OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Augmented whale feature selection for IoT attacks: Structure, analysis and applications
Majdi Mafarja, Ali Asghar Heidari, Maria Habib, et al.
Future Generation Computer Systems (2020) Vol. 112, pp. 18-40
Closed Access | Times Cited: 78

Showing 51-75 of 78 citing articles:

Multi-Strategy Enhanced Parrot Optimizer: Global Optimization and Feature Selection
Chen Tian, Yuanyuan Yi
Biomimetics (2024) Vol. 9, Iss. 11, pp. 662-662
Open Access | Times Cited: 1

Elite dominance scheme ingrained adaptive salp swarm algorithm: a comprehensive study
Songwei Zhao, Pengjun Wang, Xuehua Zhao, et al.
Engineering With Computers (2021) Vol. 38, Iss. S5, pp. 4501-4528
Closed Access | Times Cited: 10

An Enhanced Evolutionary Based Feature Selection Approach Using Grey Wolf Optimizer for the Classification of High-dimensional Biological Data
Thaer Thaher, Mohammed Awad, Mohammed Aldasht, et al.
JUCS - Journal of Universal Computer Science (2022) Vol. 28, Iss. 5, pp. 499-539
Open Access | Times Cited: 7

Intrusion detection for IoT based on a hybrid shuffled shepherd optimization algorithm
Mohammed Alweshah, Saleh Alkhalaileh, Majdi Beseiso, et al.
The Journal of Supercomputing (2022) Vol. 78, Iss. 10, pp. 12278-12309
Closed Access | Times Cited: 6

A fuzzy transfer function based on the behavior of meta-heuristic algorithm and its application for high-dimensional feature selection problems
Zahra Beheshti
Knowledge-Based Systems (2023) Vol. 284, pp. 111191-111191
Closed Access | Times Cited: 3

Analyzing IoT Attack Feature Association with Threat Actors
Muhammad Shafiq, Zhaoquan Gu, Shah Nazir, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-11
Open Access | Times Cited: 4

Feature Selection Methods for IoT Intrusion Detection System: Comparative Study
Richa Singh, R. L. Ujjwal
Lecture notes in electrical engineering (2023), pp. 227-236
Closed Access | Times Cited: 2

ART: Active recognition trust mechanism for Augmented Intelligence of Things (AIoT) in smart enterprise systems
Geetanjali Rathee, Akshay Kumar, Sahil Garg, et al.
Alexandria Engineering Journal (2023) Vol. 80, pp. 417-424
Open Access | Times Cited: 2

DIAMOND: A Structured Coevolution Feature Optimization Method for LDDoS Detection in SDN-IoT
Wencheng Yin, Yunhe Cui, Qing Qian, et al.
Wireless Communications and Mobile Computing (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 5

A hybrid swarm intelligence feature selection approach based on time-varying transition parameter
Jomana Yousef Khaseeb, Arabi Keshk, Anas Youssef
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2022) Vol. 13, Iss. 1, pp. 781-781
Open Access | Times Cited: 3

A Novel Approach for IoT Intrusion Detection System using Modified Optimizer and Convolutional Neural Network
S. Vijayalakshmi, T.D. Subha, L Manimegalai, et al.
2022 Sixth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) (2022), pp. 180-186
Closed Access | Times Cited: 3

MICORD-IDS: A Hybrid Learning System for Intrusion Detection System for the Internet of Vehicles
Sunil Kaushik, Akashdeep Bhardwaj, Syed M Rahman
(2024) Vol. 19, pp. 485-492
Closed Access

Data Mining Problems Optimization by using Metaheuristic Algorithms: A Survey
Samia Mandour, Abduallah Gamal, Ahmed Sleem, et al.
Deleted Journal (2024) Vol. 4, pp. 28-52
Open Access

Naïve Bayes Classifier with Genetic Algorithm for Phishing Website Detection
Hamouda Chantar, S.M. Ali, Yousef Salem
Communications in computer and information science (2024), pp. 96-108
Closed Access

An Evolutionary Embedded Model Fake News Detector Using an Optimized Support Vectors Machines
Ala’ M. Al-Zoubi, Mohammad A. Hassonah, Laila Al-Qaisi, et al.
Authorea (Authorea) (2024)
Open Access

Cross-Silo Federated Learning for IDS in IoT Networks
Soumya Bajpai, Kapil Sharma, Brijesh Kumar Chaurasia
EAI/Springer Innovations in Communication and Computing (2024), pp. 59-73
Closed Access

IoT Cybersecurity Threats and Detection Mechanisms: A Review
Qassim Abd-Alhussain hadi Al-zubaidy, Ali Saeed Dayem Alfoudi, Ahmed Mohsin Mahdi
Wasit Journal of Pure sciences (2023) Vol. 2, Iss. 2, pp. 231-250
Open Access | Times Cited: 1

Intrusion detection system using metaheuristic fireworks optimization based feature selection with deep learning on Internet of Things environment
T. Jayasankar, R Buri, P. Maheswaravenkatesh
Journal of Forecasting (2023) Vol. 43, Iss. 2, pp. 415-428
Closed Access | Times Cited: 1

Designing an MI-PCA based Agile Intrusion Detection System
Sunil Kaushik, Akashdeep Bhadrdwaj, Ateeq Ur Rehman, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 1-7
Closed Access | Times Cited: 1

Enhanced IoT Based IDS Driven by Binary Snake Optimizer for Feature Selection
Ayman A. El‐Saleh, Thaer Thaher, Hamouda Chantar, et al.
Communications in computer and information science (2022), pp. 29-43
Closed Access | Times Cited: 1

A Synoptic Review on Feature Selection and Machine Learning models used for Detecting Cyber Attacks in IoT
Balaganesh Bojarajulu, Sarvesh Tanwar, Ajay Rana
2021 IEEE 8th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON) (2021) Vol. 11, pp. 1-7
Closed Access | Times Cited: 1

A Synoptic Review on Feature Selection and Machine Learning models used for Detecting Cyber Attacks in IoT
Balaganesh Bojarajulu, Sarvesh Tanwar, Ajay Rana
2020 5th International Conference on Computing, Communication and Security (ICCCS) (2021) Vol. 2019, pp. 1-7
Closed Access | Times Cited: 1

Feature selection using bio-inspired optimization for IoT intrusion detection and prevention system
Richa Singh, R. L. Ujjwal
International Journal on Information Technologies and Security (2023) Vol. 15, Iss. 3, pp. 87-96
Open Access

Scroll to top