OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Advanced Feature Extraction and Selection Approach Using Deep Learning and Aquila Optimizer for IoT Intrusion Detection System
Abdulaziz Fatani, Abdelghani Dahou, Mohammed A. A. Al‐qaness, et al.
Sensors (2021) Vol. 22, Iss. 1, pp. 140-140
Open Access | Times Cited: 133

Showing 26-50 of 133 citing articles:

Training fuzzy deep neural network with honey badger algorithm for intrusion detection in cloud environment
Deepak Kumar Jain, Weiping Ding, Ketan Kotecha
International Journal of Machine Learning and Cybernetics (2023) Vol. 14, Iss. 6, pp. 2221-2237
Closed Access | Times Cited: 18

The cybersecurity mesh: A comprehensive survey of involved artificial intelligence methods, cryptographic protocols and challenges for future research
Bruno Ramos-Cruz, Javier Andreu-Pérez, Luis Martı́nez
Neurocomputing (2024) Vol. 581, pp. 127427-127427
Open Access | Times Cited: 5

A hybrid approach for efficient feature selection in anomaly intrusion detection for IoT networks
Aya G. Ayad, Nehal A. Sakr, Noha A. Hikal
The Journal of Supercomputing (2024) Vol. 80, Iss. 19, pp. 26942-26984
Open Access | Times Cited: 5

A Smart Approach for Early Detection of DDoS Attacks: Artificial Neural Network and Random Forest Hybridization
Ishmam Ahmed Ongshu, Ahmed Wasif Reza, Md. Emad Uddin Aksir, et al.
Procedia Computer Science (2025) Vol. 252, pp. 490-499
Open Access

EBAO: An Intrusion Detection Framework for Wireless Sensor Networks Using an Enhanced Binary Aquila Optimizer
Noor Aldeen Alawad, Bilal H. Abed-alguni, Ala Mohammad Shakhatreh
Knowledge-Based Systems (2025), pp. 113156-113156
Closed Access

HC-NIDS: Historical contextual information based network intrusion detection system in Internet of Things
Zijie Chen, Hailin Zou, Tao Hu, et al.
Computers & Security (2025), pp. 104367-104367
Closed Access

Design of Aquila Optimization Heuristic for Identification of Control Autoregressive Systems
Khizer Mehmood, Naveed Ishtiaq Chaudhary, Zeshan Aslam Khan, et al.
Mathematics (2022) Vol. 10, Iss. 10, pp. 1749-1749
Open Access | Times Cited: 26

An intellectual intrusion detection system using Hybrid Hunger Games Search and Remora Optimization Algorithm for IoT wireless networks
Ravinder Kumar, Amita Malik, Virender Ranga
Knowledge-Based Systems (2022) Vol. 256, pp. 109762-109762
Closed Access | Times Cited: 25

A Cox Proportional-Hazards Model Based on an Improved Aquila Optimizer with Whale Optimization Algorithm Operators
Ahmed A. Ewees, Zakariya Yahya Algamal, Laith Abualigah, et al.
Mathematics (2022) Vol. 10, Iss. 8, pp. 1273-1273
Open Access | Times Cited: 22

Wind Power Forecasting Using Optimized Dendritic Neural Model Based on Seagull Optimization Algorithm and Aquila Optimizer
Mohammed A. A. Al‐qaness, Ahmed A. Ewees, Mohamed Abd Elaziz, et al.
Energies (2022) Vol. 15, Iss. 24, pp. 9261-9261
Open Access | Times Cited: 22

Design of Efficient Based Artificial Intelligence Approaches for Sustainable of Cyber Security in Smart Industrial Control System
Ali Alzahrani, Theyazn H. H. Aldhyani
Sustainability (2023) Vol. 15, Iss. 10, pp. 8076-8076
Open Access | Times Cited: 15

Feature selection of pre-trained shallow CNN using the QLESCA optimizer: COVID-19 detection as a case study
Qusay Shihab Hamad, Hussein Samma, Shahrel Azmin Suandi
Applied Intelligence (2023) Vol. 53, Iss. 15, pp. 18630-18652
Open Access | Times Cited: 14

A distributed SDN-based intrusion detection system for IoT using optimized forests
Ke Luo
PLoS ONE (2023) Vol. 18, Iss. 8, pp. e0290694-e0290694
Open Access | Times Cited: 14

Sequence-wise multimodal biometric fingerprint and finger-vein recognition network (STMFPFV-Net)
Sunusi Bala Abdullahi, Zakariyya Abdullahi Bature, Ponlawat Chophuk, et al.
Intelligent Systems with Applications (2023) Vol. 19, pp. 200256-200256
Open Access | Times Cited: 13

WSN-BFSF: A New Data Set for Attacks Detection in Wireless Sensor Networks
Murat Dener, Celil Okur, Samed Al, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 2, pp. 2109-2125
Closed Access | Times Cited: 12

A Systematic Review on Game-Theoretic Models and Different Types of Security Requirements in Cloud Environment: Challenges and Opportunities
Komal Singh Gill, Anju Sharma, Sharad Saxena
Archives of Computational Methods in Engineering (2024)
Closed Access | Times Cited: 4

Efficient Coordination of Renewable Energy Resources through Optimal Reversible Pumped Hydro-Storage Integration for Autonomous Microgrid Economic Operation
Talal Alharbi, Farag K. Abo‐Elyousr, Alaaeldin M. Abdelshafy
Energy (2024) Vol. 304, pp. 131910-131910
Closed Access | Times Cited: 4

Systematic literature review on intrusion detection systems: Research trends, algorithms, methods, datasets, and limitations
M. Issa, Mohammad Aljanabi, Hassan Mohamed Muhi-Aldeen
Journal of Intelligent Systems (2024) Vol. 33, Iss. 1
Open Access | Times Cited: 4

FCNN-SE: An Intrusion Detection Model Based on a Fusion CNN and Stacked Ensemble
Chen Chen, Yafei Song, Shaohua Yue, et al.
Applied Sciences (2022) Vol. 12, Iss. 17, pp. 8601-8601
Open Access | Times Cited: 21

A selective feature optimized multi-sensor based e-nose system detecting illegal drugs validated in diverse laboratory conditions
Hyung Wook Noh, Yongwon Jang, Hwin Dol Park, et al.
Sensors and Actuators B Chemical (2023) Vol. 390, pp. 133965-133965
Open Access | Times Cited: 10

Logistic Regression Ensemble Classifier for Intrusion Detection System in Internet of Things
Silpa Chalichalamala, Niranjana Govindan, Ramani Kasarapu
Sensors (2023) Vol. 23, Iss. 23, pp. 9583-9583
Open Access | Times Cited: 10

International Journal on Cybernetics & Informatics
Vishal Karanam
International Journal on Cybernetics & Informatics (2024)
Open Access | Times Cited: 3

Generating IoT Specific Anomaly Datasets Using Cooja Simulator (Contiki-OS) and Performance Evaluation of Deep Learning Model Coupled with Aquila Optimizer
Vandana Choudhary, Sarvesh Tanwar, Tanupriya Choudhury
Journal of Computer Science (2024) Vol. 20, Iss. 4, pp. 365-378
Open Access | Times Cited: 3

Scroll to top