OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

MOAEOSCA: an enhanced multi-objective hybrid artificial ecosystem-based optimization with sine cosine algorithm for feature selection in botnet detection in IoT
Fatemeh Hosseini, Farhad Soleimanian Gharehchopogh, Mohammad Masdari
Multimedia Tools and Applications (2022) Vol. 82, Iss. 9, pp. 13369-13399
Closed Access | Times Cited: 24

Showing 24 citing articles:

A multi-objective mutation-based dynamic Harris Hawks optimization for botnet detection in IoT
Farhad Soleimanian Gharehchopogh, Benyamın Abdollahzadeh, Saeid Barshandeh, et al.
Internet of Things (2023) Vol. 24, pp. 100952-100952
Closed Access | Times Cited: 83

Anomaly-based intrusion detection system in the Internet of Things using a convolutional neural network and multi-objective enhanced Capuchin Search Algorithm
Hossein Asgharzadeh, Ali Ghaffari, Mohammad Masdari, et al.
Journal of Parallel and Distributed Computing (2023) Vol. 175, pp. 1-21
Closed Access | Times Cited: 57

Botnets Unveiled: A Comprehensive Survey on Evolving Threats and Defense Strategies
Mehdi Asadi, Mohammad Ali Jabraeil Jamali, Arash Heidari, et al.
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 11
Open Access | Times Cited: 9

Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review
Shubhkirti Sharma, Vijay Kumar, Kamlesh Dutta
Internet of Things and Cyber-Physical Systems (2024) Vol. 4, pp. 258-267
Open Access | Times Cited: 8

A robust intrusion detection system based on a shallow learning model and feature extraction techniques
Chadia El Asry, Ibtissam Benchaji, Samira Douzi, et al.
PLoS ONE (2024) Vol. 19, Iss. 1, pp. e0295801-e0295801
Open Access | Times Cited: 7

A Hybrid Multi-population Optimization Algorithm for Global Optimization and Its Application on Stock Market Prediction
Ali Alizadeh, Farhad Soleimanian Gharehchopogh, Mohammad Masdari, et al.
Computational Economics (2024)
Closed Access | Times Cited: 5

MTV-SCA: multi-trial vector-based sine cosine algorithm
Mohammad H. Nadimi-Shahraki, Shokooh Taghian, Danial Javaheri, et al.
Cluster Computing (2024) Vol. 27, Iss. 10, pp. 13471-13515
Closed Access | Times Cited: 5

How Is the Objective Function of the Feature Selection Problem Formulated?
Felipe Cisternas-Caneo, José Barrera-García, Broderick Crawford, et al.
Communications in computer and information science (2025), pp. 3-13
Closed Access

Machine learning-based multi-objective optimization framework for industrial black nickel electroplating
Junhao Ren, Qian Kang, Shuo Feng, et al.
Journal of Intelligent Manufacturing (2025)
Closed Access

HoleMal: A lightweight IoT malware detection framework based on efficient host-level traffic processing
Ziqian Chen, Wei Xia, Zhen Li, et al.
Computers & Security (2025), pp. 104360-104360
Closed Access

Feature Selection Problem and Metaheuristics: A Systematic Literature Review about Its Formulation, Evaluation and Applications
José Barrera-García, Felipe Cisternas-Caneo, Broderick Crawford, et al.
Biomimetics (2023) Vol. 9, Iss. 1, pp. 9-9
Open Access | Times Cited: 11

Feature selection for IoT botnet detection using equilibrium and Battle Royale Optimization
Qanita Bani Baker, Alaa Samarneh
Computers & Security (2024) Vol. 147, pp. 104060-104060
Closed Access | Times Cited: 2

Enhancing IoT security: A comparative study of feature reduction techniques for intrusion detection system
Jing Li, Hewan Chen, Mohd Othman Shahizan, et al.
Intelligent Systems with Applications (2024) Vol. 23, pp. 200407-200407
Open Access | Times Cited: 1

An Improved hybrid Salp Swarm Optimization and African Vulture Optimization Algorithm for Global Optimization Problems and Its Applications in Stock Market Prediction
Ali Alizadeh, Farhad Soleimanian Gharehchopogh, Mohammad Masdari, et al.
Research Square (Research Square) (2023)
Open Access | Times Cited: 4

Kernel Methods for Conformal Prediction to Detect Botnets
Quang-Vinh Dang, Thai-Ha Pham
Lecture notes in networks and systems (2024), pp. 29-41
Closed Access

Artificial Ecosystem Optimizer-Based System Identification and Its Performance Evaluation
Şehmus Fidan
Arabian Journal for Science and Engineering (2024) Vol. 49, Iss. 12, pp. 16083-16106
Open Access

IoT-Botnet Detection Using Deep Learning Techniques
Soundes Belkacem
Lecture notes in networks and systems (2024), pp. 239-249
Closed Access

AI/ML driven intrusion detection framework for IoT enabled cold storage monitoring system
Mahendra Prasad, Pankaj Pal, Sachin Tripathi, et al.
Security and Privacy (2024) Vol. 7, Iss. 5
Open Access

3DLBS-BCHO: a three-dimensional deep learning approach based on branch splitter and binary chimp optimization for intrusion detection in IoT
Roya Zareh Farkhady, Kambiz Majidzadeh, Mohammad Masdari, et al.
Cluster Computing (2024) Vol. 28, Iss. 2
Closed Access

A Review of Enhancing Sine Cosine Algorithm: Common Approaches for Improved Metaheuristic Algorithms
Qusay Shihab Hamad, Sami Abdulla Mohsen Saleh, Shahrel Azmin Suandi, et al.
Archives of Computational Methods in Engineering (2024)
Closed Access

Optimized deep autoencoder and BiLSTM for intrusion detection in IoTs-Fog computing
Abdullah Alqahtani
Multimedia Tools and Applications (2024)
Closed Access

A Multi-Objective Method Based on Tag Eigenvalues Is Used to Predict the Supply Chain for Online Retailers
Leilei Jiang, Pan Hu, Ke Dong, et al.
International Journal of Information Systems and Supply Chain Management (2024) Vol. 17, Iss. 1, pp. 1-15
Open Access

An ensemble system for machine learning IoT intrusion detection based on enhanced artificial hummingbird algorithm
Leyi Shi, Qihang Yang, Lin Gao, et al.
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access

Page 1

Scroll to top