
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Machine Learning-Based Adaptive Synthetic Sampling Technique for Intrusion Detection
Mohammed Zakariah, Salman A. AlQahtani, Mabrook Al‐Rakhami
Applied Sciences (2023) Vol. 13, Iss. 11, pp. 6504-6504
Open Access | Times Cited: 22
Mohammed Zakariah, Salman A. AlQahtani, Mabrook Al‐Rakhami
Applied Sciences (2023) Vol. 13, Iss. 11, pp. 6504-6504
Open Access | Times Cited: 22
Showing 22 citing articles:
Supervised machine learning in drug discovery and development: Algorithms, applications, challenges, and prospects
George Obaido, Ibomoiye Domor Mienye, Oluwaseun Francis Egbelowo, et al.
Machine Learning with Applications (2024) Vol. 17, pp. 100576-100576
Open Access | Times Cited: 20
George Obaido, Ibomoiye Domor Mienye, Oluwaseun Francis Egbelowo, et al.
Machine Learning with Applications (2024) Vol. 17, pp. 100576-100576
Open Access | Times Cited: 20
Robust predictive framework for diabetes classification using optimized machine learning on imbalanced datasets
Inam Abousaber, H. Abdallah, Hany El-Ghaish
Frontiers in Artificial Intelligence (2025) Vol. 7
Open Access | Times Cited: 1
Inam Abousaber, H. Abdallah, Hany El-Ghaish
Frontiers in Artificial Intelligence (2025) Vol. 7
Open Access | Times Cited: 1
Class imbalance data handling with optimal deep learning-based intrusion detection in IoT environment
Manohar Srinivasan, N. Senthilkumar
Soft Computing (2024) Vol. 28, Iss. 5, pp. 4519-4529
Closed Access | Times Cited: 5
Manohar Srinivasan, N. Senthilkumar
Soft Computing (2024) Vol. 28, Iss. 5, pp. 4519-4529
Closed Access | Times Cited: 5
Prediction models for differentiating benign from malignant liver lesions based on multiparametric dual-energy non-contrast CT
Takashi Ota, Hiromitsu Onishi, Hideyuki Fukui, et al.
European Radiology (2024)
Open Access | Times Cited: 4
Takashi Ota, Hiromitsu Onishi, Hideyuki Fukui, et al.
European Radiology (2024)
Open Access | Times Cited: 4
A Survey on Intrusion Detection System in IoT Networks
Md. Mahbubur Rahman, Shaharia Al Shakil, Maimunah Mustakim
Cyber Security and Applications (2024) Vol. 3, pp. 100082-100082
Open Access | Times Cited: 4
Md. Mahbubur Rahman, Shaharia Al Shakil, Maimunah Mustakim
Cyber Security and Applications (2024) Vol. 3, pp. 100082-100082
Open Access | Times Cited: 4
Advanced Hybrid Transformer-CNN Deep Learning Model for Effective Intrusion Detection Systems with Class Imbalance Mitigation Using Resampling Techniques
Hesham M. Kamal, Maggie Mashaly
Future Internet (2024) Vol. 16, Iss. 12, pp. 481-481
Open Access | Times Cited: 4
Hesham M. Kamal, Maggie Mashaly
Future Internet (2024) Vol. 16, Iss. 12, pp. 481-481
Open Access | Times Cited: 4
Adaptive Machine Learning-Based Intrusion Detection Systems for IoT Era
Rahul Vadisetty
Lecture notes in networks and systems (2025), pp. 251-273
Closed Access
Rahul Vadisetty
Lecture notes in networks and systems (2025), pp. 251-273
Closed Access
A Review of Deep Learning Applications in Intrusion Detection Systems: Overcoming Challenges in Spatiotemporal Feature Extraction and Data Imbalance
Ya Zhang, Ravie Chandren Muniyandi, Faizan Qamar
Applied Sciences (2025) Vol. 15, Iss. 3, pp. 1552-1552
Open Access
Ya Zhang, Ravie Chandren Muniyandi, Faizan Qamar
Applied Sciences (2025) Vol. 15, Iss. 3, pp. 1552-1552
Open Access
Adaptive protocols for hypervisor security in cloud infrastructure using federated learning-based anomaly detection
Moutaz Alazab, Albara Awajan, Areej Obeidat, et al.
Engineering Applications of Artificial Intelligence (2025) Vol. 152, pp. 110750-110750
Closed Access
Moutaz Alazab, Albara Awajan, Areej Obeidat, et al.
Engineering Applications of Artificial Intelligence (2025) Vol. 152, pp. 110750-110750
Closed Access
NIDS-CNNRF Integrating CNN and random forest for efficient network intrusion detection model
Kai Yang, J Wang, Guoshuai Zhao, et al.
Internet of Things (2025), pp. 101607-101607
Closed Access
Kai Yang, J Wang, Guoshuai Zhao, et al.
Internet of Things (2025), pp. 101607-101607
Closed Access
Network Intrusion Detection Based on CNN-BiGRU
Jiaming Wang, Kai Yang, Cong Wei, et al.
Lecture notes on data engineering and communications technologies (2025), pp. 62-71
Closed Access
Jiaming Wang, Kai Yang, Cong Wei, et al.
Lecture notes on data engineering and communications technologies (2025), pp. 62-71
Closed Access
High-Precision Network Intrusion Detection Method Based on NIDS-CNNRF
Jiaming Wang, Kai Yang, Cong Wei, et al.
Lecture notes on data engineering and communications technologies (2025), pp. 234-243
Closed Access
Jiaming Wang, Kai Yang, Cong Wei, et al.
Lecture notes on data engineering and communications technologies (2025), pp. 234-243
Closed Access
Customer Shopping Behavior Analysis Using RFID and Machine Learning Models
Ganjar Alfian, Muhammad Qois Huzyan Octava, Farhan Mufti Hilmy, et al.
Information (2023) Vol. 14, Iss. 10, pp. 551-551
Open Access | Times Cited: 10
Ganjar Alfian, Muhammad Qois Huzyan Octava, Farhan Mufti Hilmy, et al.
Information (2023) Vol. 14, Iss. 10, pp. 551-551
Open Access | Times Cited: 10
ROAST-IoT: A Novel Range-Optimized Attention Convolutional Scattered Technique for Intrusion Detection in IoT Networks
Anandaraj Mahalingam, Ganeshkumar Perumal, S. Gopalakrishnan, et al.
Sensors (2023) Vol. 23, Iss. 19, pp. 8044-8044
Open Access | Times Cited: 7
Anandaraj Mahalingam, Ganeshkumar Perumal, S. Gopalakrishnan, et al.
Sensors (2023) Vol. 23, Iss. 19, pp. 8044-8044
Open Access | Times Cited: 7
RETRACTED: Optimizing deep learning-based intrusion detection in cloud computing environment with chaotic tunicate swarm algorithm
C. Jansi Sophia Mary, K. Mahalakshmi
Journal of Intelligent & Fuzzy Systems (2024), pp. 1-13
Closed Access | Times Cited: 1
C. Jansi Sophia Mary, K. Mahalakshmi
Journal of Intelligent & Fuzzy Systems (2024), pp. 1-13
Closed Access | Times Cited: 1
Advances and Challenges in Automated Drowning Detection and Prevention Systems
Maad Shatnawi, Frdoos Albreiki, Ashwaq Alkhoori, et al.
(2024)
Open Access | Times Cited: 1
Maad Shatnawi, Frdoos Albreiki, Ashwaq Alkhoori, et al.
(2024)
Open Access | Times Cited: 1
Enhanced autoencoder-based fraud detection: a novel approach with noise factor encoding and SMOTE
Mert Yılmaz Çakir, Yahya Şirin
Knowledge and Information Systems (2023) Vol. 66, Iss. 1, pp. 635-652
Closed Access | Times Cited: 3
Mert Yılmaz Çakir, Yahya Şirin
Knowledge and Information Systems (2023) Vol. 66, Iss. 1, pp. 635-652
Closed Access | Times Cited: 3
Malware Detection and Classification for Internet of Things Using Self-Attention Based Long Short-Term Memory
K. Sudhakar, Saif O. Husain, Dhivakar Babu, et al.
(2024), pp. 1-5
Closed Access
K. Sudhakar, Saif O. Husain, Dhivakar Babu, et al.
(2024), pp. 1-5
Closed Access
Advances and Challenges in Automated Drowning Detection and Prevention Systems
Maad Shatnawi, Frdoos Albreiki, Ashwaq Alkhoori, et al.
Information (2024) Vol. 15, Iss. 11, pp. 721-721
Open Access
Maad Shatnawi, Frdoos Albreiki, Ashwaq Alkhoori, et al.
Information (2024) Vol. 15, Iss. 11, pp. 721-721
Open Access
Harnessing Machine Learning for Adaptive Signature-Based Network Intrusion Detection: A Simulation-Driven Approach
Peter Paul Issah, Ransford Ganyo
International Journal of Latest Technology in Engineering Management & Applied Science (2024) Vol. 13, Iss. 10, pp. 181-192
Open Access
Peter Paul Issah, Ransford Ganyo
International Journal of Latest Technology in Engineering Management & Applied Science (2024) Vol. 13, Iss. 10, pp. 181-192
Open Access
Electricity Theft Detection System Using Cloud Computing and Deep Learning Techniques
Saja Abdul-hamza, Laith Ali Abdul-Rahaim, Sarmad Ibrahim
International journal of intelligent engineering and systems (2023) Vol. 16, Iss. 5, pp. 438-448
Open Access | Times Cited: 1
Saja Abdul-hamza, Laith Ali Abdul-Rahaim, Sarmad Ibrahim
International journal of intelligent engineering and systems (2023) Vol. 16, Iss. 5, pp. 438-448
Open Access | Times Cited: 1
Enhancing Intrusion Detection with Autoencoder Based Classifier and Statistical Feature Selection
Abbas F. H. Alharan
Wasit Journal of Pure sciences (2023) Vol. 2, Iss. 4, pp. 97-105
Open Access
Abbas F. H. Alharan
Wasit Journal of Pure sciences (2023) Vol. 2, Iss. 4, pp. 97-105
Open Access