
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Biological Feature Selection and Classification Techniques for Intrusion Detection on BAT
Satheesh Narayanasami, Sudhakar Sengan, Saira Khurram, et al.
Wireless Personal Communications (2021) Vol. 127, Iss. 2, pp. 1763-1785
Closed Access | Times Cited: 12
Satheesh Narayanasami, Sudhakar Sengan, Saira Khurram, et al.
Wireless Personal Communications (2021) Vol. 127, Iss. 2, pp. 1763-1785
Closed Access | Times Cited: 12
Showing 12 citing articles:
A dependable hybrid machine learning model for network intrusion detection
Md. Alamin Talukder, Khondokar Fida Hasan, Md. Manowarul Islam, et al.
Journal of Information Security and Applications (2022) Vol. 72, pp. 103405-103405
Open Access | Times Cited: 97
Md. Alamin Talukder, Khondokar Fida Hasan, Md. Manowarul Islam, et al.
Journal of Information Security and Applications (2022) Vol. 72, pp. 103405-103405
Open Access | Times Cited: 97
Machine learning-based network intrusion detection for big and imbalanced data using oversampling, stacking feature embedding and feature extraction
Md. Alamin Talukder, Md. Manowarul Islam, Md Ashraf Uddin, et al.
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 55
Md. Alamin Talukder, Md. Manowarul Islam, Md Ashraf Uddin, et al.
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 55
Cascaded intrusion detection system using machine learning
Md. Khabir Uddin Ahamed, Abdul Karim
Systems and Soft Computing (2025), pp. 200182-200182
Open Access | Times Cited: 1
Md. Khabir Uddin Ahamed, Abdul Karim
Systems and Soft Computing (2025), pp. 200182-200182
Open Access | Times Cited: 1
Shielding networks: enhancing intrusion detection with hybrid feature selection and stack ensemble learning
Ali Mohammed Alsaffar, Mostafa Nouri-Baygi, Hamed M. Zolbanin
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 5
Ali Mohammed Alsaffar, Mostafa Nouri-Baygi, Hamed M. Zolbanin
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 5
Improved Crow Search-Based Feature Selection and Ensemble Learning for IoT Intrusion Detection
D. Jayalatchumy, Rajakumar Ramalingam, Aravind Balakrishnan, et al.
IEEE Access (2024) Vol. 12, pp. 33218-33235
Open Access | Times Cited: 4
D. Jayalatchumy, Rajakumar Ramalingam, Aravind Balakrishnan, et al.
IEEE Access (2024) Vol. 12, pp. 33218-33235
Open Access | Times Cited: 4
Intrusion defense: Leveraging ant colony optimization for enhanced multi-optimization in network security
Chetan Gupta, Amit Kumar, Neelesh Kumar Jain
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 2
Closed Access
Chetan Gupta, Amit Kumar, Neelesh Kumar Jain
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 2
Closed Access
A Reliable Protocol for Data Aggregation and Optimized Routing in IoT WSNs based on Machine Learning
Neeraj Chandnani, Chandrakant N. Khairnar
Wireless Personal Communications (2023) Vol. 130, Iss. 4, pp. 2589-2622
Closed Access | Times Cited: 10
Neeraj Chandnani, Chandrakant N. Khairnar
Wireless Personal Communications (2023) Vol. 130, Iss. 4, pp. 2589-2622
Closed Access | Times Cited: 10
A Novel Feature Selection Approach to Classify Intrusion Attacks in Network Communications
Merve Ozkan-Okay, Refik Samet, Ömer Aslan, et al.
Applied Sciences (2023) Vol. 13, Iss. 19, pp. 11067-11067
Open Access | Times Cited: 10
Merve Ozkan-Okay, Refik Samet, Ömer Aslan, et al.
Applied Sciences (2023) Vol. 13, Iss. 19, pp. 11067-11067
Open Access | Times Cited: 10
Evaluating the Performance of Various SVM Kernel Functions Based on Basic Features Extracted from KDDCUP'99 Dataset by Random Forest Method for Detecting DDoS Attacks
Kaushik Adhikary, Shashi Bhushan, Sunil Kumar, et al.
Wireless Personal Communications (2021) Vol. 123, Iss. 4, pp. 3127-3145
Closed Access | Times Cited: 10
Kaushik Adhikary, Shashi Bhushan, Sunil Kumar, et al.
Wireless Personal Communications (2021) Vol. 123, Iss. 4, pp. 3127-3145
Closed Access | Times Cited: 10
An optimized Bi-LSTM with random synthetic over-sampling strategy for network intrusion detection
B. Padmavathi, A. Bhagyalakshmi, D. Kavitha, et al.
Soft Computing (2023) Vol. 28, Iss. 1, pp. 777-790
Closed Access | Times Cited: 3
B. Padmavathi, A. Bhagyalakshmi, D. Kavitha, et al.
Soft Computing (2023) Vol. 28, Iss. 1, pp. 777-790
Closed Access | Times Cited: 3
A Bio-Inspired Feature Selection and Ensemble Classification for DDoS Detection in Cloud
Aditya Kumar Shukla, Ashish Sharma
Journal of Advances in Information Technology (2024) Vol. 15, Iss. 10, pp. 1123-1130
Open Access
Aditya Kumar Shukla, Ashish Sharma
Journal of Advances in Information Technology (2024) Vol. 15, Iss. 10, pp. 1123-1130
Open Access
DETECTION OF KNEE OSTEOARTHRITIS BASED ON CENTER OF PRESSURE DATA AND THE BAT ALGORITHM
Mahrad Pouryosef Miandoab, Mohammed N. Ashtiani, Roozbeh Abedini‐Nassab, et al.
Journal of Mechanics in Medicine and Biology (2023) Vol. 24, Iss. 03
Closed Access
Mahrad Pouryosef Miandoab, Mohammed N. Ashtiani, Roozbeh Abedini‐Nassab, et al.
Journal of Mechanics in Medicine and Biology (2023) Vol. 24, Iss. 03
Closed Access