OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

An Effective Feature Selection Model Using Hybrid Metaheuristic Algorithms for IoT Intrusion Detection
Saif S. Kareem, Reham R. Mostafa, Fatma A. Hashim, et al.
Sensors (2022) Vol. 22, Iss. 4, pp. 1396-1396
Open Access | Times Cited: 124

Showing 26-50 of 124 citing articles:

A crossover-integrated Marine Predator Algorithm for feature selection in intrusion detection systems within IoT environments
Sharif Naser Makhadmeh, F.M.A. Salam, Mohammed Awad, et al.
Internet of Things (2025), pp. 101536-101536
Closed Access

Detecting attacks on the internet of things network in the computing fog layer with an embedded learning approach based on clustering and blockchain
Abdolmanan Babaei Goushlavandani, Peyman Bayat, Gholamhossein Ekbatanifard
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access

An enhanced method for intrusion detection systems in IoT environment
Qusay M. Alzubi, Yousef Sanjalawe, Sharif Naser Makhadmeh, et al.
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access

A Novel Hybrid Method Using Grey Wolf Algorithm and Genetic Algorithm for IoT Botnet DDoS Attacks Detection
Mahdieh Maazalahi, Soodeh Hosseini
International Journal of Computational Intelligence Systems (2025) Vol. 18, Iss. 1
Open Access

Enhanced COOT optimization algorithm for Dimensionality Reduction
Reham R. Mostafa, Abdelazim G. Hussien, Muhammad Attique Khan, et al.
(2022)
Closed Access | Times Cited: 26

An intellectual intrusion detection system using Hybrid Hunger Games Search and Remora Optimization Algorithm for IoT wireless networks
Ravinder Kumar, Amita Malik, Virender Ranga
Knowledge-Based Systems (2022) Vol. 256, pp. 109762-109762
Closed Access | Times Cited: 25

Feature Selection by Hybrid Artificial Bee Colony Algorithm for Intrusion Detection
Miloš S. Stanković, Miloš Antonijević, Nebojša Bačanin, et al.
2022 International Conference on Edge Computing and Applications (ICECAA) (2022)
Closed Access | Times Cited: 23

Feature Selection by Improved Sand Cat Swarm Optimizer for Intrusion Detection
Dijana Jovanovic, Marina Marjanović, Miloš Antonijević, et al.
2022 International Conference on Artificial Intelligence in Everything (AIE) (2022)
Closed Access | Times Cited: 22

Golden jackal optimization algorithm with deep learning assisted intrusion detection system for network security
Nojood O. Aljehane, Hanan Abdullah Mengash, Majdy M. Eltahir, et al.
Alexandria Engineering Journal (2023) Vol. 86, pp. 415-424
Open Access | Times Cited: 14

A big data analytics for DDOS attack detection using optimized ensemble framework in Internet of Things
Ijaz Ahmad, Zhong Wan, Ashfaq Ahmad
Internet of Things (2023) Vol. 23, pp. 100825-100825
Closed Access | Times Cited: 13

Chaotic Binary Pelican Optimization Algorithm for Feature Selection
Rama Krishna Eluri, Nagaraju Devarakonda
International Journal of Uncertainty Fuzziness and Knowledge-Based Systems (2023) Vol. 31, Iss. 03, pp. 497-530
Closed Access | Times Cited: 13

Supervised contrastive representation learning with tree-structured parzen estimator Bayesian optimization for imbalanced tabular data
Shuting Tao, Peng Peng, Yunfei Li, et al.
Expert Systems with Applications (2023) Vol. 237, pp. 121294-121294
Closed Access | Times Cited: 13

IoT Intrusion Detection System Based on Machine Learning
Bayi Xu, Lei Sun, Xiuqing Mao, et al.
Electronics (2023) Vol. 12, Iss. 20, pp. 4289-4289
Open Access | Times Cited: 12

A Hybrid Meta-heuristics Algorithm: XGBoost-Based Approach for IDS in IoT
Soumya Bajpai, Kapil Dev Sharma, Brijesh Kumar Chaurasia
SN Computer Science (2024) Vol. 5, Iss. 5
Closed Access | Times Cited: 4

A hybrid approach for efficient feature selection in anomaly intrusion detection for IoT networks
Aya G. Ayad, Nehal A. Sakr, Noha A. Hikal
The Journal of Supercomputing (2024) Vol. 80, Iss. 19, pp. 26942-26984
Open Access | Times Cited: 4

Hybrid VGG19 and 2D-CNN for intrusion detection in the FOG-cloud environment
Adel Binbusayyis
Expert Systems with Applications (2023) Vol. 238, pp. 121758-121758
Closed Access | Times Cited: 11

MFTransNet: A Multi-Modal Fusion with CNN-Transformer Network for Semantic Segmentation of HSR Remote Sensing Images
Shumeng He, Houqun Yang, Xiaoying Zhang, et al.
Mathematics (2023) Vol. 11, Iss. 3, pp. 722-722
Open Access | Times Cited: 10

Assessing Classical and Evolutionary Preprocessing Approaches for Breast Cancer Diagnosis
Amir Hussein Ataei Monfared, Keivan Borna
(2024)
Closed Access | Times Cited: 3

BBO-CFAT: Network Intrusion Detection Model Based on BBO Algorithm and Hierarchical Transformer
Tingyao Jiang, Xiaobo Fu, Min Wang
IEEE Access (2024) Vol. 12, pp. 54191-54201
Open Access | Times Cited: 3

A deep analysis of nature-inspired and meta-heuristic algorithms for designing intrusion detection systems in cloud/edge and IoT: state-of-the-art techniques, challenges, and future directions
Wengui Hu, Cao Qingsong, Mehdi Darbandi, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 8789-8815
Closed Access | Times Cited: 3

AEOWOA: hybridizing whale optimization algorithm with artificial ecosystem-based optimization for optimal feature selection and global optimization
Reham R. Mostafa, Abdelazim G. Hussien, Marwa A. Gaheen, et al.
Evolving Systems (2024) Vol. 15, Iss. 5, pp. 1753-1785
Closed Access | Times Cited: 3

Enhanced artificial hummingbird algorithm for global optimization and engineering design problems
Hüseyin Bakır
Advances in Engineering Software (2024) Vol. 194, pp. 103671-103671
Closed Access | Times Cited: 3

Scroll to top