. Ramamoorthy
Multimedia Tools and Applications (2023) Vol. 83, Iss. 3, pp. 9227-9250
Closed Access | Times Cited: 6
Secure and Efficient Coded Multi-Access Edge Computing with Generalized Graph Neural Networks
Alia Asheralieva, Dusit Niyato
IEEE Transactions on Mobile Computing (2022), pp. 1-1
Closed Access | Times Cited: 8
Alia Asheralieva, Dusit Niyato
IEEE Transactions on Mobile Computing (2022), pp. 1-1
Closed Access | Times Cited: 8
A Novel CNN-LSTM Fusion-Based Intrusion Detection Method for Industrial Internet
Jinhai Song, Zhiyong Zhang, Kejing Zhao, et al.
International Journal of Information Security and Privacy (2023) Vol. 17, Iss. 1, pp. 1-18
Open Access | Times Cited: 4
Jinhai Song, Zhiyong Zhang, Kejing Zhao, et al.
International Journal of Information Security and Privacy (2023) Vol. 17, Iss. 1, pp. 1-18
Open Access | Times Cited: 4
Ultrareliable Low-Latency Slicing in Space–Air–Ground Multiaccess Edge Computing Networks for Next-Generation Internet of Things and Mobile Applications
Alia Asheralieva, Dusit Niyato, Xuetao Wei
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 3, pp. 3956-3978
Closed Access | Times Cited: 4
Alia Asheralieva, Dusit Niyato, Xuetao Wei
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 3, pp. 3956-3978
Closed Access | Times Cited: 4
A Novel Approach for Anomaly Detection using Snort Integrated with Machine Learning
T. Preethi, Ponnuru Rakshitha Reddy, Lekkala Likhitha, et al.
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) (2024)
Closed Access | Times Cited: 1
T. Preethi, Ponnuru Rakshitha Reddy, Lekkala Likhitha, et al.
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) (2024)
Closed Access | Times Cited: 1
Privacy-Preserving Federated Learning-Based Intrusion Detection Technique for Cyber-Physical Systems
Syeda Aunanya Mahmud, Nazmul Islam, Md Zahidul Islam, et al.
Mathematics (2024) Vol. 12, Iss. 20, pp. 3194-3194
Open Access | Times Cited: 1
Syeda Aunanya Mahmud, Nazmul Islam, Md Zahidul Islam, et al.
Mathematics (2024) Vol. 12, Iss. 20, pp. 3194-3194
Open Access | Times Cited: 1