
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A feature selection algorithm for intrusion detection system based on Pigeon Inspired Optimizer
Hadeel Alazzam, Ahmad Sharieh, Khair Eddin Sabri
Expert Systems with Applications (2020) Vol. 148, pp. 113249-113249
Closed Access | Times Cited: 320
Hadeel Alazzam, Ahmad Sharieh, Khair Eddin Sabri
Expert Systems with Applications (2020) Vol. 148, pp. 113249-113249
Closed Access | Times Cited: 320
Showing 26-50 of 320 citing articles:
A Machine Learning Approach for Intrusion Detection System on NSL-KDD Dataset
Iram Abrar, Zahrah Ayub, Faheem Masoodi, et al.
2020 International Conference on Smart Electronics and Communication (ICOSEC) (2020), pp. 919-924
Closed Access | Times Cited: 96
Iram Abrar, Zahrah Ayub, Faheem Masoodi, et al.
2020 International Conference on Smart Electronics and Communication (ICOSEC) (2020), pp. 919-924
Closed Access | Times Cited: 96
Intelligent Network Intrusion Prevention Feature Collection and Classification Algorithms
Deepaa Selva, B. Nagaraj, Danil Pelusi, et al.
Algorithms (2021) Vol. 14, Iss. 8, pp. 224-224
Open Access | Times Cited: 92
Deepaa Selva, B. Nagaraj, Danil Pelusi, et al.
Algorithms (2021) Vol. 14, Iss. 8, pp. 224-224
Open Access | Times Cited: 92
Coronavirus herd immunity optimizer with greedy crossover for feature selection in medical diagnosis
Mohammed Alweshah, Saleh Alkhalaileh, Mohammed Azmi Al‐Betar, et al.
Knowledge-Based Systems (2021) Vol. 235, pp. 107629-107629
Open Access | Times Cited: 81
Mohammed Alweshah, Saleh Alkhalaileh, Mohammed Azmi Al‐Betar, et al.
Knowledge-Based Systems (2021) Vol. 235, pp. 107629-107629
Open Access | Times Cited: 81
The Anomaly- and Signature-Based IDS for Network Security Using Hybrid Inference Systems
Sajad Einy, Cemil Öz, Yahya Dorostkar Navaei
Mathematical Problems in Engineering (2021) Vol. 2021, pp. 1-10
Open Access | Times Cited: 79
Sajad Einy, Cemil Öz, Yahya Dorostkar Navaei
Mathematical Problems in Engineering (2021) Vol. 2021, pp. 1-10
Open Access | Times Cited: 79
A wrapper‐based feature selection for improving performance of intrusion detection systems
Maryam Samadi Bonab, Ali Ghaffari, Farhad Soleimanian Gharehchopogh, et al.
International Journal of Communication Systems (2020) Vol. 33, Iss. 12
Closed Access | Times Cited: 77
Maryam Samadi Bonab, Ali Ghaffari, Farhad Soleimanian Gharehchopogh, et al.
International Journal of Communication Systems (2020) Vol. 33, Iss. 12
Closed Access | Times Cited: 77
A Reliable Network Intrusion Detection Approach Using Decision Tree with Enhanced Data Quality
Azidine Guezzaz, Said Benkirane, Mourade Azrour, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-8
Open Access | Times Cited: 71
Azidine Guezzaz, Said Benkirane, Mourade Azrour, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-8
Open Access | Times Cited: 71
An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning
Orieb Abu Alghanam, Wesam Almobaideen, Maha Saadeh, et al.
Expert Systems with Applications (2022) Vol. 213, pp. 118745-118745
Closed Access | Times Cited: 66
Orieb Abu Alghanam, Wesam Almobaideen, Maha Saadeh, et al.
Expert Systems with Applications (2022) Vol. 213, pp. 118745-118745
Closed Access | Times Cited: 66
lIDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning
Chaimae Hazman, Azidine Guezzaz, Said Benkirane, et al.
Cluster Computing (2022) Vol. 26, Iss. 6, pp. 4069-4083
Closed Access | Times Cited: 62
Chaimae Hazman, Azidine Guezzaz, Said Benkirane, et al.
Cluster Computing (2022) Vol. 26, Iss. 6, pp. 4069-4083
Closed Access | Times Cited: 62
Binary Aquila Optimizer for Selecting Effective Features from Medical Data: A COVID-19 Case Study
Mohammad H. Nadimi-Shahraki, Shokooh Taghian, Seyedali Mirjalili, et al.
Mathematics (2022) Vol. 10, Iss. 11, pp. 1929-1929
Open Access | Times Cited: 60
Mohammad H. Nadimi-Shahraki, Shokooh Taghian, Seyedali Mirjalili, et al.
Mathematics (2022) Vol. 10, Iss. 11, pp. 1929-1929
Open Access | Times Cited: 60
An intrusion detection system using optimized deep neural network architecture
Mangayarkarasi Ramaiah, Vanmathi Chandrasekaran, Vinayakumar Ravi, et al.
Transactions on Emerging Telecommunications Technologies (2021) Vol. 32, Iss. 4
Closed Access | Times Cited: 55
Mangayarkarasi Ramaiah, Vanmathi Chandrasekaran, Vinayakumar Ravi, et al.
Transactions on Emerging Telecommunications Technologies (2021) Vol. 32, Iss. 4
Closed Access | Times Cited: 55
Cyber Intrusion Detection System Based on a Multiobjective Binary Bat Algorithm for Feature Selection and Enhanced Bat Algorithm for Parameter Optimization in Neural Networks
Waheed Ali H. M. Ghanem, Sanaa A. A. Ghaleb, Aman Jantan, et al.
IEEE Access (2022) Vol. 10, pp. 76318-76339
Open Access | Times Cited: 50
Waheed Ali H. M. Ghanem, Sanaa A. A. Ghaleb, Aman Jantan, et al.
IEEE Access (2022) Vol. 10, pp. 76318-76339
Open Access | Times Cited: 50
Hybrid Meta-Heuristic based Feature Selection Mechanism for Cyber-Attack Detection in IoT-enabled Networks
Arun Kumar Dey, Govind P. Gupta, Satya Prakash Sahu
Procedia Computer Science (2023) Vol. 218, pp. 318-327
Open Access | Times Cited: 32
Arun Kumar Dey, Govind P. Gupta, Satya Prakash Sahu
Procedia Computer Science (2023) Vol. 218, pp. 318-327
Open Access | Times Cited: 32
Inkjet-printed ZnO-based MEMS sensor array combined with feature selection algorithm for VOCs gas analysis
Tiancheng Zhang, Ruiqin Tan, Wenfeng Shen, et al.
Sensors and Actuators B Chemical (2023) Vol. 382, pp. 133555-133555
Closed Access | Times Cited: 26
Tiancheng Zhang, Ruiqin Tan, Wenfeng Shen, et al.
Sensors and Actuators B Chemical (2023) Vol. 382, pp. 133555-133555
Closed Access | Times Cited: 26
Towards an efficient model for network intrusion detection system (IDS): systematic literature review
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed
Wireless Networks (2023) Vol. 30, Iss. 1, pp. 453-482
Closed Access | Times Cited: 22
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed
Wireless Networks (2023) Vol. 30, Iss. 1, pp. 453-482
Closed Access | Times Cited: 22
An oscillatory particle swarm optimization feature selection algorithm for hybrid data based on mutual information entropy
Jiali He, Liangdong Qu, Pei Wang, et al.
Applied Soft Computing (2024) Vol. 152, pp. 111261-111261
Closed Access | Times Cited: 13
Jiali He, Liangdong Qu, Pei Wang, et al.
Applied Soft Computing (2024) Vol. 152, pp. 111261-111261
Closed Access | Times Cited: 13
Hybrid wrapper feature selection method based on genetic algorithm and extreme learning machine for intrusion detection
Elijah M. Maseno, Zenghui Wang
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 12
Elijah M. Maseno, Zenghui Wang
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 12
A fast intrusion detection system based on swift wrapper feature selection and speedy ensemble classifier
Ezgi Zorarpacı
Engineering Applications of Artificial Intelligence (2024) Vol. 133, pp. 108162-108162
Closed Access | Times Cited: 10
Ezgi Zorarpacı
Engineering Applications of Artificial Intelligence (2024) Vol. 133, pp. 108162-108162
Closed Access | Times Cited: 10
A Systematic Literature Review on Swarm Intelligence Based Intrusion Detection System: Past, Present and Future
Dukka Karun Kumar Reddy, Janmenjoy Nayak, H. S. Behera, et al.
Archives of Computational Methods in Engineering (2024) Vol. 31, Iss. 5, pp. 2717-2784
Closed Access | Times Cited: 9
Dukka Karun Kumar Reddy, Janmenjoy Nayak, H. S. Behera, et al.
Archives of Computational Methods in Engineering (2024) Vol. 31, Iss. 5, pp. 2717-2784
Closed Access | Times Cited: 9
Effects of Feature Selection and Normalization on Network Intrusion Detection
Mubarak Albarka Umar, Zhanfang Chen, Khaled Shuaib, et al.
(2024)
Open Access | Times Cited: 8
Mubarak Albarka Umar, Zhanfang Chen, Khaled Shuaib, et al.
(2024)
Open Access | Times Cited: 8
Modified Aquila Optimizer Feature Selection Approach and Support Vector Machine Classifier for Intrusion Detection System
Laith Abualigah, Saba Hussein Ahmed, Mohammad H. Almomani, et al.
Multimedia Tools and Applications (2024) Vol. 83, Iss. 21, pp. 59887-59913
Closed Access | Times Cited: 7
Laith Abualigah, Saba Hussein Ahmed, Mohammad H. Almomani, et al.
Multimedia Tools and Applications (2024) Vol. 83, Iss. 21, pp. 59887-59913
Closed Access | Times Cited: 7
A multi-objective immune algorithm for intrusion feature selection
Wenhong Wei, Shuo Chen, Qiuzhen Lin, et al.
Applied Soft Computing (2020) Vol. 95, pp. 106522-106522
Open Access | Times Cited: 63
Wenhong Wei, Shuo Chen, Qiuzhen Lin, et al.
Applied Soft Computing (2020) Vol. 95, pp. 106522-106522
Open Access | Times Cited: 63
Network intrusion detection based on deep learning model optimized with rule-based hybrid feature selection
Femi Emmanuel Ayo, Sakinat Oluwabukonla Folorunso, Adebayo Abayomi‐Alli, et al.
Information Security Journal A Global Perspective (2020) Vol. 29, Iss. 6, pp. 267-283
Closed Access | Times Cited: 60
Femi Emmanuel Ayo, Sakinat Oluwabukonla Folorunso, Adebayo Abayomi‐Alli, et al.
Information Security Journal A Global Perspective (2020) Vol. 29, Iss. 6, pp. 267-283
Closed Access | Times Cited: 60
A robust SVM-based approach with feature selection and outliers detection for classification problems
Marta Baldomero‐Naranjo, Luisa I. Martínez-Merino, Antonio M. Rodríguez‐Chía
Expert Systems with Applications (2021) Vol. 178, pp. 115017-115017
Closed Access | Times Cited: 53
Marta Baldomero‐Naranjo, Luisa I. Martínez-Merino, Antonio M. Rodríguez‐Chía
Expert Systems with Applications (2021) Vol. 178, pp. 115017-115017
Closed Access | Times Cited: 53
An ensemble based approach for effective intrusion detection using majority voting
Alwi M. Bamhdi, Iram Abrar, Faheem Masoodi
TELKOMNIKA (Telecommunication Computing Electronics and Control) (2021) Vol. 19, Iss. 2, pp. 664-664
Open Access | Times Cited: 41
Alwi M. Bamhdi, Iram Abrar, Faheem Masoodi
TELKOMNIKA (Telecommunication Computing Electronics and Control) (2021) Vol. 19, Iss. 2, pp. 664-664
Open Access | Times Cited: 41
A Hybrid Approach for Network Intrusion Detection
Mavra Mehmood, Talha Javed, Jamel Nebhen, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2021) Vol. 70, Iss. 1, pp. 91-107
Open Access | Times Cited: 40
Mavra Mehmood, Talha Javed, Jamel Nebhen, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2021) Vol. 70, Iss. 1, pp. 91-107
Open Access | Times Cited: 40