OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Evolutionary Fuzzy Systems: A Case Study for Intrusion Detection Systems
Salma Elhag, Alberto Fernández, Saleh Alshomrani, et al.
Studies in computational intelligence (2018), pp. 169-190
Closed Access | Times Cited: 19

Showing 19 citing articles:

A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions
Ankit Thakkar, Ritika Lohiya
Artificial Intelligence Review (2021) Vol. 55, Iss. 1, pp. 453-563
Closed Access | Times Cited: 174

A survey and taxonomy of the fuzzy signature-based Intrusion Detection Systems
Mohammad Masdari, Hemn Khezri
Applied Soft Computing (2020) Vol. 92, pp. 106301-106301
Closed Access | Times Cited: 142

An Innovative Perceptual Pigeon Galvanized Optimization (PPGO) Based Likelihood Naïve Bayes (LNB) Classification Approach for Network Intrusion Detection System
Shitharth Selvarajan, Pravin R. Kshirsagar, Praveen Kumar Balachandran, et al.
IEEE Access (2022) Vol. 10, pp. 46424-46441
Open Access | Times Cited: 38

MLEsIDSs: machine learning-based ensembles for intrusion detection systems—a review
Gulshan Kumar, Kutub Thakur, Maruthi Rohit Ayyagari
The Journal of Supercomputing (2020) Vol. 76, Iss. 11, pp. 8938-8971
Closed Access | Times Cited: 56

An evolutionary fuzzy rule-based system applied to the prediction of soil organic carbon from soil spectral libraries
Nikolaos Tsakiridis, John B. Theocharis, Panos Panagos, et al.
Applied Soft Computing (2019) Vol. 81, pp. 105504-105504
Closed Access | Times Cited: 41

An improved ensemble approach for effective intrusion detection
Gulshan Kumar
The Journal of Supercomputing (2019) Vol. 76, Iss. 1, pp. 275-291
Closed Access | Times Cited: 38

Network Intrusion Detection Based on Dynamic Intuitionistic Fuzzy Sets
Jialiang Xie, Honghui Wang, Jonathan M. Garibaldi, et al.
IEEE Transactions on Fuzzy Systems (2021) Vol. 30, Iss. 9, pp. 3460-3472
Closed Access | Times Cited: 14

Optimized Intrusion Detection System Using Computational Intelligent Algorithm
P. J. Sajith, G. Nagarajan
Lecture notes in electrical engineering (2021), pp. 633-639
Closed Access | Times Cited: 13

Evolutionary Design of Linguistic Fuzzy Regression Systems with Adaptive Defuzzification in Big Data Environments
Samuel González López, Antonio A. Márquez, Francisco A. Márquez, et al.
Cognitive Computation (2019) Vol. 11, Iss. 3, pp. 388-399
Closed Access | Times Cited: 12

A Structural Evolving Approach for Fuzzy Systems
Hisham Haider Yusef Sa'ad, Nor Ashidi Mat Isa, Md. Manjur Ahmed
IEEE Transactions on Fuzzy Systems (2019) Vol. 28, Iss. 2, pp. 273-287
Closed Access | Times Cited: 10

Artificial intelligence based ensemble approach for intrusion detection systems
Hongwei Zhao, Mingzhao Li, Haoyu Zhao
Journal of Visual Communication and Image Representation (2019) Vol. 71, pp. 102736-102736
Closed Access | Times Cited: 10

Automating the design and development of gradient descent trained expert system networks
Jeremy Straub
Knowledge-Based Systems (2022) Vol. 254, pp. 109465-109465
Open Access | Times Cited: 6

An SDN controller-based framework for anomaly detection using a GAN ensemble algorithm
Dubem Ezeh, Jaudelice de Oliveira
Híradástechnika/Infocommunications journal (2023) Vol. 15, Iss. 2, pp. 29-36
Open Access | Times Cited: 2

An Effective Integrated Intrusion Detection Model Based on Deep Neural Network
Wei Wan, Zhonglian Peng, Jinxia Wei, et al.
2020 International Conference on Computer Engineering and Application (ICCEA) (2021), pp. 146-152
Closed Access | Times Cited: 3

A Partial Approach to Intrusion Detection
John Sheppard
Springer eBooks (2021), pp. 78-97
Closed Access | Times Cited: 1

Evolutionary Design of Fuzzy Systems Based on Multi-objective Optimization and Dempster-Shafer Schemes
Alexander Dolgiy, Sergey Kovalev, Anna E. Kolodenkova, et al.
Communications in computer and information science (2019), pp. 203-217
Closed Access

Evolutionary Fuzzy Rules for Intrusion Detection in Wireless Sensor Networks
Tarek Batiha, Pavel Krömer
Advances in intelligent systems and computing (2020), pp. 149-160
Closed Access

Evolution strategies based coefficient of TSK fuzzy forecasting engine
Nadia Roosmalita Sari, Wayan Firdaus Mahmudy, Aji Prasetya Wibawa
International Journal of Advances in Intelligent Informatics (2021) Vol. 7, Iss. 1, pp. 89-89
Open Access

A Machine Learning Approach to Implementation of Link Aggregation Control Protocol over Software Defined Networking
Nazrul Islam, Md. Fazla Rabbi, SM Shamim, et al.
International Journal of Computer Applications (2021) Vol. 183, Iss. 35, pp. 38-46
Open Access

Page 1

Scroll to top