
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Botnet Detection in IoT Using a Hybrid Multi-objective Optimization Algorithm
Fatemeh Hosseini, Farhad Soleimanian Gharehchopogh, Mohammad Masdari
New Generation Computing (2022) Vol. 40, Iss. 3, pp. 809-843
Closed Access | Times Cited: 11
Fatemeh Hosseini, Farhad Soleimanian Gharehchopogh, Mohammad Masdari
New Generation Computing (2022) Vol. 40, Iss. 3, pp. 809-843
Closed Access | Times Cited: 11
Showing 11 citing articles:
A multi-objective mutation-based dynamic Harris Hawks optimization for botnet detection in IoT
Farhad Soleimanian Gharehchopogh, Benyamın Abdollahzadeh, Saeid Barshandeh, et al.
Internet of Things (2023) Vol. 24, pp. 100952-100952
Closed Access | Times Cited: 83
Farhad Soleimanian Gharehchopogh, Benyamın Abdollahzadeh, Saeid Barshandeh, et al.
Internet of Things (2023) Vol. 24, pp. 100952-100952
Closed Access | Times Cited: 83
Optimization and inventory management under stochastic demand using metaheuristic algorithm
Nguyêñ Duy Tân, Hwan–Seong Kim, Le Ngoc Bao Long, et al.
PLoS ONE (2024) Vol. 19, Iss. 1, pp. e0286433-e0286433
Open Access | Times Cited: 7
Nguyêñ Duy Tân, Hwan–Seong Kim, Le Ngoc Bao Long, et al.
PLoS ONE (2024) Vol. 19, Iss. 1, pp. e0286433-e0286433
Open Access | Times Cited: 7
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
Siva Surya Narayana Chintapalli, Satya Prakash Singh, Jaroslav Frnda, et al.
Heliyon (2024) Vol. 10, Iss. 8, pp. e29410-e29410
Open Access | Times Cited: 5
Siva Surya Narayana Chintapalli, Satya Prakash Singh, Jaroslav Frnda, et al.
Heliyon (2024) Vol. 10, Iss. 8, pp. e29410-e29410
Open Access | Times Cited: 5
IoT botnet detection from software defined network using American zebra optimization algorithm with SSRNN-ELM
N.V. Madhu Bindu, Vinay Kumar Nassa, P. Vasuki, et al.
International Journal of Information Technology (2025)
Closed Access
N.V. Madhu Bindu, Vinay Kumar Nassa, P. Vasuki, et al.
International Journal of Information Technology (2025)
Closed Access
An Improved African Vulture Optimization Algorithm for Feature Selection Problems and Its Application of Sentiment Analysis on Movie Reviews
Aitak Shaddeli, Farhad Soleimanian Gharehchopogh, Mohammad Masdari, et al.
Big Data and Cognitive Computing (2022) Vol. 6, Iss. 4, pp. 104-104
Open Access | Times Cited: 19
Aitak Shaddeli, Farhad Soleimanian Gharehchopogh, Mohammad Masdari, et al.
Big Data and Cognitive Computing (2022) Vol. 6, Iss. 4, pp. 104-104
Open Access | Times Cited: 19
Feature selection for IoT botnet detection using equilibrium and Battle Royale Optimization
Qanita Bani Baker, Alaa Samarneh
Computers & Security (2024) Vol. 147, pp. 104060-104060
Closed Access | Times Cited: 2
Qanita Bani Baker, Alaa Samarneh
Computers & Security (2024) Vol. 147, pp. 104060-104060
Closed Access | Times Cited: 2
Enhancing IoT security: A comparative study of feature reduction techniques for intrusion detection system
Jing Li, Hewan Chen, Mohd Othman Shahizan, et al.
Intelligent Systems with Applications (2024) Vol. 23, pp. 200407-200407
Open Access | Times Cited: 1
Jing Li, Hewan Chen, Mohd Othman Shahizan, et al.
Intelligent Systems with Applications (2024) Vol. 23, pp. 200407-200407
Open Access | Times Cited: 1
Hybridized bio-inspired intrusion detection system for Internet of Things
Richa Singh, R. L. Ujjwal
Frontiers in Big Data (2023) Vol. 6
Open Access | Times Cited: 4
Richa Singh, R. L. Ujjwal
Frontiers in Big Data (2023) Vol. 6
Open Access | Times Cited: 4
A New Multi-Objective Optimization Design Method for Directional Well Trajectory Based on Multi-Factor Constraints
Jianyu Qin, Luo Liu, Liang Xue, et al.
Applied Sciences (2022) Vol. 12, Iss. 21, pp. 10722-10722
Open Access | Times Cited: 5
Jianyu Qin, Luo Liu, Liang Xue, et al.
Applied Sciences (2022) Vol. 12, Iss. 21, pp. 10722-10722
Open Access | Times Cited: 5
IoT-Botnet Detection Using Deep Learning Techniques
Soundes Belkacem
Lecture notes in networks and systems (2024), pp. 239-249
Closed Access
Soundes Belkacem
Lecture notes in networks and systems (2024), pp. 239-249
Closed Access
Multi‐objective prairie dog optimization algorithm for IoT ‐based intrusion detection
Shubhkirti Sharma, Vijay Kumar, Kamlesh Dutta
Internet Technology Letters (2024)
Closed Access
Shubhkirti Sharma, Vijay Kumar, Kamlesh Dutta
Internet Technology Letters (2024)
Closed Access