OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A feature selection algorithm for intrusion detection system based on Pigeon Inspired Optimizer
Hadeel Alazzam, Ahmad Sharieh, Khair Eddin Sabri
Expert Systems with Applications (2020) Vol. 148, pp. 113249-113249
Closed Access | Times Cited: 320

Showing 1-25 of 320 citing articles:

Performance Analysis of Intrusion Detection Systems Using a Feature Selection Method on the UNSW-NB15 Dataset
Sydney Mambwe Kasongo, Yanxia Sun
Journal Of Big Data (2020) Vol. 7, Iss. 1
Open Access | Times Cited: 365

A bidirectional LSTM deep learning approach for intrusion detection
Yakubu Imrana, Yanping Xiang, Liaqat Ali, et al.
Expert Systems with Applications (2021) Vol. 185, pp. 115524-115524
Closed Access | Times Cited: 250

A machine learning-based intrusion detection for detecting internet of things network attacks
Yakub Kayode Saheed, Aremu Idris Abiodun, Sanjay Misra, et al.
Alexandria Engineering Journal (2022) Vol. 61, Iss. 12, pp. 9395-9409
Open Access | Times Cited: 197

IGRF-RFE: a hybrid feature selection method for MLP-based network intrusion detection on UNSW-NB15 dataset
Yuhua Yin, Julian Jang‐Jaccard, Wen Xu, et al.
Journal Of Big Data (2023) Vol. 10, Iss. 1
Open Access | Times Cited: 172

Dispersed foraging slime mould algorithm: Continuous and binary variants for global optimization and wrapper-based feature selection
Jiao Hu, Wenyong Gui, Ali Asghar Heidari, et al.
Knowledge-Based Systems (2021) Vol. 237, pp. 107761-107761
Closed Access | Times Cited: 164

A Hyper Learning Binary Dragonfly Algorithm for Feature Selection: A COVID-19 Case Study
Jingwei Too, Seyedali Mirjalili
Knowledge-Based Systems (2020) Vol. 212, pp. 106553-106553
Closed Access | Times Cited: 152

Dual-IDS: A bagging-based gradient boosting decision tree model for network anomaly intrusion detection system
Maya Hilda Lestari Louk, Bayu Adhi Tama
Expert Systems with Applications (2022) Vol. 213, pp. 119030-119030
Closed Access | Times Cited: 131

An effective genetic algorithm-based feature selection method for intrusion detection systems
Zahid Halim, Muhammad Nadeem Yousaf, Muhammad Waqas, et al.
Computers & Security (2021) Vol. 110, pp. 102448-102448
Closed Access | Times Cited: 109

A tree-based stacking ensemble technique with feature selection for network intrusion detection
Md. Mamunur Rashid, Joarder Kamruzzaman, Tasadduq Imam, et al.
Applied Intelligence (2022) Vol. 52, Iss. 9, pp. 9768-9781
Open Access | Times Cited: 105

AS-IDS: Anomaly and Signature Based IDS for the Internet of Things
Yazan Otoum, Amiya Nayak
Journal of Network and Systems Management (2021) Vol. 29, Iss. 3
Closed Access | Times Cited: 102

A review of recent approaches on wrapper feature selection for intrusion detection
Javier Maldonado, María Cristina Riff, Bertrand Neveu
Expert Systems with Applications (2022) Vol. 198, pp. 116822-116822
Closed Access | Times Cited: 98

A Feature Selection Based on the Farmland Fertility Algorithm for Improved Intrusion Detection Systems
Touraj Sattari Naseri, Farhad Soleimanian Gharehchopogh
Journal of Network and Systems Management (2022) Vol. 30, Iss. 3
Closed Access | Times Cited: 90

A Modified Grey Wolf Optimization Algorithm for an Intrusion Detection System
Abdullah Alzaqebah, Ibrahim Aljarah, Omar S. Al-Kadi, et al.
Mathematics (2022) Vol. 10, Iss. 6, pp. 999-999
Open Access | Times Cited: 84

Multi-label feature selection based on label correlations and feature redundancy
Yuling Fan, Baihua Chen, Weiqin Huang, et al.
Knowledge-Based Systems (2022) Vol. 241, pp. 108256-108256
Closed Access | Times Cited: 69

A systematic literature review for network intrusion detection system (IDS)
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed
International Journal of Information Security (2023) Vol. 22, Iss. 5, pp. 1125-1162
Closed Access | Times Cited: 64

IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic
Farhan Ullah, Shamsher Ullah, Gautam Srivastava, et al.
Digital Communications and Networks (2023) Vol. 10, Iss. 1, pp. 190-204
Open Access | Times Cited: 62

Intrusion detection approach for cloud and IoT environments using deep learning and Capuchin Search Algorithm
Mohamed Abd Elaziz, Mohammed A. A. Al‐qaness, Abdelghani Dahou, et al.
Advances in Engineering Software (2023) Vol. 176, pp. 103402-103402
Closed Access | Times Cited: 57

Anomaly-based intrusion detection system in the Internet of Things using a convolutional neural network and multi-objective enhanced Capuchin Search Algorithm
Hossein Asgharzadeh, Ali Ghaffari, Mohammad Masdari, et al.
Journal of Parallel and Distributed Computing (2023) Vol. 175, pp. 1-21
Closed Access | Times Cited: 57

Recursive Feature Elimination with Cross-Validation with Decision Tree: Feature Selection Method for Machine Learning-Based Intrusion Detection Systems
Mohammed Awad, F.M.A. Salam
Journal of Sensor and Actuator Networks (2023) Vol. 12, Iss. 5, pp. 67-67
Open Access | Times Cited: 43

A metaheuristic-based ensemble feature selection framework for cyber threat detection in IoT-enabled networks
Arun Kumar Dey, Govind P. Gupta, Satya Prakash Sahu
Decision Analytics Journal (2023) Vol. 7, pp. 100206-100206
Open Access | Times Cited: 40

Dugat-LSTM: Deep learning based network intrusion detection system using chaotic optimization strategy
Ramkumar Devendiran, Anil V. Turukmane
Expert Systems with Applications (2024) Vol. 245, pp. 123027-123027
Closed Access | Times Cited: 31

Optimizing IoT intrusion detection system: feature selection versus feature extraction in machine learning
Jing Li, Mohd Shahizan Othman, Hewan Chen, et al.
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 29

Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions towards automation, intelligence and transparent cybersecurity modeling for critical infrastructures
Iqbal H. Sarker, Helge Janicke, Mohamed Amine Ferrag, et al.
Internet of Things (2024) Vol. 25, pp. 101110-101110
Open Access | Times Cited: 16

Intrusion Detection System
Amit Singh, Jay Prakash, Gaurav Kumar, et al.
Journal of Database Management (2024) Vol. 35, Iss. 1, pp. 1-25
Open Access | Times Cited: 15

Page 1 - Next Page

Scroll to top