
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Advanced Feature Extraction and Selection Approach Using Deep Learning and Aquila Optimizer for IoT Intrusion Detection System
Abdulaziz Fatani, Abdelghani Dahou, Mohammed A. A. Al‐qaness, et al.
Sensors (2021) Vol. 22, Iss. 1, pp. 140-140
Open Access | Times Cited: 133
Abdulaziz Fatani, Abdelghani Dahou, Mohammed A. A. Al‐qaness, et al.
Sensors (2021) Vol. 22, Iss. 1, pp. 140-140
Open Access | Times Cited: 133
Showing 26-50 of 133 citing articles:
Training fuzzy deep neural network with honey badger algorithm for intrusion detection in cloud environment
Deepak Kumar Jain, Weiping Ding, Ketan Kotecha
International Journal of Machine Learning and Cybernetics (2023) Vol. 14, Iss. 6, pp. 2221-2237
Closed Access | Times Cited: 18
Deepak Kumar Jain, Weiping Ding, Ketan Kotecha
International Journal of Machine Learning and Cybernetics (2023) Vol. 14, Iss. 6, pp. 2221-2237
Closed Access | Times Cited: 18
The cybersecurity mesh: A comprehensive survey of involved artificial intelligence methods, cryptographic protocols and challenges for future research
Bruno Ramos-Cruz, Javier Andreu-Pérez, Luis Martı́nez
Neurocomputing (2024) Vol. 581, pp. 127427-127427
Open Access | Times Cited: 5
Bruno Ramos-Cruz, Javier Andreu-Pérez, Luis Martı́nez
Neurocomputing (2024) Vol. 581, pp. 127427-127427
Open Access | Times Cited: 5
A hybrid approach for efficient feature selection in anomaly intrusion detection for IoT networks
Aya G. Ayad, Nehal A. Sakr, Noha A. Hikal
The Journal of Supercomputing (2024) Vol. 80, Iss. 19, pp. 26942-26984
Open Access | Times Cited: 5
Aya G. Ayad, Nehal A. Sakr, Noha A. Hikal
The Journal of Supercomputing (2024) Vol. 80, Iss. 19, pp. 26942-26984
Open Access | Times Cited: 5
A Review of Deep Learning Applications in Intrusion Detection Systems: Overcoming Challenges in Spatiotemporal Feature Extraction and Data Imbalance
Ya Zhang, Ravie Chandren Muniyandi, Faizan Qamar
Applied Sciences (2025) Vol. 15, Iss. 3, pp. 1552-1552
Open Access
Ya Zhang, Ravie Chandren Muniyandi, Faizan Qamar
Applied Sciences (2025) Vol. 15, Iss. 3, pp. 1552-1552
Open Access
A Smart Approach for Early Detection of DDoS Attacks: Artificial Neural Network and Random Forest Hybridization
Ishmam Ahmed Ongshu, Ahmed Wasif Reza, Md. Emad Uddin Aksir, et al.
Procedia Computer Science (2025) Vol. 252, pp. 490-499
Open Access
Ishmam Ahmed Ongshu, Ahmed Wasif Reza, Md. Emad Uddin Aksir, et al.
Procedia Computer Science (2025) Vol. 252, pp. 490-499
Open Access
EBAO: An Intrusion Detection Framework for Wireless Sensor Networks Using an Enhanced Binary Aquila Optimizer
Noor Aldeen Alawad, Bilal H. Abed-alguni, Ala Mohammad Shakhatreh
Knowledge-Based Systems (2025), pp. 113156-113156
Closed Access
Noor Aldeen Alawad, Bilal H. Abed-alguni, Ala Mohammad Shakhatreh
Knowledge-Based Systems (2025), pp. 113156-113156
Closed Access
HC-NIDS: Historical contextual information based network intrusion detection system in Internet of Things
Zijie Chen, Hailin Zou, Tao Hu, et al.
Computers & Security (2025), pp. 104367-104367
Closed Access
Zijie Chen, Hailin Zou, Tao Hu, et al.
Computers & Security (2025), pp. 104367-104367
Closed Access
Design of Aquila Optimization Heuristic for Identification of Control Autoregressive Systems
Khizer Mehmood, Naveed Ishtiaq Chaudhary, Zeshan Aslam Khan, et al.
Mathematics (2022) Vol. 10, Iss. 10, pp. 1749-1749
Open Access | Times Cited: 26
Khizer Mehmood, Naveed Ishtiaq Chaudhary, Zeshan Aslam Khan, et al.
Mathematics (2022) Vol. 10, Iss. 10, pp. 1749-1749
Open Access | Times Cited: 26
An intellectual intrusion detection system using Hybrid Hunger Games Search and Remora Optimization Algorithm for IoT wireless networks
Ravinder Kumar, Amita Malik, Virender Ranga
Knowledge-Based Systems (2022) Vol. 256, pp. 109762-109762
Closed Access | Times Cited: 25
Ravinder Kumar, Amita Malik, Virender Ranga
Knowledge-Based Systems (2022) Vol. 256, pp. 109762-109762
Closed Access | Times Cited: 25
Immunity-based Ebola optimization search algorithm for minimization of feature extraction with reduction in digital mammography using CNN models
Olaide N. Oyelade, Absalom E. Ezugwu
Scientific Reports (2022) Vol. 12, Iss. 1
Open Access | Times Cited: 23
Olaide N. Oyelade, Absalom E. Ezugwu
Scientific Reports (2022) Vol. 12, Iss. 1
Open Access | Times Cited: 23
A Cox Proportional-Hazards Model Based on an Improved Aquila Optimizer with Whale Optimization Algorithm Operators
Ahmed A. Ewees, Zakariya Yahya Algamal, Laith Abualigah, et al.
Mathematics (2022) Vol. 10, Iss. 8, pp. 1273-1273
Open Access | Times Cited: 22
Ahmed A. Ewees, Zakariya Yahya Algamal, Laith Abualigah, et al.
Mathematics (2022) Vol. 10, Iss. 8, pp. 1273-1273
Open Access | Times Cited: 22
Wind Power Forecasting Using Optimized Dendritic Neural Model Based on Seagull Optimization Algorithm and Aquila Optimizer
Mohammed A. A. Al‐qaness, Ahmed A. Ewees, Mohamed Abd Elaziz, et al.
Energies (2022) Vol. 15, Iss. 24, pp. 9261-9261
Open Access | Times Cited: 22
Mohammed A. A. Al‐qaness, Ahmed A. Ewees, Mohamed Abd Elaziz, et al.
Energies (2022) Vol. 15, Iss. 24, pp. 9261-9261
Open Access | Times Cited: 22
Design of Efficient Based Artificial Intelligence Approaches for Sustainable of Cyber Security in Smart Industrial Control System
Ali Alzahrani, Theyazn H. H. Aldhyani
Sustainability (2023) Vol. 15, Iss. 10, pp. 8076-8076
Open Access | Times Cited: 15
Ali Alzahrani, Theyazn H. H. Aldhyani
Sustainability (2023) Vol. 15, Iss. 10, pp. 8076-8076
Open Access | Times Cited: 15
Feature selection of pre-trained shallow CNN using the QLESCA optimizer: COVID-19 detection as a case study
Qusay Shihab Hamad, Hussein Samma, Shahrel Azmin Suandi
Applied Intelligence (2023) Vol. 53, Iss. 15, pp. 18630-18652
Open Access | Times Cited: 14
Qusay Shihab Hamad, Hussein Samma, Shahrel Azmin Suandi
Applied Intelligence (2023) Vol. 53, Iss. 15, pp. 18630-18652
Open Access | Times Cited: 14
A distributed SDN-based intrusion detection system for IoT using optimized forests
Ke Luo
PLoS ONE (2023) Vol. 18, Iss. 8, pp. e0290694-e0290694
Open Access | Times Cited: 14
Ke Luo
PLoS ONE (2023) Vol. 18, Iss. 8, pp. e0290694-e0290694
Open Access | Times Cited: 14
Sequence-wise multimodal biometric fingerprint and finger-vein recognition network (STMFPFV-Net)
Sunusi Bala Abdullahi, Zakariyya Abdullahi Bature, Ponlawat Chophuk, et al.
Intelligent Systems with Applications (2023) Vol. 19, pp. 200256-200256
Open Access | Times Cited: 13
Sunusi Bala Abdullahi, Zakariyya Abdullahi Bature, Ponlawat Chophuk, et al.
Intelligent Systems with Applications (2023) Vol. 19, pp. 200256-200256
Open Access | Times Cited: 13
WSN-BFSF: A New Data Set for Attacks Detection in Wireless Sensor Networks
Murat Dener, Celil Okur, Samed Al, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 2, pp. 2109-2125
Closed Access | Times Cited: 12
Murat Dener, Celil Okur, Samed Al, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 2, pp. 2109-2125
Closed Access | Times Cited: 12
A Systematic Review on Game-Theoretic Models and Different Types of Security Requirements in Cloud Environment: Challenges and Opportunities
Komal Singh Gill, Anju Sharma, Sharad Saxena
Archives of Computational Methods in Engineering (2024)
Closed Access | Times Cited: 4
Komal Singh Gill, Anju Sharma, Sharad Saxena
Archives of Computational Methods in Engineering (2024)
Closed Access | Times Cited: 4
Efficient Coordination of Renewable Energy Resources through Optimal Reversible Pumped Hydro-Storage Integration for Autonomous Microgrid Economic Operation
Talal Alharbi, Farag K. Abo‐Elyousr, Alaaeldin M. Abdelshafy
Energy (2024) Vol. 304, pp. 131910-131910
Closed Access | Times Cited: 4
Talal Alharbi, Farag K. Abo‐Elyousr, Alaaeldin M. Abdelshafy
Energy (2024) Vol. 304, pp. 131910-131910
Closed Access | Times Cited: 4
Systematic literature review on intrusion detection systems: Research trends, algorithms, methods, datasets, and limitations
M. Issa, Mohammad Aljanabi, Hassan Mohamed Muhi-Aldeen
Journal of Intelligent Systems (2024) Vol. 33, Iss. 1
Open Access | Times Cited: 4
M. Issa, Mohammad Aljanabi, Hassan Mohamed Muhi-Aldeen
Journal of Intelligent Systems (2024) Vol. 33, Iss. 1
Open Access | Times Cited: 4
FCNN-SE: An Intrusion Detection Model Based on a Fusion CNN and Stacked Ensemble
Chen Chen, Yafei Song, Shaohua Yue, et al.
Applied Sciences (2022) Vol. 12, Iss. 17, pp. 8601-8601
Open Access | Times Cited: 21
Chen Chen, Yafei Song, Shaohua Yue, et al.
Applied Sciences (2022) Vol. 12, Iss. 17, pp. 8601-8601
Open Access | Times Cited: 21
A selective feature optimized multi-sensor based e-nose system detecting illegal drugs validated in diverse laboratory conditions
Hyung Wook Noh, Yongwon Jang, Hwin Dol Park, et al.
Sensors and Actuators B Chemical (2023) Vol. 390, pp. 133965-133965
Open Access | Times Cited: 10
Hyung Wook Noh, Yongwon Jang, Hwin Dol Park, et al.
Sensors and Actuators B Chemical (2023) Vol. 390, pp. 133965-133965
Open Access | Times Cited: 10
Logistic Regression Ensemble Classifier for Intrusion Detection System in Internet of Things
Silpa Chalichalamala, Niranjana Govindan, Ramani Kasarapu
Sensors (2023) Vol. 23, Iss. 23, pp. 9583-9583
Open Access | Times Cited: 10
Silpa Chalichalamala, Niranjana Govindan, Ramani Kasarapu
Sensors (2023) Vol. 23, Iss. 23, pp. 9583-9583
Open Access | Times Cited: 10
International Journal on Cybernetics & Informatics
Vishal Karanam
International Journal on Cybernetics & Informatics (2024)
Open Access | Times Cited: 3
Vishal Karanam
International Journal on Cybernetics & Informatics (2024)
Open Access | Times Cited: 3
Generating IoT Specific Anomaly Datasets Using Cooja Simulator (Contiki-OS) and Performance Evaluation of Deep Learning Model Coupled with Aquila Optimizer
Vandana Choudhary, Sarvesh Tanwar, Tanupriya Choudhury
Journal of Computer Science (2024) Vol. 20, Iss. 4, pp. 365-378
Open Access | Times Cited: 3
Vandana Choudhary, Sarvesh Tanwar, Tanupriya Choudhury
Journal of Computer Science (2024) Vol. 20, Iss. 4, pp. 365-378
Open Access | Times Cited: 3