OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Intrusion detection in cloud computing based on time series anomalies utilizing machine learning
Abdel-Rahman Al-Ghuwairi, Yousef Sharrab, Dimah Al-Fraihat, et al.
Journal of Cloud Computing Advances Systems and Applications (2023) Vol. 12, Iss. 1
Open Access | Times Cited: 38

Showing 1-25 of 38 citing articles:

Double fuzzy clustering-driven context neural network for intrusion detection in cloud computing
S. Anu Velavan, C. Sureshkumar
Wireless Networks (2025)
Closed Access | Times Cited: 4

Time series forecasting and anomaly detection using deep learning
Amjad Iqbal, Rashid Amin
Computers & Chemical Engineering (2023) Vol. 182, pp. 108560-108560
Closed Access | Times Cited: 21

An empirical assessment of ML models for 5G network intrusion detection: A data leakage-free approach
Mohamed Aly Bouke, Azizol Abdullah
e-Prime - Advances in Electrical Engineering Electronics and Energy (2024) Vol. 8, pp. 100590-100590
Open Access | Times Cited: 8

Multi-type concept drift detection under a dual-layer variable sliding window in frequent pattern mining with cloud computing
Jing Chen, Shengyi Yang, Ting Gao, et al.
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 6

Cloud Network Anomaly Detection Using Machine and Deep Learning Techniques— Recent Research Advancements
Amira Mahamat Abdallah, Aysha Saif Rashed Obaid Alkaabi, Ghaya Bark Nasser Douman Alameri, et al.
IEEE Access (2024) Vol. 12, pp. 56749-56773
Open Access | Times Cited: 5

Anomaly detection in multivariate time series data using deep ensemble models
Amjad Iqbal, Rashid Amin, Faisal S. Alsubaei, et al.
PLoS ONE (2024) Vol. 19, Iss. 6, pp. e0303890-e0303890
Open Access | Times Cited: 4

Detection and Classification of Novel Attacks and Anomaly in IoT Network using Rule based Deep Learning Model
Sanjay Chakraborty, Saroj Kumar Pandey, Saikat Ranjan Maity, et al.
SN Computer Science (2024) Vol. 5, Iss. 8
Closed Access | Times Cited: 4

A Survey on Intrusion Detection System in IoT Networks
Md. Mahbubur Rahman, Shaharia Al Shakil, Maimunah Mustakim
Cyber Security and Applications (2024) Vol. 3, pp. 100082-100082
Open Access | Times Cited: 4

Sequence Outlier Detection and Application of Gated Recurrent Unit Autoencoder Gaussian Mixture Model Based on Various Loss Optimization
Ting Xu, Yuzhu Tian, C.H. Wu, et al.
Statistical Analysis and Data Mining The ASA Data Science Journal (2025) Vol. 18, Iss. 1
Closed Access

MultiCIDS: Anomaly-based collective intrusion detection by deep learning on IoT/CPS multivariate time series
Marta Catillo, Antonio Pecchia, Umberto Villano
Internet of Things (2025), pp. 101519-101519
Closed Access

Toward Scalable Security: Intrusion Detection with Spark-Based Classifiers on Hadoop YARN
Omar Alhammadi, Ashraf Elnagar
Lecture notes in networks and systems (2025), pp. 331-342
Closed Access

Revolutionizing Network Security: Harnessing Deep Learning for Anomaly Detection in Time-Series Data
G. Lakshmi Praveena, R. Usha, T. Pratyusha, et al.
Cognitive science and technology (2025), pp. 499-508
Closed Access

A novel ML based structure for mitigating security risks in a cloud environment
Gurjit Kaur, Gurbinder Singh Brar, Shalli Rani
AIP conference proceedings (2025) Vol. 3227, pp. 060013-060013
Closed Access

Data Security and Network Security in Cloud
Arun Pandiyan Perumal, Viralkumar Ahire
Advances in computational intelligence and robotics book series (2025), pp. 1-30
Closed Access

Swarm optimized differential evolution and probabilistic extreme learning based intrusion detection in MANET
R. D. Sathiya, N. Yuvaraj
Computers & Security (2024) Vol. 144, pp. 103970-103970
Closed Access | Times Cited: 3

Perspective Chapter: Intrusion Detection Systems in Cloud Environment
Waleed Almuseelem
IntechOpen eBooks (2025)
Closed Access

Improving Intrusion Detecction Systems by using Deep Learning Methods on Time Series Data
Asma Ahmed A. Mohammed
Engineering Technology & Applied Science Research (2025) Vol. 15, Iss. 1, pp. 19267-19272
Open Access

Securing Virtualized Cloud Infrastructures with Temporal Inductive Path Neural Networks for Attack Detection
C.P. Vijay, Muthu Perumal
Knowledge-Based Systems (2025), pp. 113715-113715
Closed Access

Investigate the Role of Machine Learning in Optimizing Dynamic Scaling Strategies for Cloud-Based Applications
Santhosh Kumar Gopal, Abdul Sajid Mohammed, Venkata Ramana Saddi, et al.
(2024), pp. 543-548
Closed Access | Times Cited: 2

An Efficient CNN-Based Intrusion Detection System for IoT: Use Case Towards Cybersecurity
Amogh Deshmukh, Kiran Kumar Ravulakollu
Technologies (2024) Vol. 12, Iss. 10, pp. 203-203
Open Access | Times Cited: 2

Deep Neural Networks in Social Media Forensics: Unveiling Suspicious Patterns and Advancing Investigations on Twitter
Yousef Sharrab, Dimah Al-Fraihat, Mohammad Alsmirat
(2023), pp. 95-102
Closed Access | Times Cited: 6

Cybersecurity Threats in the Era of AI: Detection of Phishing Domains Through Classification Rules
Mohammad Aljaidi, Ayoub Alsarhan, Dimah Al-Fraihat, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 6

Seguridad de la Información en la Nube: Una revisión sistemática
Elvis Ortiz, C. Vidal, Alberto Carlos Mendoza de los Santos
Revista Científica Ciencias Ingenieriles (2024) Vol. 4, Iss. 1, pp. 69-78
Open Access | Times Cited: 1

iHELP: a model for instant learning of video coding in VR/AR real-time applications
Yousef Sharrab, Mohammad Alsmirat, Mohammad Ali H. Eljinini, et al.
Multimedia Tools and Applications (2024) Vol. 83, Iss. 33, pp. 79397-79436
Closed Access | Times Cited: 1

Application of a Novel Data-Driven Framework in Anomaly Detection of Industrial Data
Song Ying, Danjing Li
IEEE Access (2024) Vol. 12, pp. 102798-102812
Open Access | Times Cited: 1

Page 1 - Next Page

Scroll to top