
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Enhancing intrusion detection: a hybrid machine and deep learning approach
Muhammad Sajid, Kaleem Razzaq Malik, Ahmad Almogren, et al.
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 27
Muhammad Sajid, Kaleem Razzaq Malik, Ahmad Almogren, et al.
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 27
Showing 1-25 of 27 citing articles:
Explainable AI-based innovative hybrid ensemble model for intrusion detection
Usman Ahmed, Jiangbin Zheng, Ahmad Almogren, et al.
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 5
Usman Ahmed, Jiangbin Zheng, Ahmad Almogren, et al.
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 5
Enhanced Deep Autoencoder-Based Reinforcement Learning Model with Improved Flamingo Search Policy Selection for Attack Classification
Dharani Kanta Roy, Hemanta Kalita
Journal of Cybersecurity and Privacy (2025) Vol. 5, Iss. 1, pp. 3-3
Open Access
Dharani Kanta Roy, Hemanta Kalita
Journal of Cybersecurity and Privacy (2025) Vol. 5, Iss. 1, pp. 3-3
Open Access
Privacy-preserving approach for IoT networks using statistical learning with optimization algorithm on high-dimensional big data environment
Fatma S. Alrayes, Mohammed Maray, Asma Alshuhail, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Fatma S. Alrayes, Mohammed Maray, Asma Alshuhail, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Robust machine learning based Intrusion detection system using simple statistical techniques in feature selection
Sunil Kaushik, Akashdeep Bhardwaj, Ahmad Almogren, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Sunil Kaushik, Akashdeep Bhardwaj, Ahmad Almogren, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Development of Hybrid Intrusion Detection System Leveraging Ensemble Stacked Feature Selectors and Learning Classifiers to Mitigate the DoS Attacks
P. Mamatha, S. Balaji, S. Sai Anuraghav
International Journal of Computational Intelligence Systems (2025) Vol. 18, Iss. 1
Open Access
P. Mamatha, S. Balaji, S. Sai Anuraghav
International Journal of Computational Intelligence Systems (2025) Vol. 18, Iss. 1
Open Access
Hybrid Machine Learning for IoT-Enabled Smart Buildings
Robert-Alexandru Crăciun, Simona Iuliana Caramihai, Ştefan Mocanu, et al.
Informatics (2025) Vol. 12, Iss. 1, pp. 17-17
Open Access
Robert-Alexandru Crăciun, Simona Iuliana Caramihai, Ştefan Mocanu, et al.
Informatics (2025) Vol. 12, Iss. 1, pp. 17-17
Open Access
Hybrid Neural Network-Based Intrusion Detection System: Leveraging LightGBM and MobileNetV2 for IoT Security
Yeh-Fen Yang, Ko-Chin Chang, Jia-Ning Luo
Symmetry (2025) Vol. 17, Iss. 3, pp. 314-314
Open Access
Yeh-Fen Yang, Ko-Chin Chang, Jia-Ning Luo
Symmetry (2025) Vol. 17, Iss. 3, pp. 314-314
Open Access
Design of advanced intrusion detection in cybersecurity using ensemble of deep learning models with an improved beluga whale optimization algorithm
Fatimah Alhayan, Nuha Alruwais, Mohammad Alamgeer, et al.
Alexandria Engineering Journal (2025) Vol. 121, pp. 90-102
Closed Access
Fatimah Alhayan, Nuha Alruwais, Mohammad Alamgeer, et al.
Alexandria Engineering Journal (2025) Vol. 121, pp. 90-102
Closed Access
Advancing Cybersecurity Through Machine Learning: A Scientometric Analysis of Global Research Trends and Influential Contributions
Kamran Razzaq, Mahmood Shah
Journal of Cybersecurity and Privacy (2025) Vol. 5, Iss. 2, pp. 12-12
Open Access
Kamran Razzaq, Mahmood Shah
Journal of Cybersecurity and Privacy (2025) Vol. 5, Iss. 2, pp. 12-12
Open Access
Advancing Artificial Intelligence of Things Security: Integrating Feature Selection and Deep Learning for Real-Time Intrusion Detection
Faisal Albalwy, Muhannad Almohaimeed
Systems (2025) Vol. 13, Iss. 4, pp. 231-231
Open Access
Faisal Albalwy, Muhannad Almohaimeed
Systems (2025) Vol. 13, Iss. 4, pp. 231-231
Open Access
Intrusion detection in internet of things using differential privacy: A hybrid machine learning approach
Ankit Manderna, Upasana Dohare, Sushil Kumar, et al.
Ad Hoc Networks (2025), pp. 103818-103818
Closed Access
Ankit Manderna, Upasana Dohare, Sushil Kumar, et al.
Ad Hoc Networks (2025), pp. 103818-103818
Closed Access
An Enhanced Intrusion Detection Model with FeedForward Neural Network Classifier
Asadov Amirjon, Mrityunjoy Gain, K. Kim, et al.
(2025), pp. 88-93
Closed Access
Asadov Amirjon, Mrityunjoy Gain, K. Kim, et al.
(2025), pp. 88-93
Closed Access
T-Sanitation: contrastive masked auto-encoder-based few-shot learning for malicious traffic detection
Jianwen Sun, Bin Zhang, Hongyu Li, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 5
Closed Access
Jianwen Sun, Bin Zhang, Hongyu Li, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 5
Closed Access
Real-Time Large-Scale Intrusion Detection and Prevention System (IDPS) CICIoT Dataset Traffic Assessment Based on Deep Learning
Samuel Erskine
Applied System Innovation (2025) Vol. 8, Iss. 2, pp. 52-52
Open Access
Samuel Erskine
Applied System Innovation (2025) Vol. 8, Iss. 2, pp. 52-52
Open Access
Improving Intrusion Detecction Systems by using Deep Learning Methods on Time Series Data
Asma Ahmed A. Mohammed
Engineering Technology & Applied Science Research (2025) Vol. 15, Iss. 1, pp. 19267-19272
Open Access
Asma Ahmed A. Mohammed
Engineering Technology & Applied Science Research (2025) Vol. 15, Iss. 1, pp. 19267-19272
Open Access
Security Enhancement in 5G Networks by Identifying Attacks Using Optimized Cosine Convolutional Neural Network
Premalatha Santhanamari, K. Vijayakumar, L. Subramanian, et al.
Internet Technology Letters (2025) Vol. 8, Iss. 2
Closed Access
Premalatha Santhanamari, K. Vijayakumar, L. Subramanian, et al.
Internet Technology Letters (2025) Vol. 8, Iss. 2
Closed Access
Chaotic Adaptive Particle Swarm Optimization and Quantum-Inspired Genetic Algorithm for Robust Feature Selection in IoT Intrusion Detection
Padmasri Turaka, Saroj Kumar Panigrahy
(2025), pp. 1-6
Closed Access
Padmasri Turaka, Saroj Kumar Panigrahy
(2025), pp. 1-6
Closed Access
Artificial Intelligence-Driven Network Intrusion Detection and Response System
Haokun Chen, Yiqun Wang, Song Zhai, et al.
Lecture notes in networks and systems (2025), pp. 508-518
Closed Access
Haokun Chen, Yiqun Wang, Song Zhai, et al.
Lecture notes in networks and systems (2025), pp. 508-518
Closed Access
A comprehensive systematic review of intrusiondetection systems: emerging techniques,challenges, and future research directions
Arjun Kumar Bose Arnob, Rajarshi Roy Chowdhury, Nusrat Alam Chaiti, et al.
Journal of Edge Computing (2025)
Open Access
Arjun Kumar Bose Arnob, Rajarshi Roy Chowdhury, Nusrat Alam Chaiti, et al.
Journal of Edge Computing (2025)
Open Access
A Hybrid CNN and Attentive Hierarchical BiLSTM Model with SMO for Intrusion Detection in IIoT
Sushama Laxman Pawar, Mandar Karyakarte
Research Square (Research Square) (2025)
Closed Access
Sushama Laxman Pawar, Mandar Karyakarte
Research Square (Research Square) (2025)
Closed Access
Hakeem Babalola Akande, Agbotiname Lucky Imoize, Temitayo C. Adeniran, et al.
Security and Privacy (2025) Vol. 8, Iss. 3
Closed Access
A Hybrid Approach of Data Mining and Deep Learning for Network Intrusion Detection
M. S. Alam, Yash Patel, Yaswanthsrinivas Gurram, et al.
(2025), pp. 215-220
Closed Access
M. S. Alam, Yash Patel, Yaswanthsrinivas Gurram, et al.
(2025), pp. 215-220
Closed Access
Adaptive convolutional-LSTM neural network with NADAM optimization for intrusion detection in underwater IoT wireless sensor networks
Samson S Arivumani, Mahesh Nagarajan
Engineering Research Express (2024) Vol. 6, Iss. 3, pp. 035243-035243
Closed Access | Times Cited: 2
Samson S Arivumani, Mahesh Nagarajan
Engineering Research Express (2024) Vol. 6, Iss. 3, pp. 035243-035243
Closed Access | Times Cited: 2
Leveraging AI for Network Threat Detection—A Conceptual Overview
Muhammad Ali Paracha, Syed Usman Jamil, Khurram Shahzad, et al.
Electronics (2024) Vol. 13, Iss. 23, pp. 4611-4611
Open Access | Times Cited: 1
Muhammad Ali Paracha, Syed Usman Jamil, Khurram Shahzad, et al.
Electronics (2024) Vol. 13, Iss. 23, pp. 4611-4611
Open Access | Times Cited: 1
CNN-GWO-voting & hybrid: ensemble learning inspired intrusion detection approaches for cyber-physical systems
Ram Ji, Neerendra Kumar, Devanand Padha
DELETED (2024)
Closed Access | Times Cited: 1
Ram Ji, Neerendra Kumar, Devanand Padha
DELETED (2024)
Closed Access | Times Cited: 1