
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Clustered negative selection algorithm and fruit fly optimization for email spam detection
Ramdane Chikh, Salim Chıkhı
Journal of Ambient Intelligence and Humanized Computing (2017) Vol. 10, Iss. 1, pp. 143-152
Closed Access | Times Cited: 41
Ramdane Chikh, Salim Chıkhı
Journal of Ambient Intelligence and Humanized Computing (2017) Vol. 10, Iss. 1, pp. 143-152
Closed Access | Times Cited: 41
Showing 1-25 of 41 citing articles:
Improved salp swarm algorithm based on particle swarm optimization for feature selection
Rehab Ali Ibrahim, Ahmed A. Ewees, Diego Oliva, et al.
Journal of Ambient Intelligence and Humanized Computing (2018) Vol. 10, Iss. 8, pp. 3155-3169
Closed Access | Times Cited: 338
Rehab Ali Ibrahim, Ahmed A. Ewees, Diego Oliva, et al.
Journal of Ambient Intelligence and Humanized Computing (2018) Vol. 10, Iss. 8, pp. 3155-3169
Closed Access | Times Cited: 338
Spam filtering using a logistic regression model trained by an artificial bee colony algorithm
Bilge Kagan Dedetürk, Bahriye Akay
Applied Soft Computing (2020) Vol. 91, pp. 106229-106229
Closed Access | Times Cited: 114
Bilge Kagan Dedetürk, Bahriye Akay
Applied Soft Computing (2020) Vol. 91, pp. 106229-106229
Closed Access | Times Cited: 114
A wrapper‐based feature selection for improving performance of intrusion detection systems
Maryam Samadi Bonab, Ali Ghaffari, Farhad Soleimanian Gharehchopogh, et al.
International Journal of Communication Systems (2020) Vol. 33, Iss. 12
Closed Access | Times Cited: 77
Maryam Samadi Bonab, Ali Ghaffari, Farhad Soleimanian Gharehchopogh, et al.
International Journal of Communication Systems (2020) Vol. 33, Iss. 12
Closed Access | Times Cited: 77
A New Model for Failure Mode and Effects Analysis Based on k-Means Clustering Within Hesitant Linguistic Environment
Chunyan Duan, Xu-Qi Chen, Hua Shi, et al.
IEEE Transactions on Engineering Management (2019) Vol. 69, Iss. 5, pp. 1837-1847
Closed Access | Times Cited: 62
Chunyan Duan, Xu-Qi Chen, Hua Shi, et al.
IEEE Transactions on Engineering Management (2019) Vol. 69, Iss. 5, pp. 1837-1847
Closed Access | Times Cited: 62
Efficient Clustering of Emails Into Spam and Ham: The Foundational Study of a Comprehensive Unsupervised Framework
Asif Karim, Sami Azam, Bharanidharan Shanmugam, et al.
IEEE Access (2020) Vol. 8, pp. 154759-154788
Open Access | Times Cited: 49
Asif Karim, Sami Azam, Bharanidharan Shanmugam, et al.
IEEE Access (2020) Vol. 8, pp. 154759-154788
Open Access | Times Cited: 49
A negative selection algorithm with hypercube interface detectors for anomaly detection
Ming Gu, Dong Li, Jia Liu, et al.
Applied Soft Computing (2024) Vol. 154, pp. 111339-111339
Closed Access | Times Cited: 4
Ming Gu, Dong Li, Jia Liu, et al.
Applied Soft Computing (2024) Vol. 154, pp. 111339-111339
Closed Access | Times Cited: 4
Spam detection through feature selection using artificial neural network and sine–cosine algorithm
Rozita Talaei Pashiri, Yaser Rostami, Mohsen Mahrami
Mathematical sciences (2020) Vol. 14, Iss. 3, pp. 193-199
Closed Access | Times Cited: 37
Rozita Talaei Pashiri, Yaser Rostami, Mohsen Mahrami
Mathematical sciences (2020) Vol. 14, Iss. 3, pp. 193-199
Closed Access | Times Cited: 37
An Intelligent Spam Detection Model Based on Artificial Immune System
Abdul Jabbar Saleh, Asif Karim, Bharanidharan Shanmugam, et al.
Information (2019) Vol. 10, Iss. 6, pp. 209-209
Open Access | Times Cited: 35
Abdul Jabbar Saleh, Asif Karim, Bharanidharan Shanmugam, et al.
Information (2019) Vol. 10, Iss. 6, pp. 209-209
Open Access | Times Cited: 35
A hybrid meta-heuristic-based multi-objective feature selection with adaptive capsule network for automated email spam detection
Kadam Vikas Samarthrao, Vandana Rohokale
International Journal of Intelligent Robotics and Applications (2022) Vol. 6, Iss. 3, pp. 497-521
Closed Access | Times Cited: 21
Kadam Vikas Samarthrao, Vandana Rohokale
International Journal of Intelligent Robotics and Applications (2022) Vol. 6, Iss. 3, pp. 497-521
Closed Access | Times Cited: 21
DGA-PSO: An improved detector generation algorithm based on particle swarm optimization in negative selection
Ge Zhang, Junjiang He, Wenshan Li, et al.
Knowledge-Based Systems (2023) Vol. 278, pp. 110892-110892
Closed Access | Times Cited: 11
Ge Zhang, Junjiang He, Wenshan Li, et al.
Knowledge-Based Systems (2023) Vol. 278, pp. 110892-110892
Closed Access | Times Cited: 11
Echo state network based on improved fruit fly optimization algorithm for chaotic time series prediction
Zhongda Tian
Journal of Ambient Intelligence and Humanized Computing (2020) Vol. 13, Iss. 7, pp. 3483-3502
Closed Access | Times Cited: 30
Zhongda Tian
Journal of Ambient Intelligence and Humanized Computing (2020) Vol. 13, Iss. 7, pp. 3483-3502
Closed Access | Times Cited: 30
Negative Selection Algorithm Research and Applications in the Last Decade: A Review
Kishor Datta Gupta, Dipankar Dasgupta
IEEE Transactions on Artificial Intelligence (2021) Vol. 3, Iss. 2, pp. 110-128
Open Access | Times Cited: 20
Kishor Datta Gupta, Dipankar Dasgupta
IEEE Transactions on Artificial Intelligence (2021) Vol. 3, Iss. 2, pp. 110-128
Open Access | Times Cited: 20
HD-NSA: A real-valued negative selection algorithm based on hierarchy division
Junjiang He, Wen Chen, Tao Li, et al.
Applied Soft Computing (2021) Vol. 112, pp. 107726-107726
Closed Access | Times Cited: 17
Junjiang He, Wen Chen, Tao Li, et al.
Applied Soft Computing (2021) Vol. 112, pp. 107726-107726
Closed Access | Times Cited: 17
Negative selection in anomaly detection—A survey
Praneet Saurabh, Bhupendra Verma
Computer Science Review (2023) Vol. 48, pp. 100557-100557
Closed Access | Times Cited: 6
Praneet Saurabh, Bhupendra Verma
Computer Science Review (2023) Vol. 48, pp. 100557-100557
Closed Access | Times Cited: 6
Advances in spam detection for email spam, web spam, social network spam, and review spam: ML-based and nature-inspired-based techniques
Andronicus A. Akinyelu
Journal of Computer Security (2021), pp. 1-57
Closed Access | Times Cited: 15
Andronicus A. Akinyelu
Journal of Computer Security (2021), pp. 1-57
Closed Access | Times Cited: 15
Hybrid momentum accelerated bat algorithm with GWO based optimization approach for spam classification
Pradip Dhal, Chandrashekhar Azad
Multimedia Tools and Applications (2023) Vol. 83, Iss. 9, pp. 26929-26969
Closed Access | Times Cited: 5
Pradip Dhal, Chandrashekhar Azad
Multimedia Tools and Applications (2023) Vol. 83, Iss. 9, pp. 26929-26969
Closed Access | Times Cited: 5
Towards a Hybrid Immune Algorithm Based on Danger Theory for Database Security
Wael Said, Ayman Mohamed Mostafa
IEEE Access (2020) Vol. 8, pp. 145332-145362
Open Access | Times Cited: 14
Wael Said, Ayman Mohamed Mostafa
IEEE Access (2020) Vol. 8, pp. 145332-145362
Open Access | Times Cited: 14
An improved real-valued negative selection algorithm based on the constant detector for anomaly detection
Dong Li, Xin Sun, Furong Gao, et al.
Journal of Intelligent & Fuzzy Systems (2021) Vol. 40, Iss. 5, pp. 8793-8806
Closed Access | Times Cited: 11
Dong Li, Xin Sun, Furong Gao, et al.
Journal of Intelligent & Fuzzy Systems (2021) Vol. 40, Iss. 5, pp. 8793-8806
Closed Access | Times Cited: 11
Enhancement of email spam detection using improved deep learning algorithms for cyber security
Kadam Vikas Samarthrao, Vandana Rohokale
Journal of Computer Security (2021) Vol. 30, Iss. 2, pp. 231-264
Closed Access | Times Cited: 11
Kadam Vikas Samarthrao, Vandana Rohokale
Journal of Computer Security (2021) Vol. 30, Iss. 2, pp. 231-264
Closed Access | Times Cited: 11
Smart material to build mail spam filtering technique using Naive Bayes and MRF methodologies
S. Jancy Sickory Daisy, A. Rijuvana Begum
Materials Today Proceedings (2021) Vol. 47, pp. 446-452
Closed Access | Times Cited: 7
S. Jancy Sickory Daisy, A. Rijuvana Begum
Materials Today Proceedings (2021) Vol. 47, pp. 446-452
Closed Access | Times Cited: 7
A Relation B-cell Network used for data identification and fault diagnosis
Hongli Zhang, Haihua Xiao, Shulin Liu, et al.
Applied Soft Computing (2021) Vol. 113, pp. 107921-107921
Closed Access | Times Cited: 7
Hongli Zhang, Haihua Xiao, Shulin Liu, et al.
Applied Soft Computing (2021) Vol. 113, pp. 107921-107921
Closed Access | Times Cited: 7
Preventing Cloud Network from Spamming Attacks Using Cloudflare and KNN
Muhammad Nadeem, Ali Arshad, Saman Riaz, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 74, Iss. 2, pp. 2641-2659
Open Access | Times Cited: 5
Muhammad Nadeem, Ali Arshad, Saman Riaz, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 74, Iss. 2, pp. 2641-2659
Open Access | Times Cited: 5
A Novel Hybrid Approach for Email Spam Detection based on Scatter Search Algorithm and K-Nearest Neighbors
Samira Amjad, Farhad Soleimanian Gharehchopogh
DOAJ (DOAJ: Directory of Open Access Journals) (2019)
Closed Access | Times Cited: 7
Samira Amjad, Farhad Soleimanian Gharehchopogh
DOAJ (DOAJ: Directory of Open Access Journals) (2019)
Closed Access | Times Cited: 7
Combine labeled and unlabeled data for immune detector training with label propagation
Wen Chen, Wang Chang-zhi
Knowledge-Based Systems (2021) Vol. 236, pp. 107661-107661
Closed Access | Times Cited: 6
Wen Chen, Wang Chang-zhi
Knowledge-Based Systems (2021) Vol. 236, pp. 107661-107661
Closed Access | Times Cited: 6
A survey of intrusion detection techniques based on negative selection algorithm
Kuldeep Singh, Lakhwinder Kaur, Raman Maini
International Journal of Systems Assurance Engineering and Management (2021) Vol. 13, Iss. S1, pp. 175-185
Closed Access | Times Cited: 6
Kuldeep Singh, Lakhwinder Kaur, Raman Maini
International Journal of Systems Assurance Engineering and Management (2021) Vol. 13, Iss. S1, pp. 175-185
Closed Access | Times Cited: 6