
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An Effective Feature Selection Model Using Hybrid Metaheuristic Algorithms for IoT Intrusion Detection
Saif S. Kareem, Reham R. Mostafa, Fatma A. Hashim, et al.
Sensors (2022) Vol. 22, Iss. 4, pp. 1396-1396
Open Access | Times Cited: 124
Saif S. Kareem, Reham R. Mostafa, Fatma A. Hashim, et al.
Sensors (2022) Vol. 22, Iss. 4, pp. 1396-1396
Open Access | Times Cited: 124
Showing 26-50 of 124 citing articles:
A crossover-integrated Marine Predator Algorithm for feature selection in intrusion detection systems within IoT environments
Sharif Naser Makhadmeh, F.M.A. Salam, Mohammed Awad, et al.
Internet of Things (2025), pp. 101536-101536
Closed Access
Sharif Naser Makhadmeh, F.M.A. Salam, Mohammed Awad, et al.
Internet of Things (2025), pp. 101536-101536
Closed Access
Detecting attacks on the internet of things network in the computing fog layer with an embedded learning approach based on clustering and blockchain
Abdolmanan Babaei Goushlavandani, Peyman Bayat, Gholamhossein Ekbatanifard
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access
Abdolmanan Babaei Goushlavandani, Peyman Bayat, Gholamhossein Ekbatanifard
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access
An enhanced method for intrusion detection systems in IoT environment
Qusay M. Alzubi, Yousef Sanjalawe, Sharif Naser Makhadmeh, et al.
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access
Qusay M. Alzubi, Yousef Sanjalawe, Sharif Naser Makhadmeh, et al.
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access
NSGTO‐LSTM: Niche‐strategy‐based gorilla troops optimization and long short‐term memory network intrusion detection model
Saritha Anchuri, Arvind Ganesh, Prathusha Perugu
ETRI Journal (2025)
Open Access
Saritha Anchuri, Arvind Ganesh, Prathusha Perugu
ETRI Journal (2025)
Open Access
A Novel Hybrid Method Using Grey Wolf Algorithm and Genetic Algorithm for IoT Botnet DDoS Attacks Detection
Mahdieh Maazalahi, Soodeh Hosseini
International Journal of Computational Intelligence Systems (2025) Vol. 18, Iss. 1
Open Access
Mahdieh Maazalahi, Soodeh Hosseini
International Journal of Computational Intelligence Systems (2025) Vol. 18, Iss. 1
Open Access
Enhanced COOT optimization algorithm for Dimensionality Reduction
Reham R. Mostafa, Abdelazim G. Hussien, Muhammad Attique Khan, et al.
(2022)
Closed Access | Times Cited: 26
Reham R. Mostafa, Abdelazim G. Hussien, Muhammad Attique Khan, et al.
(2022)
Closed Access | Times Cited: 26
An intellectual intrusion detection system using Hybrid Hunger Games Search and Remora Optimization Algorithm for IoT wireless networks
Ravinder Kumar, Amita Malik, Virender Ranga
Knowledge-Based Systems (2022) Vol. 256, pp. 109762-109762
Closed Access | Times Cited: 25
Ravinder Kumar, Amita Malik, Virender Ranga
Knowledge-Based Systems (2022) Vol. 256, pp. 109762-109762
Closed Access | Times Cited: 25
Feature Selection by Hybrid Artificial Bee Colony Algorithm for Intrusion Detection
Miloš S. Stanković, Miloš Antonijević, Nebojša Bačanin, et al.
2022 International Conference on Edge Computing and Applications (ICECAA) (2022)
Closed Access | Times Cited: 23
Miloš S. Stanković, Miloš Antonijević, Nebojša Bačanin, et al.
2022 International Conference on Edge Computing and Applications (ICECAA) (2022)
Closed Access | Times Cited: 23
Feature Selection by Improved Sand Cat Swarm Optimizer for Intrusion Detection
Dijana Jovanovic, Marina Marjanović, Miloš Antonijević, et al.
2022 International Conference on Artificial Intelligence in Everything (AIE) (2022)
Closed Access | Times Cited: 22
Dijana Jovanovic, Marina Marjanović, Miloš Antonijević, et al.
2022 International Conference on Artificial Intelligence in Everything (AIE) (2022)
Closed Access | Times Cited: 22
Golden jackal optimization algorithm with deep learning assisted intrusion detection system for network security
Nojood O. Aljehane, Hanan Abdullah Mengash, Majdy M. Eltahir, et al.
Alexandria Engineering Journal (2023) Vol. 86, pp. 415-424
Open Access | Times Cited: 14
Nojood O. Aljehane, Hanan Abdullah Mengash, Majdy M. Eltahir, et al.
Alexandria Engineering Journal (2023) Vol. 86, pp. 415-424
Open Access | Times Cited: 14
A big data analytics for DDOS attack detection using optimized ensemble framework in Internet of Things
Ijaz Ahmad, Zhong Wan, Ashfaq Ahmad
Internet of Things (2023) Vol. 23, pp. 100825-100825
Closed Access | Times Cited: 13
Ijaz Ahmad, Zhong Wan, Ashfaq Ahmad
Internet of Things (2023) Vol. 23, pp. 100825-100825
Closed Access | Times Cited: 13
Chaotic Binary Pelican Optimization Algorithm for Feature Selection
Rama Krishna Eluri, Nagaraju Devarakonda
International Journal of Uncertainty Fuzziness and Knowledge-Based Systems (2023) Vol. 31, Iss. 03, pp. 497-530
Closed Access | Times Cited: 13
Rama Krishna Eluri, Nagaraju Devarakonda
International Journal of Uncertainty Fuzziness and Knowledge-Based Systems (2023) Vol. 31, Iss. 03, pp. 497-530
Closed Access | Times Cited: 13
Supervised contrastive representation learning with tree-structured parzen estimator Bayesian optimization for imbalanced tabular data
Shuting Tao, Peng Peng, Yunfei Li, et al.
Expert Systems with Applications (2023) Vol. 237, pp. 121294-121294
Closed Access | Times Cited: 13
Shuting Tao, Peng Peng, Yunfei Li, et al.
Expert Systems with Applications (2023) Vol. 237, pp. 121294-121294
Closed Access | Times Cited: 13
IoT Intrusion Detection System Based on Machine Learning
Bayi Xu, Lei Sun, Xiuqing Mao, et al.
Electronics (2023) Vol. 12, Iss. 20, pp. 4289-4289
Open Access | Times Cited: 12
Bayi Xu, Lei Sun, Xiuqing Mao, et al.
Electronics (2023) Vol. 12, Iss. 20, pp. 4289-4289
Open Access | Times Cited: 12
A Hybrid Meta-heuristics Algorithm: XGBoost-Based Approach for IDS in IoT
Soumya Bajpai, Kapil Dev Sharma, Brijesh Kumar Chaurasia
SN Computer Science (2024) Vol. 5, Iss. 5
Closed Access | Times Cited: 4
Soumya Bajpai, Kapil Dev Sharma, Brijesh Kumar Chaurasia
SN Computer Science (2024) Vol. 5, Iss. 5
Closed Access | Times Cited: 4
A hybrid approach for efficient feature selection in anomaly intrusion detection for IoT networks
Aya G. Ayad, Nehal A. Sakr, Noha A. Hikal
The Journal of Supercomputing (2024) Vol. 80, Iss. 19, pp. 26942-26984
Open Access | Times Cited: 4
Aya G. Ayad, Nehal A. Sakr, Noha A. Hikal
The Journal of Supercomputing (2024) Vol. 80, Iss. 19, pp. 26942-26984
Open Access | Times Cited: 4
A Hybrid Spider Monkey and Hierarchical Particle Swarm Optimization Approach for Intrusion Detection on Internet of Things
E. Sandhya, K. Annapurani
Sensors (2022) Vol. 22, Iss. 21, pp. 8566-8566
Open Access | Times Cited: 19
E. Sandhya, K. Annapurani
Sensors (2022) Vol. 22, Iss. 21, pp. 8566-8566
Open Access | Times Cited: 19
Hybrid VGG19 and 2D-CNN for intrusion detection in the FOG-cloud environment
Adel Binbusayyis
Expert Systems with Applications (2023) Vol. 238, pp. 121758-121758
Closed Access | Times Cited: 11
Adel Binbusayyis
Expert Systems with Applications (2023) Vol. 238, pp. 121758-121758
Closed Access | Times Cited: 11
MFTransNet: A Multi-Modal Fusion with CNN-Transformer Network for Semantic Segmentation of HSR Remote Sensing Images
Shumeng He, Houqun Yang, Xiaoying Zhang, et al.
Mathematics (2023) Vol. 11, Iss. 3, pp. 722-722
Open Access | Times Cited: 10
Shumeng He, Houqun Yang, Xiaoying Zhang, et al.
Mathematics (2023) Vol. 11, Iss. 3, pp. 722-722
Open Access | Times Cited: 10
Assessing Classical and Evolutionary Preprocessing Approaches for Breast Cancer Diagnosis
Amir Hussein Ataei Monfared, Keivan Borna
(2024)
Closed Access | Times Cited: 3
Amir Hussein Ataei Monfared, Keivan Borna
(2024)
Closed Access | Times Cited: 3
BBO-CFAT: Network Intrusion Detection Model Based on BBO Algorithm and Hierarchical Transformer
Tingyao Jiang, Xiaobo Fu, Min Wang
IEEE Access (2024) Vol. 12, pp. 54191-54201
Open Access | Times Cited: 3
Tingyao Jiang, Xiaobo Fu, Min Wang
IEEE Access (2024) Vol. 12, pp. 54191-54201
Open Access | Times Cited: 3
A deep analysis of nature-inspired and meta-heuristic algorithms for designing intrusion detection systems in cloud/edge and IoT: state-of-the-art techniques, challenges, and future directions
Wengui Hu, Cao Qingsong, Mehdi Darbandi, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 8789-8815
Closed Access | Times Cited: 3
Wengui Hu, Cao Qingsong, Mehdi Darbandi, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 8789-8815
Closed Access | Times Cited: 3
AEOWOA: hybridizing whale optimization algorithm with artificial ecosystem-based optimization for optimal feature selection and global optimization
Reham R. Mostafa, Abdelazim G. Hussien, Marwa A. Gaheen, et al.
Evolving Systems (2024) Vol. 15, Iss. 5, pp. 1753-1785
Closed Access | Times Cited: 3
Reham R. Mostafa, Abdelazim G. Hussien, Marwa A. Gaheen, et al.
Evolving Systems (2024) Vol. 15, Iss. 5, pp. 1753-1785
Closed Access | Times Cited: 3
Enhanced artificial hummingbird algorithm for global optimization and engineering design problems
Hüseyin Bakır
Advances in Engineering Software (2024) Vol. 194, pp. 103671-103671
Closed Access | Times Cited: 3
Hüseyin Bakır
Advances in Engineering Software (2024) Vol. 194, pp. 103671-103671
Closed Access | Times Cited: 3
IGWO-SoE: Improved Grey Wolf Optimization Based Stack of Ensemble Learning Algorithm for Anomaly Detection in Internet of Things Edge Computing
J. Manokaran, G. Vairavel
IEEE Access (2023) Vol. 11, pp. 106934-106953
Open Access | Times Cited: 8
J. Manokaran, G. Vairavel
IEEE Access (2023) Vol. 11, pp. 106934-106953
Open Access | Times Cited: 8