BPG is committed to discovery and dissemination of knowledge
Cited by in F6Publishing
For: Wang Z, Xu Z, He D, Chan S. Deep logarithmic neural network for Internet intrusion detection. Soft Comput 2021;25:10129-52. [DOI: 10.1007/s00500-021-05987-9] [Cited by in Crossref: 7] [Cited by in F6Publishing: 7] [Article Influence: 7.0] [Reference Citation Analysis]
Number Citing Articles
1 Rajasekaran P, Magudeeswaran V. Malicious attacks detection using GRU-BWFA classifier in pervasive computing. Biomedical Signal Processing and Control 2023;79:104219. [DOI: 10.1016/j.bspc.2022.104219] [Reference Citation Analysis]
2 Fuchs C, Spolaor S, Kaymak U, Nobile MS. The Impact of Variable Selection and Transformation on the Interpretability and Accuracy of Fuzzy Models. 2022 IEEE Conference on Computational Intelligence in Bioinformatics and Computational Biology (CIBCB) 2022. [DOI: 10.1109/cibcb55180.2022.9863019] [Reference Citation Analysis]
3 Hou T, Xing H, Liang X, Su X, Wang Z. Network intrusion detection based on DNA spatial information. Computer Networks 2022. [DOI: 10.1016/j.comnet.2022.109318] [Reference Citation Analysis]
4 Xu W, Fan Y, Maglaras L. Intrusion Detection Systems Based on Logarithmic Autoencoder and XGBoost. Security and Communication Networks 2022;2022:1-8. [DOI: 10.1155/2022/9068724] [Cited by in Crossref: 2] [Cited by in F6Publishing: 2] [Article Influence: 2.0] [Reference Citation Analysis]
5 Zhiqiang L, Mohiuddin G, Jiangbin Z, Asim M, Sifei W. Intrusion detection in wireless sensor network using enhanced empirical based component analysis. Future Generation Computer Systems 2022. [DOI: 10.1016/j.future.2022.04.024] [Cited by in Crossref: 1] [Cited by in F6Publishing: 1] [Article Influence: 1.0] [Reference Citation Analysis]
6 Sun R. Automatic identification of illegal intrusion for social media websites. 2022 14th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA) 2022. [DOI: 10.1109/icmtma54903.2022.00230] [Reference Citation Analysis]