
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Feature Selection of Denial-of-Service Attacks Using Entropy and Granular Computing
Suleman Khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, et al.
Arabian Journal for Science and Engineering (2017) Vol. 43, Iss. 2, pp. 499-508
Closed Access | Times Cited: 53
Suleman Khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, et al.
Arabian Journal for Science and Engineering (2017) Vol. 43, Iss. 2, pp. 499-508
Closed Access | Times Cited: 53
Showing 1-25 of 53 citing articles:
A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions
Ankit Thakkar, Ritika Lohiya
Artificial Intelligence Review (2021) Vol. 55, Iss. 1, pp. 453-563
Closed Access | Times Cited: 174
Ankit Thakkar, Ritika Lohiya
Artificial Intelligence Review (2021) Vol. 55, Iss. 1, pp. 453-563
Closed Access | Times Cited: 174
Comparative Analysis of Intrusion Detection Systems and Machine Learning-Based Model Analysis Through Decision Tree
Zahedi Azam, Md. Motaharul Islam, Mohammad Nurul Huda
IEEE Access (2023) Vol. 11, pp. 80348-80391
Open Access | Times Cited: 63
Zahedi Azam, Md. Motaharul Islam, Mohammad Nurul Huda
IEEE Access (2023) Vol. 11, pp. 80348-80391
Open Access | Times Cited: 63
Deep CNN and geometric features-based gastrointestinal tract diseases detection and classification from wireless capsule endoscopy images
Muhammad Sharif, Muhammad Attique Khan, Muhammad Rashid, et al.
Journal of Experimental & Theoretical Artificial Intelligence (2019) Vol. 33, Iss. 4, pp. 577-599
Closed Access | Times Cited: 133
Muhammad Sharif, Muhammad Attique Khan, Muhammad Rashid, et al.
Journal of Experimental & Theoretical Artificial Intelligence (2019) Vol. 33, Iss. 4, pp. 577-599
Closed Access | Times Cited: 133
A survey on security issues in services communication of Microservices‐enabled fog applications
Dongjin Yu, Yike Jin, Yuqun Zhang, et al.
Concurrency and Computation Practice and Experience (2018) Vol. 31, Iss. 22
Closed Access | Times Cited: 124
Dongjin Yu, Yike Jin, Yuqun Zhang, et al.
Concurrency and Computation Practice and Experience (2018) Vol. 31, Iss. 22
Closed Access | Times Cited: 124
RETRACTED ARTICLE: Invariant packet feature with network conditions for efficient low rate attack detection in multimedia networks for improved QoS
M. Suchithra, M. Baskar, J. Ramkumar, et al.
Journal of Ambient Intelligence and Humanized Computing (2020) Vol. 12, Iss. 5, pp. 5471-5477
Closed Access | Times Cited: 95
M. Suchithra, M. Baskar, J. Ramkumar, et al.
Journal of Ambient Intelligence and Humanized Computing (2020) Vol. 12, Iss. 5, pp. 5471-5477
Closed Access | Times Cited: 95
DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation
Muhammad Aamir, Syed Mustafa Ali Zaidi
International Journal of Information Security (2019) Vol. 18, Iss. 6, pp. 761-785
Closed Access | Times Cited: 76
Muhammad Aamir, Syed Mustafa Ali Zaidi
International Journal of Information Security (2019) Vol. 18, Iss. 6, pp. 761-785
Closed Access | Times Cited: 76
A new intelligent multilayer framework for insider threat detection
Mohammed Nasser Al‐Mhiqani, Rabiah Ahmad, Zaheera Zainal Abidin, et al.
Computers & Electrical Engineering (2021) Vol. 97, pp. 107597-107597
Closed Access | Times Cited: 61
Mohammed Nasser Al‐Mhiqani, Rabiah Ahmad, Zaheera Zainal Abidin, et al.
Computers & Electrical Engineering (2021) Vol. 97, pp. 107597-107597
Closed Access | Times Cited: 61
Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management
Ahmad Firdaus, Nor Badrul Anuar, Mohd Faizal Ab Razak, et al.
Journal of Medical Systems (2018) Vol. 42, Iss. 6
Closed Access | Times Cited: 70
Ahmad Firdaus, Nor Badrul Anuar, Mohd Faizal Ab Razak, et al.
Journal of Medical Systems (2018) Vol. 42, Iss. 6
Closed Access | Times Cited: 70
DDoS attack detection in smart grid network using reconstructive machine learning models
Sardar Shan Ali Naqvi, Yuancheng Li, Muhammad Uzair
PeerJ Computer Science (2024) Vol. 10, pp. e1784-e1784
Open Access | Times Cited: 5
Sardar Shan Ali Naqvi, Yuancheng Li, Muhammad Uzair
PeerJ Computer Science (2024) Vol. 10, pp. e1784-e1784
Open Access | Times Cited: 5
Low-Rate DoS Attack Detection Using PSD Based Entropy and Machine Learning
Naiji Zhang, Fehmi Jaafar, Yasir Malik
(2019), pp. 59-62
Closed Access | Times Cited: 43
Naiji Zhang, Fehmi Jaafar, Yasir Malik
(2019), pp. 59-62
Closed Access | Times Cited: 43
Towards fuzzy anomaly detection-based security: a comprehensive review
Mohammad Masdari, Hemn Khezri
Fuzzy Optimization and Decision Making (2020) Vol. 20, Iss. 1, pp. 1-49
Closed Access | Times Cited: 33
Mohammad Masdari, Hemn Khezri
Fuzzy Optimization and Decision Making (2020) Vol. 20, Iss. 1, pp. 1-49
Closed Access | Times Cited: 33
A multi-measure feature selection algorithm for efficacious intrusion detection
Vitali Herrera-Semenets, Lázaro Bustio-Martínez, Raudel Hernández-León, et al.
Knowledge-Based Systems (2021) Vol. 227, pp. 107264-107264
Closed Access | Times Cited: 28
Vitali Herrera-Semenets, Lázaro Bustio-Martínez, Raudel Hernández-León, et al.
Knowledge-Based Systems (2021) Vol. 227, pp. 107264-107264
Closed Access | Times Cited: 28
Medical diagnoses using three-way fuzzy concept lattice and their Euclidean distance
Prem Kumar Singh
Computational and Applied Mathematics (2017) Vol. 37, Iss. 3, pp. 3283-3306
Closed Access | Times Cited: 32
Prem Kumar Singh
Computational and Applied Mathematics (2017) Vol. 37, Iss. 3, pp. 3283-3306
Closed Access | Times Cited: 32
Edge Computing Intelligence Using Robust Feature Selection for Network Traffic Classification in Internet-of-Things
Bushra Mohammed, Mosab Hamdan, Joseph Stephen Bassi, et al.
IEEE Access (2020) Vol. 8, pp. 224059-224070
Open Access | Times Cited: 22
Bushra Mohammed, Mosab Hamdan, Joseph Stephen Bassi, et al.
IEEE Access (2020) Vol. 8, pp. 224059-224070
Open Access | Times Cited: 22
Entropy-Based Approach to Detect DDoS Attacks on Software Defined Networking Controller
Mohammad Adnan Aladaileh, Mohammed Anbar, Iznan H. Hasbullah, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2021) Vol. 69, Iss. 1, pp. 373-391
Open Access | Times Cited: 18
Mohammad Adnan Aladaileh, Mohammed Anbar, Iznan H. Hasbullah, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2021) Vol. 69, Iss. 1, pp. 373-391
Open Access | Times Cited: 18
RAD: A Statistical Mechanism Based on Behavioral Analysis for DDoS Attack Countermeasure
Mosayeb Hajimaghsoodi, Rasool Jalili
IEEE Transactions on Information Forensics and Security (2022) Vol. 17, pp. 2732-2745
Closed Access | Times Cited: 13
Mosayeb Hajimaghsoodi, Rasool Jalili
IEEE Transactions on Information Forensics and Security (2022) Vol. 17, pp. 2732-2745
Closed Access | Times Cited: 13
Similar Vague Concepts Selection Using Their Euclidean Distance at Different Granulation
Prem Kumar Singh
Cognitive Computation (2017) Vol. 10, Iss. 2, pp. 228-241
Closed Access | Times Cited: 23
Prem Kumar Singh
Cognitive Computation (2017) Vol. 10, Iss. 2, pp. 228-241
Closed Access | Times Cited: 23
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Ali Safaa Sadiq, Basem Y. Alkazemi, Seyedali Mirjalili, et al.
IEEE Access (2018) Vol. 6, pp. 29041-29053
Open Access | Times Cited: 23
Ali Safaa Sadiq, Basem Y. Alkazemi, Seyedali Mirjalili, et al.
IEEE Access (2018) Vol. 6, pp. 29041-29053
Open Access | Times Cited: 23
Bipolar fuzzy concept learning using next neighbor and Euclidean distance
Prem Kumar Singh
Soft Computing (2018) Vol. 23, Iss. 12, pp. 4503-4520
Closed Access | Times Cited: 19
Prem Kumar Singh
Soft Computing (2018) Vol. 23, Iss. 12, pp. 4503-4520
Closed Access | Times Cited: 19
Bipolar $$\delta$$δ-equal complex fuzzy concept lattice with its application
Prem Kumar Singh
Neural Computing and Applications (2019) Vol. 32, Iss. 7, pp. 2405-2422
Closed Access | Times Cited: 18
Prem Kumar Singh
Neural Computing and Applications (2019) Vol. 32, Iss. 7, pp. 2405-2422
Closed Access | Times Cited: 18
Concept Learning Using Vague Concept Lattice
Prem Kumar Singh
Neural Processing Letters (2017) Vol. 48, Iss. 1, pp. 31-52
Closed Access | Times Cited: 17
Prem Kumar Singh
Neural Processing Letters (2017) Vol. 48, Iss. 1, pp. 31-52
Closed Access | Times Cited: 17
Classification Spam Email with Elimination of Unsuitable Features with Hybrid of GA-Naive Bayes
Omid Mahdi Ebadati E., Farzaneh Ahmadzadeh
Journal of Information & Knowledge Management (2019) Vol. 18, Iss. 01, pp. 1950008-1950008
Open Access | Times Cited: 16
Omid Mahdi Ebadati E., Farzaneh Ahmadzadeh
Journal of Information & Knowledge Management (2019) Vol. 18, Iss. 01, pp. 1950008-1950008
Open Access | Times Cited: 16
Improved Feature Selection and Stream Traffic Classification Based on Machine Learning in Software-Defined Networks
Arwa M. Eldhai, Mosab Hamdan, Ahmed Abdelaziz, et al.
IEEE Access (2024) Vol. 12, pp. 34141-34159
Open Access | Times Cited: 1
Arwa M. Eldhai, Mosab Hamdan, Ahmed Abdelaziz, et al.
IEEE Access (2024) Vol. 12, pp. 34141-34159
Open Access | Times Cited: 1
A self-supervised anomaly detection algorithm with interpretability
Zhichao Wu, Xin Yang, Xiaopeng Wei, et al.
Expert Systems with Applications (2023) Vol. 237, pp. 121539-121539
Closed Access | Times Cited: 4
Zhichao Wu, Xin Yang, Xiaopeng Wei, et al.
Expert Systems with Applications (2023) Vol. 237, pp. 121539-121539
Closed Access | Times Cited: 4
The Application of a Double CUSUM Algorithm in Industrial Data Stream Anomaly Detection
Guang Li, Jie Wang, Jing Liang, et al.
Symmetry (2018) Vol. 10, Iss. 7, pp. 264-264
Open Access | Times Cited: 10
Guang Li, Jie Wang, Jing Liang, et al.
Symmetry (2018) Vol. 10, Iss. 7, pp. 264-264
Open Access | Times Cited: 10