OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

An effect of chaos grasshopper optimization algorithm for protection of network infrastructure
Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi
Computer Networks (2020) Vol. 176, pp. 107251-107251
Closed Access | Times Cited: 49

Showing 1-25 of 49 citing articles:

Grasshopper Optimization Algorithm: Theory, Variants, and Applications
Yassine Meraihi, Asma Benmessaoud Gabis, Seyedali Mirjalili, et al.
IEEE Access (2021) Vol. 9, pp. 50001-50024
Open Access | Times Cited: 228

Swarm Intelligence inspired Intrusion Detection Systems — A systematic literature review
Muhammad Nasir, Salman A. Khan, Muhammad Mubashir Khan, et al.
Computer Networks (2022) Vol. 205, pp. 108708-108708
Closed Access | Times Cited: 57

Development and application of an evolutionary deep learning framework of LSTM based on improved grasshopper optimization algorithm for short-term load forecasting
Haowen Hu, Xin Xia, Yuanlin Luo, et al.
Journal of Building Engineering (2022) Vol. 57, pp. 104975-104975
Closed Access | Times Cited: 54

AI/ML for Network Security
Arthur Selle Jacobs, Roman Beltiukov, Walter Willinger, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2022), pp. 1537-1551
Closed Access | Times Cited: 48

Hybridization of Grasshopper Optimization Algorithm With Genetic Algorithm for Solving System of Non-Linear Equations
M.A. El‐Shorbagy, Adel M. El-Refaey
IEEE Access (2020) Vol. 8, pp. 220944-220961
Open Access | Times Cited: 51

An Efficient Chaotic Gradient-Based Optimizer for Feature Selection
Diaa Salama Abd Elminaam, Shimaa Abdallah Ibrahim, Essam H. Houssein, et al.
IEEE Access (2022) Vol. 10, pp. 9271-9286
Open Access | Times Cited: 29

A Systematic Review on Hybrid Intrusion Detection System
Elijah M. Maseno, Zenghui Wang, Hongyan Xing
Security and Communication Networks (2022) Vol. 2022, pp. 1-23
Open Access | Times Cited: 27

Improved multi-objective grasshopper optimization algorithm and application in capacity configuration of urban rail hybrid energy storage systems
Xin Wang, Xiyang Zhang, Bin Qin, et al.
Journal of Energy Storage (2023) Vol. 72, pp. 108363-108363
Closed Access | Times Cited: 16

Intrusion detection in internet of things using improved binary golden jackal optimization algorithm and LSTM
Amir Vafid Hanafi, Ali Ghaffari, Hesam Rezaei, et al.
Cluster Computing (2023) Vol. 27, Iss. 3, pp. 2673-2690
Closed Access | Times Cited: 16

Enhancing Network Intrusion Detection Through the Application of the Dung Beetle Optimized Fusion Model
Yue Li, Jiale Zhang, Yiting Yan, et al.
IEEE Access (2024) Vol. 12, pp. 9483-9496
Open Access | Times Cited: 5

Chaos-enhanced metaheuristics: classification, comparison, and convergence analysis
Abdelhadi Limane, Farouq Zitouni, Saad Harous, et al.
Complex & Intelligent Systems (2025) Vol. 11, Iss. 3
Open Access

Towards Data and Computation Offloading in Mobile Cloud Computing: Taxonomy, Overview, and Future Directions
Amir Masoud Rahmani, Mokhtar Mohammadi, Adil Hussein Mohammed, et al.
Wireless Personal Communications (2021) Vol. 119, Iss. 1, pp. 147-185
Closed Access | Times Cited: 33

A Review on Feature Selection and Ensemble Techniques for Intrusion Detection System
Majid Torabi, Nur Izura Udzir, Mohd Taufik Abdullah, et al.
International Journal of Advanced Computer Science and Applications (2021) Vol. 12, Iss. 5
Open Access | Times Cited: 32

Review of bio-inspired optimization applications in renewable-powered smart grids: Emerging population-based metaheuristics
Cristina Bianca Pop, Tudor Cioara, Ionuț Anghel, et al.
Energy Reports (2022) Vol. 8, pp. 11769-11798
Open Access | Times Cited: 26

Detection of anomaly intrusion utilizing self-adaptive grasshopper optimization algorithm
Alok Kumar Shukla
Neural Computing and Applications (2020) Vol. 33, Iss. 13, pp. 7541-7561
Closed Access | Times Cited: 33

Salinity intrusion prediction using remote sensing and machine learning in data-limited regions: A case study in Vietnam's Mekong Delta
Tien Giang Nguyen, Ngoc Anh Tran, Phương Lan Vu, et al.
Geoderma Regional (2021) Vol. 27, pp. e00424-e00424
Closed Access | Times Cited: 31

CoFA for QoS based secure communication using adaptive chaos dynamical system in fog-integrated cloud
Eht E Sham, Deo Prakash Vidyarthi
Digital Signal Processing (2022) Vol. 126, pp. 103523-103523
Closed Access | Times Cited: 21

An Effective Ensemble Automatic Feature Selection Method for Network Intrusion Detection
Yang Zhang, Hongpo Zhang, Bo Zhang
Information (2022) Vol. 13, Iss. 7, pp. 314-314
Open Access | Times Cited: 19

Metaheuristic algorithms in network intrusion detection
Ibrahim Hayatu Hassan, Mohammed Abdullahi, Mansur Aliyu Masama
Elsevier eBooks (2023), pp. 95-129
Closed Access | Times Cited: 6

Leveraging three-tier deep learning model for environmental cleaner plants production
Zahraa Tarek, Mohamed Elhoseny, Mohamemd I. Alghamdi, et al.
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 6

Multi-objective grasshopper optimization algorithm based on multi-group and co-evolution
Chao Wang, Jian Li, Haidi Rao, et al.
Mathematical Biosciences & Engineering (2021) Vol. 18, Iss. 3, pp. 2527-2561
Open Access | Times Cited: 14

Challenges and Opportunities of Autonomous Cyber Defence (ACyD) Against Cyber Attacks
Michael Oreyomi, Hamid Jahankhani
Advanced sciences and technologies for security applications (2022), pp. 239-269
Closed Access | Times Cited: 10

Multi-objective segmentation approach for bone age assessment using parameter tuning-based U-net architecture
Sonal Deshmukh, Arti Khaparde
Multimedia Tools and Applications (2022) Vol. 81, Iss. 5, pp. 6755-6800
Closed Access | Times Cited: 9

An enhanced strategy for minority class detection using bidirectional GRU employing penalized cross-entropy and self-attention mechanisms for imbalance network traffic
Asima Akber Abbasi, Aneela Zameer, Muhammad Asif Zahoor Raja
The European Physical Journal Plus (2024) Vol. 139, Iss. 6
Closed Access | Times Cited: 1

Algorithm Initialization: Categories and Assessment
Abdul Halim, Swagatam Das, Idris Ismail
Emergence, complexity and computation (2024), pp. 1-100
Closed Access | Times Cited: 1

Page 1 - Next Page

Scroll to top