OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection
Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi
Cluster Computing (2021) Vol. 24, Iss. 3, pp. 1881-1900
Closed Access | Times Cited: 57

Showing 1-25 of 57 citing articles:

Fick’s Law Algorithm: A physical law-based algorithm for numerical optimization
Fatma A. Hashim, Reham R. Mostafa, Abdelazim G. Hussien, et al.
Knowledge-Based Systems (2022) Vol. 260, pp. 110146-110146
Closed Access | Times Cited: 164

Deep learning for anomaly detection in multivariate time series: Approaches, applications, and challenges
Gen Li, Jason J. Jung
Information Fusion (2022) Vol. 91, pp. 93-102
Closed Access | Times Cited: 140

Advanced Feature Extraction and Selection Approach Using Deep Learning and Aquila Optimizer for IoT Intrusion Detection System
Abdulaziz Fatani, Abdelghani Dahou, Mohammed A. A. Al‐qaness, et al.
Sensors (2021) Vol. 22, Iss. 1, pp. 140-140
Open Access | Times Cited: 133

An effective genetic algorithm-based feature selection method for intrusion detection systems
Zahid Halim, Muhammad Nadeem Yousaf, Muhammad Waqas, et al.
Computers & Security (2021) Vol. 110, pp. 102448-102448
Closed Access | Times Cited: 109

A metaheuristic-based ensemble feature selection framework for cyber threat detection in IoT-enabled networks
Arun Kumar Dey, Govind P. Gupta, Satya Prakash Sahu
Decision Analytics Journal (2023) Vol. 7, pp. 100206-100206
Open Access | Times Cited: 40

Building a Cloud-IDS by Hybrid Bio-Inspired Feature Selection Algorithms Along With Random Forest Model
Mhamad Bakro, Rakesh Ranjan Kumar, M. N. Husain, et al.
IEEE Access (2024) Vol. 12, pp. 8846-8874
Open Access | Times Cited: 15

Mobility-aware computational offloading in mobile edge networks: a survey
Sardar Khaliq uz Zaman, Ali Imran Jehangiri, Tahir Maqsood, et al.
Cluster Computing (2021) Vol. 24, Iss. 4, pp. 2735-2756
Closed Access | Times Cited: 91

A novel optimization based deep learning with artificial intelligence approach to detect intrusion attack in network system
S. Siva Shankar, Bùi Thanh Hùng, Prąsun Chakrabarti, et al.
Education and Information Technologies (2023) Vol. 29, Iss. 4, pp. 3859-3883
Closed Access | Times Cited: 35

A novel network intrusion detection method based on metaheuristic optimisation algorithms
Reza Ghanbarzadeh, Ali Hosseinalipour, Ali Ghaffari
Journal of Ambient Intelligence and Humanized Computing (2023) Vol. 14, Iss. 6, pp. 7575-7592
Open Access | Times Cited: 21

Integration of Data Science and IoT with Blockchain for Industry 4.0
Pranav Gangwani, Alexander Perez-Pons, Santosh Joshi, et al.
Studies in big data (2023), pp. 139-177
Closed Access | Times Cited: 21

A Systematic Literature Review on Swarm Intelligence Based Intrusion Detection System: Past, Present and Future
Dukka Karun Kumar Reddy, Janmenjoy Nayak, H. S. Behera, et al.
Archives of Computational Methods in Engineering (2024) Vol. 31, Iss. 5, pp. 2717-2784
Closed Access | Times Cited: 9

A transfer learning-based intrusion detection system for zero-day attack in communication-based train control system
Lu He, Yanan Zhao, Yajing Song, et al.
Cluster Computing (2024) Vol. 27, Iss. 6, pp. 8477-8492
Closed Access | Times Cited: 7

Intrusion detection systems for IoT based on bio-inspired and machine learning techniques: a systematic review of the literature
Rafika Saadouni, Chirihane Gherbi, Zibouda Aliouat, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 8655-8681
Closed Access | Times Cited: 7

An improved binary manta ray foraging optimization algorithm based feature selection and random forest classifier for network intrusion detection
Ibrahim Hayatu Hassan, Mohammed Abdullahi, Mansur Masama Aliyu, et al.
Intelligent Systems with Applications (2022) Vol. 16, pp. 200114-200114
Open Access | Times Cited: 36

Intrusion Detection using hybridized Meta-heuristic techniques with Weighted XGBoost Classifier
Ghulam Mohi-Ud-Din, Lin Zhijun, Jiangbin Zheng, et al.
Expert Systems with Applications (2023) Vol. 232, pp. 120596-120596
Closed Access | Times Cited: 16

An Enhanced Hybrid Intrusion Detection Based on Crow Search Analysis Optimizations and Artificial Neural Network
Chetan Gupta, Amit Kumar, Neelesh Kumar Jain
Wireless Personal Communications (2024) Vol. 134, Iss. 1, pp. 43-68
Closed Access | Times Cited: 5

Shielding networks: enhancing intrusion detection with hybrid feature selection and stack ensemble learning
Ali Mohammed Alsaffar, Mostafa Nouri-Baygi, Hamed M. Zolbanin
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 5

Intrusion defense: Leveraging ant colony optimization for enhanced multi-optimization in network security
Chetan Gupta, Amit Kumar, Neelesh Kumar Jain
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 2
Closed Access

Gazelle‐Dingo Optimization and Ensemble Classification: A Hybrid Approach for Intrusion Detection in Fog Computing
Aravind Karrothu, G.V. Sriramakrishnan, V. Ragavi
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 3
Closed Access

Fusion-based anomaly detection system using modified isolation forest for internet of things
Orieb AbuAlghanam, Hadeel Alazzam, Esraa Alhenawi, et al.
Journal of Ambient Intelligence and Humanized Computing (2022) Vol. 14, Iss. 1, pp. 131-145
Closed Access | Times Cited: 26

Intrusion detection using optimized ensemble classification in fog computing paradigm
Ramkumar M .P ., T. Daniya, P. Mano Paul, et al.
Knowledge-Based Systems (2022) Vol. 252, pp. 109364-109364
Closed Access | Times Cited: 24

A FKPCA-GWO WDBiLSTM classifier for intrusion detection system in cloud environments
Geetha T.V., Deepa A.J.
Knowledge-Based Systems (2022) Vol. 253, pp. 109557-109557
Closed Access | Times Cited: 22

Applications of big data in clinical applications
Sabyasachi Pramanik, Ahmed J. Obaid, M. Niranjanamurthy, et al.
AIP conference proceedings (2023)
Open Access | Times Cited: 12

Systematic literature review on intrusion detection systems: Research trends, algorithms, methods, datasets, and limitations
M. Issa, Mohammad Aljanabi, Hassan Mohamed Muhi-Aldeen
Journal of Intelligent Systems (2024) Vol. 33, Iss. 1
Open Access | Times Cited: 4

Genetic Algorithm based feature selection and Naïve Bayes for anomaly detection in fog computing environment
John Oche Onah, Shafi’i Muhammad Abdulhamid, Mohammed Abdullahi, et al.
Machine Learning with Applications (2021) Vol. 6, pp. 100156-100156
Open Access | Times Cited: 30

Page 1 - Next Page

Scroll to top