
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Implementation of adaptive scheme in evolutionary technique for anomaly-based intrusion detection
Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi, et al.
Evolutionary Intelligence (2019) Vol. 13, Iss. 1, pp. 103-117
Closed Access | Times Cited: 49
Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi, et al.
Evolutionary Intelligence (2019) Vol. 13, Iss. 1, pp. 103-117
Closed Access | Times Cited: 49
Showing 1-25 of 49 citing articles:
A systematic literature review for network intrusion detection system (IDS)
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed
International Journal of Information Security (2023) Vol. 22, Iss. 5, pp. 1125-1162
Closed Access | Times Cited: 61
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed
International Journal of Information Security (2023) Vol. 22, Iss. 5, pp. 1125-1162
Closed Access | Times Cited: 61
Intelligent Network Intrusion Prevention Feature Collection and Classification Algorithms
Deepaa Selva, B. Nagaraj, Danil Pelusi, et al.
Algorithms (2021) Vol. 14, Iss. 8, pp. 224-224
Open Access | Times Cited: 92
Deepaa Selva, B. Nagaraj, Danil Pelusi, et al.
Algorithms (2021) Vol. 14, Iss. 8, pp. 224-224
Open Access | Times Cited: 92
Gene selection for cancer types classification using novel hybrid metaheuristics approach
Alok Kumar Shukla, Pradeep Singh, Manu Vardhan
Swarm and Evolutionary Computation (2020) Vol. 54, pp. 100661-100661
Closed Access | Times Cited: 74
Alok Kumar Shukla, Pradeep Singh, Manu Vardhan
Swarm and Evolutionary Computation (2020) Vol. 54, pp. 100661-100661
Closed Access | Times Cited: 74
A Comprehensive Systematic Literature Review on Intrusion Detection Systems
Merve Ozkan-Okay, Refik Samet, Ömer Aslan, et al.
IEEE Access (2021) Vol. 9, pp. 157727-157760
Open Access | Times Cited: 74
Merve Ozkan-Okay, Refik Samet, Ömer Aslan, et al.
IEEE Access (2021) Vol. 9, pp. 157727-157760
Open Access | Times Cited: 74
SAAE-DNN: Deep Learning Method on Intrusion Detection
Chaofei Tang, Nurbol Luktarhan, Yuxin Zhao
Symmetry (2020) Vol. 12, Iss. 10, pp. 1695-1695
Open Access | Times Cited: 73
Chaofei Tang, Nurbol Luktarhan, Yuxin Zhao
Symmetry (2020) Vol. 12, Iss. 10, pp. 1695-1695
Open Access | Times Cited: 73
A Detailed Analysis of Benchmark Datasets for Network Intrusion Detection System
Mossa Ghurab, Ghaleb Gaphari, Faisal Alshami, et al.
Asian Journal of Research in Computer Science (2021), pp. 14-33
Open Access | Times Cited: 63
Mossa Ghurab, Ghaleb Gaphari, Faisal Alshami, et al.
Asian Journal of Research in Computer Science (2021), pp. 14-33
Open Access | Times Cited: 63
Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection
Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi
Cluster Computing (2021) Vol. 24, Iss. 3, pp. 1881-1900
Closed Access | Times Cited: 57
Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi
Cluster Computing (2021) Vol. 24, Iss. 3, pp. 1881-1900
Closed Access | Times Cited: 57
Machine Learning-Based Adaptive Synthetic Sampling Technique for Intrusion Detection
Mohammed Zakariah, Salman A. AlQahtani, Mabrook Al‐Rakhami
Applied Sciences (2023) Vol. 13, Iss. 11, pp. 6504-6504
Open Access | Times Cited: 18
Mohammed Zakariah, Salman A. AlQahtani, Mabrook Al‐Rakhami
Applied Sciences (2023) Vol. 13, Iss. 11, pp. 6504-6504
Open Access | Times Cited: 18
Enhanced Grey Wolf Optimization (EGWO) and random forest based mechanism for intrusion detection in IoT networks
Saad Said Alqahtany, Asadullah Shaikh, Ali Alqazzaz
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Saad Said Alqahtany, Asadullah Shaikh, Ali Alqazzaz
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
A study on metaheuristics approaches for gene selection in microarray data: algorithms, applications and open challenges
Alok Kumar Shukla, Diwakar Tripathi, B. Ramachandra Reddy, et al.
Evolutionary Intelligence (2019) Vol. 13, Iss. 3, pp. 309-329
Closed Access | Times Cited: 50
Alok Kumar Shukla, Diwakar Tripathi, B. Ramachandra Reddy, et al.
Evolutionary Intelligence (2019) Vol. 13, Iss. 3, pp. 309-329
Closed Access | Times Cited: 50
An effect of chaos grasshopper optimization algorithm for protection of network infrastructure
Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi
Computer Networks (2020) Vol. 176, pp. 107251-107251
Closed Access | Times Cited: 49
Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi
Computer Networks (2020) Vol. 176, pp. 107251-107251
Closed Access | Times Cited: 49
Towards an intrusion detection system for detecting web attacks based on an ensemble of filter feature selection techniques
Deepak Kshirsagar, Sandeep Kumar
Cyber-Physical Systems (2022) Vol. 9, Iss. 3, pp. 244-259
Closed Access | Times Cited: 22
Deepak Kshirsagar, Sandeep Kumar
Cyber-Physical Systems (2022) Vol. 9, Iss. 3, pp. 244-259
Closed Access | Times Cited: 22
Improved Crow Search-Based Feature Selection and Ensemble Learning for IoT Intrusion Detection
D. Jayalatchumy, Rajakumar Ramalingam, Aravind Balakrishnan, et al.
IEEE Access (2024) Vol. 12, pp. 33218-33235
Open Access | Times Cited: 4
D. Jayalatchumy, Rajakumar Ramalingam, Aravind Balakrishnan, et al.
IEEE Access (2024) Vol. 12, pp. 33218-33235
Open Access | Times Cited: 4
Detection of anomaly intrusion utilizing self-adaptive grasshopper optimization algorithm
Alok Kumar Shukla
Neural Computing and Applications (2020) Vol. 33, Iss. 13, pp. 7541-7561
Closed Access | Times Cited: 33
Alok Kumar Shukla
Neural Computing and Applications (2020) Vol. 33, Iss. 13, pp. 7541-7561
Closed Access | Times Cited: 33
Improving the Accuracy of Network Intrusion Detection System in Medical IoT Systems through Butterfly Optimization Algorithm
Ya Li, Seyed-mohsen Ghoreishi, Alibek Issakhov
Wireless Personal Communications (2021) Vol. 126, Iss. 3, pp. 1999-2017
Closed Access | Times Cited: 30
Ya Li, Seyed-mohsen Ghoreishi, Alibek Issakhov
Wireless Personal Communications (2021) Vol. 126, Iss. 3, pp. 1999-2017
Closed Access | Times Cited: 30
Deep Analysis of Risks and Recent Trends Towards Network Intrusion Detection System
D. Shankar, G. Victo Sudha George, J. N. S. S. Janardhana Naidu, et al.
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 1
Open Access | Times Cited: 11
D. Shankar, G. Victo Sudha George, J. N. S. S. Janardhana Naidu, et al.
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 1
Open Access | Times Cited: 11
Adoption and realization of deep learning in network traffic anomaly detection device design
Guanglu Wei, Zhonghua Wang
Soft Computing (2020) Vol. 25, Iss. 2, pp. 1147-1158
Closed Access | Times Cited: 28
Guanglu Wei, Zhonghua Wang
Soft Computing (2020) Vol. 25, Iss. 2, pp. 1147-1158
Closed Access | Times Cited: 28
Hybrid Deep Learning Network Intrusion Detection System Based on Convolutional Neural Network and Bidirectional Long Short-Term Memory
Anindra Ageng Jihado, Abba Suganda Girsang
Journal of Advances in Information Technology (2024) Vol. 15, Iss. 2, pp. 219-232
Open Access | Times Cited: 3
Anindra Ageng Jihado, Abba Suganda Girsang
Journal of Advances in Information Technology (2024) Vol. 15, Iss. 2, pp. 219-232
Open Access | Times Cited: 3
Multi-population adaptive genetic algorithm for selection of microarray biomarkers
Alok Kumar Shukla
Neural Computing and Applications (2019) Vol. 32, Iss. 15, pp. 11897-11918
Closed Access | Times Cited: 29
Alok Kumar Shukla
Neural Computing and Applications (2019) Vol. 32, Iss. 15, pp. 11897-11918
Closed Access | Times Cited: 29
Many-Objective Evolutionary Algorithm with Adaptive Reference Vector
Maoqing Zhang, Lei Wang, Wuzhao Li, et al.
Information Sciences (2021) Vol. 563, pp. 70-90
Closed Access | Times Cited: 22
Maoqing Zhang, Lei Wang, Wuzhao Li, et al.
Information Sciences (2021) Vol. 563, pp. 70-90
Closed Access | Times Cited: 22
Incorporating evolutionary computation for securing wireless network against cyberthreats
Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi
The Journal of Supercomputing (2020) Vol. 76, Iss. 11, pp. 8691-8728
Closed Access | Times Cited: 23
Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi
The Journal of Supercomputing (2020) Vol. 76, Iss. 11, pp. 8691-8728
Closed Access | Times Cited: 23
Prediction of middle box-based attacks in Internet of Healthcare Things using ranking subsets and convolutional neural network
Harun Bangali, Paul Rodrigues, V. Pandimurugan, et al.
Wireless Networks (2023) Vol. 30, Iss. 3, pp. 1493-1511
Closed Access | Times Cited: 7
Harun Bangali, Paul Rodrigues, V. Pandimurugan, et al.
Wireless Networks (2023) Vol. 30, Iss. 3, pp. 1493-1511
Closed Access | Times Cited: 7
Anomaly detection in network traffic with ELSC learning algorithm
Muhammad Muntazir Khan, Muhammad Zubair Rehman, Abdullah Khan, et al.
Electronics Letters (2024) Vol. 60, Iss. 14
Open Access | Times Cited: 2
Muhammad Muntazir Khan, Muhammad Zubair Rehman, Abdullah Khan, et al.
Electronics Letters (2024) Vol. 60, Iss. 14
Open Access | Times Cited: 2
Identification of cancerous gene groups from microarray data by employing adaptive genetic and support vector machine technique
Alok Kumar Shukla
Computational Intelligence (2019) Vol. 36, Iss. 1, pp. 102-131
Closed Access | Times Cited: 21
Alok Kumar Shukla
Computational Intelligence (2019) Vol. 36, Iss. 1, pp. 102-131
Closed Access | Times Cited: 21
Metaheuristic algorithms in network intrusion detection
Ibrahim Hayatu Hassan, Mohammed Abdullahi, Mansur Aliyu Masama
Elsevier eBooks (2023), pp. 95-129
Closed Access | Times Cited: 6
Ibrahim Hayatu Hassan, Mohammed Abdullahi, Mansur Aliyu Masama
Elsevier eBooks (2023), pp. 95-129
Closed Access | Times Cited: 6