
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Incorporating evolutionary computation for securing wireless network against cyberthreats
Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi
The Journal of Supercomputing (2020) Vol. 76, Iss. 11, pp. 8691-8728
Closed Access | Times Cited: 23
Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi
The Journal of Supercomputing (2020) Vol. 76, Iss. 11, pp. 8691-8728
Closed Access | Times Cited: 23
Showing 23 citing articles:
Gene selection for cancer types classification using novel hybrid metaheuristics approach
Alok Kumar Shukla, Pradeep Singh, Manu Vardhan
Swarm and Evolutionary Computation (2020) Vol. 54, pp. 100661-100661
Closed Access | Times Cited: 74
Alok Kumar Shukla, Pradeep Singh, Manu Vardhan
Swarm and Evolutionary Computation (2020) Vol. 54, pp. 100661-100661
Closed Access | Times Cited: 74
Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection
Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi
Cluster Computing (2021) Vol. 24, Iss. 3, pp. 1881-1900
Closed Access | Times Cited: 57
Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi
Cluster Computing (2021) Vol. 24, Iss. 3, pp. 1881-1900
Closed Access | Times Cited: 57
Anomaly Detection in Cybersecurity Datasets via Cooperative Co-evolution-based Feature Selection
Ayesha Rashid, Mohiuddin Ahmed, Leslie F. Sikos, et al.
ACM Transactions on Management Information Systems (2022) Vol. 13, Iss. 3, pp. 1-39
Open Access | Times Cited: 29
Ayesha Rashid, Mohiuddin Ahmed, Leslie F. Sikos, et al.
ACM Transactions on Management Information Systems (2022) Vol. 13, Iss. 3, pp. 1-39
Open Access | Times Cited: 29
An effect of chaos grasshopper optimization algorithm for protection of network infrastructure
Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi
Computer Networks (2020) Vol. 176, pp. 107251-107251
Closed Access | Times Cited: 49
Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi
Computer Networks (2020) Vol. 176, pp. 107251-107251
Closed Access | Times Cited: 49
Towards Data and Computation Offloading in Mobile Cloud Computing: Taxonomy, Overview, and Future Directions
Amir Masoud Rahmani, Mokhtar Mohammadi, Adil Hussein Mohammed, et al.
Wireless Personal Communications (2021) Vol. 119, Iss. 1, pp. 147-185
Closed Access | Times Cited: 33
Amir Masoud Rahmani, Mokhtar Mohammadi, Adil Hussein Mohammed, et al.
Wireless Personal Communications (2021) Vol. 119, Iss. 1, pp. 147-185
Closed Access | Times Cited: 33
Selection of a Rational Composition of İnformation Protection Means Using a Genetic Algorithm
Valeriy Lakhno, Бахытжан Ахметов, O. Smirnov, et al.
Lecture notes on data engineering and communications technologies (2022), pp. 21-34
Closed Access | Times Cited: 9
Valeriy Lakhno, Бахытжан Ахметов, O. Smirnov, et al.
Lecture notes on data engineering and communications technologies (2022), pp. 21-34
Closed Access | Times Cited: 9
Attack Detection in IoT Network Using Support Vector Machine and Improved Feature Selection Technique
Noura Ben Henda, Amina Msolli, Imen Haggui, et al.
Journal of Network and Systems Management (2024) Vol. 32, Iss. 4
Closed Access | Times Cited: 1
Noura Ben Henda, Amina Msolli, Imen Haggui, et al.
Journal of Network and Systems Management (2024) Vol. 32, Iss. 4
Closed Access | Times Cited: 1
Evolutionary Algorithm-based Feature Selection for an Intrusion Detection System
Devendra Singh, Manish Shrivastava
Engineering Technology & Applied Science Research (2021) Vol. 11, Iss. 3, pp. 7130-7134
Open Access | Times Cited: 11
Devendra Singh, Manish Shrivastava
Engineering Technology & Applied Science Research (2021) Vol. 11, Iss. 3, pp. 7130-7134
Open Access | Times Cited: 11
A Novel SVM Based CFS for Intrusion Detection in IoT Network
Noura Ben Henda, Amina Msolli, Imen Hagui, et al.
(2023), pp. 1-5
Closed Access | Times Cited: 3
Noura Ben Henda, Amina Msolli, Imen Hagui, et al.
(2023), pp. 1-5
Closed Access | Times Cited: 3
Multiresolution dendritic cell algorithm for network anomaly detection
David Limon-Cantu, Vicente Alarcón-Aquino
PeerJ Computer Science (2021) Vol. 7, pp. e749-e749
Open Access | Times Cited: 6
David Limon-Cantu, Vicente Alarcón-Aquino
PeerJ Computer Science (2021) Vol. 7, pp. e749-e749
Open Access | Times Cited: 6
An Integrated IDS Using ICA-Based Feature Selection and SVM Classification Method
Roseline Oluwaseun Ogundokun, Sanjay Misra, Amos Orenyi Bajeh, et al.
Lecture notes on data engineering and communications technologies (2022), pp. 255-271
Closed Access | Times Cited: 4
Roseline Oluwaseun Ogundokun, Sanjay Misra, Amos Orenyi Bajeh, et al.
Lecture notes on data engineering and communications technologies (2022), pp. 255-271
Closed Access | Times Cited: 4
A feature selection method based on auto-encoder for internet of things intrusion detection
Ahmed Fahad Alshudukhi, Saif Ahmed Jabbar, Basel Alshaikhdeeb
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2022) Vol. 12, Iss. 3, pp. 3265-3265
Open Access | Times Cited: 4
Ahmed Fahad Alshudukhi, Saif Ahmed Jabbar, Basel Alshaikhdeeb
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2022) Vol. 12, Iss. 3, pp. 3265-3265
Open Access | Times Cited: 4
Multi-Parallel Adaptive Grasshopper Optimization Technique for Detecting Anonymous Attacks in Wireless Networks
Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi
Wireless Personal Communications (2021) Vol. 119, Iss. 3, pp. 2787-2816
Closed Access | Times Cited: 5
Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi
Wireless Personal Communications (2021) Vol. 119, Iss. 3, pp. 2787-2816
Closed Access | Times Cited: 5
Detecting impersonation episode using teaching learning‐based optimization and support vector machine techniques
Alok Kumar Shukla
Expert Systems (2023) Vol. 40, Iss. 7
Closed Access | Times Cited: 1
Alok Kumar Shukla
Expert Systems (2023) Vol. 40, Iss. 7
Closed Access | Times Cited: 1
Gene Correlation Guided Gene Selection for Microarray Data Classification
Dong Yang, Xuchang Zhu
BioMed Research International (2021) Vol. 2021, pp. 1-11
Open Access | Times Cited: 3
Dong Yang, Xuchang Zhu
BioMed Research International (2021) Vol. 2021, pp. 1-11
Open Access | Times Cited: 3
Structural Analysis of the NSL-KDD Data Sets for Solving the Problem of Attacks Detection Using ML/DL Methods
Aleksandr Krivchenkov, Boriss Mišņevs, Alexander Grakovski
Lecture notes in networks and systems (2022), pp. 3-13
Closed Access | Times Cited: 2
Aleksandr Krivchenkov, Boriss Mišņevs, Alexander Grakovski
Lecture notes in networks and systems (2022), pp. 3-13
Closed Access | Times Cited: 2
Discovery of Botnet Activities in Internet-of-Things System Using Dynamic Evolutionary Mechanism
Alok Kumar Shukla, Shubhra Dwivedi
New Generation Computing (2022) Vol. 40, Iss. 1, pp. 255-283
Closed Access | Times Cited: 2
Alok Kumar Shukla, Shubhra Dwivedi
New Generation Computing (2022) Vol. 40, Iss. 1, pp. 255-283
Closed Access | Times Cited: 2
Decision Support System on Optimization of Information Protection Tools Placement
Lakhno V. A
International Journal of Advanced Trends in Computer Science and Engineering (2020) Vol. 9, Iss. 4, pp. 4457-4464
Closed Access | Times Cited: 2
Lakhno V. A
International Journal of Advanced Trends in Computer Science and Engineering (2020) Vol. 9, Iss. 4, pp. 4457-4464
Closed Access | Times Cited: 2
Experimental Comparison of ML/DL Approaches for Cyberattacks Diagnostics
Aleksandr Krivchenkov, Boriss Mišņevs, Alexander Grakovski
Advances in intelligent systems and computing (2021), pp. 213-223
Closed Access | Times Cited: 2
Aleksandr Krivchenkov, Boriss Mišņevs, Alexander Grakovski
Advances in intelligent systems and computing (2021), pp. 213-223
Closed Access | Times Cited: 2
A Novel Self-supervised Few-shot Network Intrusion Detection Method
Jing Zhang, Zhixin Shi, Hao Wu, et al.
Lecture notes in computer science (2022), pp. 513-525
Closed Access | Times Cited: 1
Jing Zhang, Zhixin Shi, Hao Wu, et al.
Lecture notes in computer science (2022), pp. 513-525
Closed Access | Times Cited: 1
Mетод раціонального керування системами кіберзахисту та забезпечення гарантоздатності радіотехнічних систем
Hennadii Hulak, Valeriy Lakhno, S. A. Adiljanova
Visnyk NTUU KPI Seriia - Radiotekhnika Radioaparatobuduvannia (2020), Iss. 83, pp. 62-68
Closed Access
Hennadii Hulak, Valeriy Lakhno, S. A. Adiljanova
Visnyk NTUU KPI Seriia - Radiotekhnika Radioaparatobuduvannia (2020), Iss. 83, pp. 62-68
Closed Access
OPTIMIZATION OF PLACEMENT OF INFORMATION PROTECTION MEANS BASED ON THE APPLICATION OF A GENETIC ALGORITHM
Valeriy Lakhno, Volodimir Maliukov, Larysa Komarova, et al.
Cybersecurity Education Science Technique (2022) Vol. 1, Iss. 17, pp. 6-20
Open Access
Valeriy Lakhno, Volodimir Maliukov, Larysa Komarova, et al.
Cybersecurity Education Science Technique (2022) Vol. 1, Iss. 17, pp. 6-20
Open Access
EFFICIENCY OF THE INDICATORS INVESTMENT CALCULATION METHOD IN THE INFORMATION SECURITY SYSTEM OF INFORMATION OBJECTS
Vitalii Chubaievskyi, Valeriy Lakhno, Olena Kryvoruchko, et al.
Cybersecurity Education Science Technique (2021) Vol. 1, Iss. 13, pp. 16-28
Open Access
Vitalii Chubaievskyi, Valeriy Lakhno, Olena Kryvoruchko, et al.
Cybersecurity Education Science Technique (2021) Vol. 1, Iss. 13, pp. 16-28
Open Access