
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A multi-objective evolutionary fuzzy system to obtain a broad and accurate set of solutions in intrusion detection systems
Salma Elhag, Alberto Fernández, Abdulrahman Altalhi, et al.
Soft Computing (2017) Vol. 23, Iss. 4, pp. 1321-1336
Closed Access | Times Cited: 54
Salma Elhag, Alberto Fernández, Abdulrahman Altalhi, et al.
Soft Computing (2017) Vol. 23, Iss. 4, pp. 1321-1336
Closed Access | Times Cited: 54
Showing 1-25 of 54 citing articles:
Building an efficient intrusion detection system based on feature selection and ensemble classifier
Yuyang Zhou, Guang Cheng, Shanqing Jiang, et al.
Computer Networks (2020) Vol. 174, pp. 107247-107247
Open Access | Times Cited: 508
Yuyang Zhou, Guang Cheng, Shanqing Jiang, et al.
Computer Networks (2020) Vol. 174, pp. 107247-107247
Open Access | Times Cited: 508
Evolutionary Fuzzy Systems for Explainable Artificial Intelligence: Why, When, What for, and Where to?
Alberto Fernández, Francisco Herrera, Óscar Cordón, et al.
IEEE Computational Intelligence Magazine (2019) Vol. 14, Iss. 1, pp. 69-81
Open Access | Times Cited: 202
Alberto Fernández, Francisco Herrera, Óscar Cordón, et al.
IEEE Computational Intelligence Magazine (2019) Vol. 14, Iss. 1, pp. 69-81
Open Access | Times Cited: 202
A survey and taxonomy of the fuzzy signature-based Intrusion Detection Systems
Mohammad Masdari, Hemn Khezri
Applied Soft Computing (2020) Vol. 92, pp. 106301-106301
Closed Access | Times Cited: 142
Mohammad Masdari, Hemn Khezri
Applied Soft Computing (2020) Vol. 92, pp. 106301-106301
Closed Access | Times Cited: 142
Multi-strategy multi-objective differential evolutionary algorithm with reinforcement learning
Yupeng Han, Hu Peng, Changrong Mei, et al.
Knowledge-Based Systems (2023) Vol. 277, pp. 110801-110801
Closed Access | Times Cited: 44
Yupeng Han, Hu Peng, Changrong Mei, et al.
Knowledge-Based Systems (2023) Vol. 277, pp. 110801-110801
Closed Access | Times Cited: 44
A Review of Rule Learning-Based Intrusion Detection Systems and Their Prospects in Smart Grids
Qi Liu, Veit Hagenmeyer, Hubert B. Keller
IEEE Access (2021) Vol. 9, pp. 57542-57564
Open Access | Times Cited: 60
Qi Liu, Veit Hagenmeyer, Hubert B. Keller
IEEE Access (2021) Vol. 9, pp. 57542-57564
Open Access | Times Cited: 60
Literature Review of the Recent Trends and Applications in Various Fuzzy Rule-Based Systems
Ayush K. Varshney, Vicenç Torra
International Journal of Fuzzy Systems (2023) Vol. 25, Iss. 6, pp. 2163-2186
Open Access | Times Cited: 30
Ayush K. Varshney, Vicenç Torra
International Journal of Fuzzy Systems (2023) Vol. 25, Iss. 6, pp. 2163-2186
Open Access | Times Cited: 30
MLEsIDSs: machine learning-based ensembles for intrusion detection systems—a review
Gulshan Kumar, Kutub Thakur, Maruthi Rohit Ayyagari
The Journal of Supercomputing (2020) Vol. 76, Iss. 11, pp. 8938-8971
Closed Access | Times Cited: 56
Gulshan Kumar, Kutub Thakur, Maruthi Rohit Ayyagari
The Journal of Supercomputing (2020) Vol. 76, Iss. 11, pp. 8938-8971
Closed Access | Times Cited: 56
An efficient centralized DDoS attack detection approach for Software Defined Internet of Things
Pinkey Chauhan, Mithilesh Atulkar
The Journal of Supercomputing (2023) Vol. 79, Iss. 9, pp. 10386-10422
Closed Access | Times Cited: 16
Pinkey Chauhan, Mithilesh Atulkar
The Journal of Supercomputing (2023) Vol. 79, Iss. 9, pp. 10386-10422
Closed Access | Times Cited: 16
GOAMLP: Network Intrusion Detection With Multilayer Perceptron and Grasshopper Optimization Algorithm
Shadi Moghanian, Farshid Bagheri Saravi, Giti Javidi, et al.
IEEE Access (2020) Vol. 8, pp. 215202-215213
Open Access | Times Cited: 41
Shadi Moghanian, Farshid Bagheri Saravi, Giti Javidi, et al.
IEEE Access (2020) Vol. 8, pp. 215202-215213
Open Access | Times Cited: 41
MGA-IDS: Optimal feature subset selection for anomaly detection framework on in-vehicle networks-CAN bus based on genetic algorithm and intrusion detection approach
Doğukan Aksu, Muhammed Ali Aydın
Computers & Security (2022) Vol. 118, pp. 102717-102717
Closed Access | Times Cited: 23
Doğukan Aksu, Muhammed Ali Aydın
Computers & Security (2022) Vol. 118, pp. 102717-102717
Closed Access | Times Cited: 23
A framework to detect DDoS attack in Ryu controller based software defined networks using feature extraction and classification
Ravindra Kumar Chouhan, Mithilesh Atulkar, Naresh Kumar Nagwani
Applied Intelligence (2022) Vol. 53, Iss. 4, pp. 4268-4288
Closed Access | Times Cited: 23
Ravindra Kumar Chouhan, Mithilesh Atulkar, Naresh Kumar Nagwani
Applied Intelligence (2022) Vol. 53, Iss. 4, pp. 4268-4288
Closed Access | Times Cited: 23
Enhancing ınternet security: a novel ML approach for intrusion detection using RS2FS and cascaded SVM/ANFIS
S. Gomathi, Khushbu Kumari
International Journal of Machine Learning and Cybernetics (2025)
Closed Access
S. Gomathi, Khushbu Kumari
International Journal of Machine Learning and Cybernetics (2025)
Closed Access
Network Intrusion Detection with a Hashing Based Apriori Algorithm Using Hadoop MapReduce
Nureni Ayofe Azeez, Tolulope Jide Ayemobola, Sanjay Misra, et al.
Computers (2019) Vol. 8, Iss. 4, pp. 86-86
Open Access | Times Cited: 42
Nureni Ayofe Azeez, Tolulope Jide Ayemobola, Sanjay Misra, et al.
Computers (2019) Vol. 8, Iss. 4, pp. 86-86
Open Access | Times Cited: 42
An improved ensemble approach for effective intrusion detection
Gulshan Kumar
The Journal of Supercomputing (2019) Vol. 76, Iss. 1, pp. 275-291
Closed Access | Times Cited: 38
Gulshan Kumar
The Journal of Supercomputing (2019) Vol. 76, Iss. 1, pp. 275-291
Closed Access | Times Cited: 38
An effective networks intrusion detection approach based on hybrid Harris Hawks and multi-layer perceptron
Moutaz Alazab, Ruba Abu Khurma, Pedro Á. Castillo, et al.
Egyptian Informatics Journal (2023) Vol. 25, pp. 100423-100423
Open Access | Times Cited: 11
Moutaz Alazab, Ruba Abu Khurma, Pedro Á. Castillo, et al.
Egyptian Informatics Journal (2023) Vol. 25, pp. 100423-100423
Open Access | Times Cited: 11
A Systematic Review of Defensive and Offensive Cybersecurity with Machine Learning
Imatitikua D. Aiyanyo, Hamman Samuel, Heuiseok Lim
Applied Sciences (2020) Vol. 10, Iss. 17, pp. 5811-5811
Open Access | Times Cited: 30
Imatitikua D. Aiyanyo, Hamman Samuel, Heuiseok Lim
Applied Sciences (2020) Vol. 10, Iss. 17, pp. 5811-5811
Open Access | Times Cited: 30
Online Intrusion Detection for Internet of Things Systems With Full Bayesian Possibilistic Clustering and Ensembled Fuzzy Classifiers
Fangqi Li, Ruijie Zhao, Shilin Wang, et al.
IEEE Transactions on Fuzzy Systems (2022) Vol. 30, Iss. 11, pp. 4605-4617
Closed Access | Times Cited: 17
Fangqi Li, Ruijie Zhao, Shilin Wang, et al.
IEEE Transactions on Fuzzy Systems (2022) Vol. 30, Iss. 11, pp. 4605-4617
Closed Access | Times Cited: 17
Association Rule Mining Frequent-Pattern-Based Intrusion Detection in Network
S. Sivanantham, V. Mohanraj, Y. Suresh, et al.
Computer Systems Science and Engineering (2022) Vol. 44, Iss. 2, pp. 1617-1631
Open Access | Times Cited: 16
S. Sivanantham, V. Mohanraj, Y. Suresh, et al.
Computer Systems Science and Engineering (2022) Vol. 44, Iss. 2, pp. 1617-1631
Open Access | Times Cited: 16
A Novel Anomaly-Based Intrusion Detection Model Using PSOGWO-Optimized BP Neural Network and GA-Based Feature Selection
Saeid Sheikhi, Panos Kostakos
Sensors (2022) Vol. 22, Iss. 23, pp. 9318-9318
Open Access | Times Cited: 12
Saeid Sheikhi, Panos Kostakos
Sensors (2022) Vol. 22, Iss. 23, pp. 9318-9318
Open Access | Times Cited: 12
A new intelligent intrusion detector based on ensemble of decision trees
Seyed Morteza Mousavi, Vahid Majidnezhad, Avaz Naghipour
Journal of Ambient Intelligence and Humanized Computing (2019) Vol. 13, Iss. 7, pp. 3347-3359
Closed Access | Times Cited: 21
Seyed Morteza Mousavi, Vahid Majidnezhad, Avaz Naghipour
Journal of Ambient Intelligence and Humanized Computing (2019) Vol. 13, Iss. 7, pp. 3347-3359
Closed Access | Times Cited: 21
Global Intrusion Detection Environments and Platform for Anomaly-Based Intrusion Detection Systems
Jyoti Snehi, Abhinav Bhandari, Manish Snehi, et al.
Lecture notes in networks and systems (2021), pp. 817-831
Closed Access | Times Cited: 15
Jyoti Snehi, Abhinav Bhandari, Manish Snehi, et al.
Lecture notes in networks and systems (2021), pp. 817-831
Closed Access | Times Cited: 15
Building a Fuzzy Classifier Based on Whale Optimization Algorithm to Detect Network Intrusions
Nikolay Koryshev, I. A. Hodashinsky, Alexander Shelupanov
Symmetry (2021) Vol. 13, Iss. 7, pp. 1211-1211
Open Access | Times Cited: 14
Nikolay Koryshev, I. A. Hodashinsky, Alexander Shelupanov
Symmetry (2021) Vol. 13, Iss. 7, pp. 1211-1211
Open Access | Times Cited: 14
An Efficient Network Intrusion Detection System Based on Feature Selection and Ensemble Classifier.
Yuyang Zhou, Guang Cheng
arXiv (Cornell University) (2019)
Closed Access | Times Cited: 16
Yuyang Zhou, Guang Cheng
arXiv (Cornell University) (2019)
Closed Access | Times Cited: 16
Optimized Intrusion Detection System Using Computational Intelligent Algorithm
P. J. Sajith, G. Nagarajan
Lecture notes in electrical engineering (2021), pp. 633-639
Closed Access | Times Cited: 13
P. J. Sajith, G. Nagarajan
Lecture notes in electrical engineering (2021), pp. 633-639
Closed Access | Times Cited: 13
Proposed Hybrid CorrelationFeatureSelectionForestPanalizedAttribute Approach to advance IDSs
Doaa N. Mhawi, Prof. Soukaena H. Hashem
Karbala International Journal of Modern Science (2021) Vol. 7, Iss. 4
Open Access | Times Cited: 13
Doaa N. Mhawi, Prof. Soukaena H. Hashem
Karbala International Journal of Modern Science (2021) Vol. 7, Iss. 4
Open Access | Times Cited: 13