
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Archimedes Fire Hawk Optimization enabled feature selection with deep maxout for network intrusion detection
B. Selva Rani, S. Vairamuthu, Suresh Subramanian
Computers & Security (2024) Vol. 140, pp. 103751-103751
Closed Access | Times Cited: 8
B. Selva Rani, S. Vairamuthu, Suresh Subramanian
Computers & Security (2024) Vol. 140, pp. 103751-103751
Closed Access | Times Cited: 8
Showing 8 citing articles:
NIDS-Vis: Improving the generalized adversarial robustness of network intrusion detection system
Ke He, Dong Seong Kim, Muhammad Rizwan Asghar
Computers & Security (2024) Vol. 145, pp. 104028-104028
Open Access | Times Cited: 4
Ke He, Dong Seong Kim, Muhammad Rizwan Asghar
Computers & Security (2024) Vol. 145, pp. 104028-104028
Open Access | Times Cited: 4
Fire hawk optimizer adjusted PD-PI cascade controller for automatic generation control of IPS
M A Awal, Michael Robson Atim, Jimmy Nabende Wanzala, et al.
Electrical Engineering (2025)
Closed Access
M A Awal, Michael Robson Atim, Jimmy Nabende Wanzala, et al.
Electrical Engineering (2025)
Closed Access
IGSA-SAC: a novel approach for intrusion detection using improved gravitational search algorithm and soft actor-critic
Lizhong Jin, Ruzong Fan, Xiaoling Han, et al.
Frontiers in Computer Science (2025) Vol. 7
Open Access
Lizhong Jin, Ruzong Fan, Xiaoling Han, et al.
Frontiers in Computer Science (2025) Vol. 7
Open Access
An advanced attack categorization in NIDS using enhanced deep learning based EOptResfEANet methodology with hybrid feature extraction
Vinolia Alexander Moudiappa, K. R. Nataraj, V.N. Rajavarman
Cluster Computing (2025) Vol. 28, Iss. 5
Closed Access
Vinolia Alexander Moudiappa, K. R. Nataraj, V.N. Rajavarman
Cluster Computing (2025) Vol. 28, Iss. 5
Closed Access
Feature Selection Method for Network Intrusion based on Hybrid Meta-Heuristic Dynamic Optimization Algorithm
Xiu Gong, Shuicheng Yan, Yi Zhang, et al.
Computers & Security (2025) Vol. 156, pp. 104512-104512
Closed Access
Xiu Gong, Shuicheng Yan, Yi Zhang, et al.
Computers & Security (2025) Vol. 156, pp. 104512-104512
Closed Access
Edge-featured multi-hop attention graph neural network for intrusion detection system
Ping Deng, Yong Huang
Computers & Security (2024) Vol. 148, pp. 104132-104132
Closed Access | Times Cited: 3
Ping Deng, Yong Huang
Computers & Security (2024) Vol. 148, pp. 104132-104132
Closed Access | Times Cited: 3
Res2Net-ERNN: deep learning based cyberattack classification in software defined network
Mamatha Maddu, Yamarthi Narasimha Rao
Cluster Computing (2024) Vol. 27, Iss. 9, pp. 12821-12839
Closed Access | Times Cited: 1
Mamatha Maddu, Yamarthi Narasimha Rao
Cluster Computing (2024) Vol. 27, Iss. 9, pp. 12821-12839
Closed Access | Times Cited: 1
MFT: A novel memory flow transformer efficient intrusion detection method
Xuefeng Jiang, Liuquan Xu, Yu Li, et al.
Computers & Security (2024) Vol. 148, pp. 104174-104174
Closed Access | Times Cited: 1
Xuefeng Jiang, Liuquan Xu, Yu Li, et al.
Computers & Security (2024) Vol. 148, pp. 104174-104174
Closed Access | Times Cited: 1