
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A review of recent approaches on wrapper feature selection for intrusion detection
Javier Maldonado, María Cristina Riff, Bertrand Neveu
Expert Systems with Applications (2022) Vol. 198, pp. 116822-116822
Closed Access | Times Cited: 98
Javier Maldonado, María Cristina Riff, Bertrand Neveu
Expert Systems with Applications (2022) Vol. 198, pp. 116822-116822
Closed Access | Times Cited: 98
Showing 1-25 of 98 citing articles:
CNN-CNN: Dual Convolutional Neural Network Approach for Feature Selection and Attack Detection on Internet of Things Networks
Basim Ahmad Alabsi, Mohammed Anbar, Shaza Dawood Ahmed Rihan
Sensors (2023) Vol. 23, Iss. 14, pp. 6507-6507
Open Access | Times Cited: 41
Basim Ahmad Alabsi, Mohammed Anbar, Shaza Dawood Ahmed Rihan
Sensors (2023) Vol. 23, Iss. 14, pp. 6507-6507
Open Access | Times Cited: 41
Exploring Feature Selection With Limited Labels: A Comprehensive Survey of Semi-Supervised and Unsupervised Approaches
Guojie Li, Zhiwen Yu, Kaixiang Yang, et al.
IEEE Transactions on Knowledge and Data Engineering (2024) Vol. 36, Iss. 11, pp. 6124-6144
Closed Access | Times Cited: 17
Guojie Li, Zhiwen Yu, Kaixiang Yang, et al.
IEEE Transactions on Knowledge and Data Engineering (2024) Vol. 36, Iss. 11, pp. 6124-6144
Closed Access | Times Cited: 17
Machine learning model (RG-DMML) and ensemble algorithm for prediction of students’ retention and graduation in education
Kingsley Okoye, Julius T. Nganji, José Escamilla, et al.
Computers and Education Artificial Intelligence (2024) Vol. 6, pp. 100205-100205
Open Access | Times Cited: 14
Kingsley Okoye, Julius T. Nganji, José Escamilla, et al.
Computers and Education Artificial Intelligence (2024) Vol. 6, pp. 100205-100205
Open Access | Times Cited: 14
Utilizing Feature Selection Techniques for AI-Driven Tumor Subtype Classification: Enhancing Precision in Cancer Diagnostics
Jihan Wang, Zhengxiang Zhang, Yangyang Wang
Biomolecules (2025) Vol. 15, Iss. 1, pp. 81-81
Open Access | Times Cited: 1
Jihan Wang, Zhengxiang Zhang, Yangyang Wang
Biomolecules (2025) Vol. 15, Iss. 1, pp. 81-81
Open Access | Times Cited: 1
Feature Selection using binary horse herd optimization algorithm with lightGBA Ensemble Classification in Microarray Data
R.S. Preyanka Lakshme, S. Ganesh Kumar
Knowledge-Based Systems (2025), pp. 113168-113168
Closed Access | Times Cited: 1
R.S. Preyanka Lakshme, S. Ganesh Kumar
Knowledge-Based Systems (2025), pp. 113168-113168
Closed Access | Times Cited: 1
A multilayer stacking method base on RFE-SHAP feature selection strategy for recognition of driver’s mental load and emotional state
Jing Huang, Peng Yang, Lin Hu
Expert Systems with Applications (2023) Vol. 238, pp. 121729-121729
Closed Access | Times Cited: 21
Jing Huang, Peng Yang, Lin Hu
Expert Systems with Applications (2023) Vol. 238, pp. 121729-121729
Closed Access | Times Cited: 21
Real-time fusion multi-tier DNN-based collaborative IDPS with complementary features for secure UAV-enabled 6G networks
Hassan Jalil Hadi, Yue Cao, Sifan Li, et al.
Expert Systems with Applications (2024) Vol. 252, pp. 124215-124215
Closed Access | Times Cited: 10
Hassan Jalil Hadi, Yue Cao, Sifan Li, et al.
Expert Systems with Applications (2024) Vol. 252, pp. 124215-124215
Closed Access | Times Cited: 10
A Novel Hybrid Feature Selection with Cascaded LSTM: Enhancing Security in IoT Networks
Karthic Sundaram, Yuvaraj Natarajan, Anitha Perumalsamy, et al.
Wireless Communications and Mobile Computing (2024) Vol. 2024, pp. 1-15
Open Access | Times Cited: 8
Karthic Sundaram, Yuvaraj Natarajan, Anitha Perumalsamy, et al.
Wireless Communications and Mobile Computing (2024) Vol. 2024, pp. 1-15
Open Access | Times Cited: 8
K-means and meta-heuristic algorithms for intrusion detection systems
Mahdieh Maazalahi, Soodeh Hosseini
Cluster Computing (2024) Vol. 27, Iss. 8, pp. 10377-10419
Closed Access | Times Cited: 8
Mahdieh Maazalahi, Soodeh Hosseini
Cluster Computing (2024) Vol. 27, Iss. 8, pp. 10377-10419
Closed Access | Times Cited: 8
Embodied greenhouse gas emissions of buildings—Machine learning approach for early stage prediction
S. Fenton, Adrian Munteanu, Klaas De Rycke, et al.
Building and Environment (2024) Vol. 257, pp. 111523-111523
Open Access | Times Cited: 7
S. Fenton, Adrian Munteanu, Klaas De Rycke, et al.
Building and Environment (2024) Vol. 257, pp. 111523-111523
Open Access | Times Cited: 7
Fast Genetic Algorithm for feature selection — A qualitative approximation approach
Mohammed Ghaith Altarabichi, Sławomir Nowaczyk, Sepideh Pashami, et al.
Expert Systems with Applications (2022) Vol. 211, pp. 118528-118528
Open Access | Times Cited: 36
Mohammed Ghaith Altarabichi, Sławomir Nowaczyk, Sepideh Pashami, et al.
Expert Systems with Applications (2022) Vol. 211, pp. 118528-118528
Open Access | Times Cited: 36
Identifying content unaware features influencing popularity of videos on YouTube: A study based on seven regions
Zahid Halim, Sajjad Hussain, Raja Hashim Ali
Expert Systems with Applications (2022) Vol. 206, pp. 117836-117836
Closed Access | Times Cited: 34
Zahid Halim, Sajjad Hussain, Raja Hashim Ali
Expert Systems with Applications (2022) Vol. 206, pp. 117836-117836
Closed Access | Times Cited: 34
Stochastic gradient descent classifier-based lightweight intrusion detection systems using the efficient feature subsets of datasets
Jahongir Azimjonov, Taehong Kim
Expert Systems with Applications (2023) Vol. 237, pp. 121493-121493
Closed Access | Times Cited: 21
Jahongir Azimjonov, Taehong Kim
Expert Systems with Applications (2023) Vol. 237, pp. 121493-121493
Closed Access | Times Cited: 21
Sin-Cos-bIAVOA: A new feature selection method based on improved African vulture optimization algorithm and a novel transfer function to DDoS attack detection
Zakieh Sharifian, Behrang Barekatain, Alfonso Ariza Quintana, et al.
Expert Systems with Applications (2023) Vol. 228, pp. 120404-120404
Closed Access | Times Cited: 20
Zakieh Sharifian, Behrang Barekatain, Alfonso Ariza Quintana, et al.
Expert Systems with Applications (2023) Vol. 228, pp. 120404-120404
Closed Access | Times Cited: 20
A feature selection based on genetic algorithm for intrusion detection of industrial control systems
Yushan Fang, Yu Yao, Xiaoli Lin, et al.
Computers & Security (2023) Vol. 139, pp. 103675-103675
Closed Access | Times Cited: 19
Yushan Fang, Yu Yao, Xiaoli Lin, et al.
Computers & Security (2023) Vol. 139, pp. 103675-103675
Closed Access | Times Cited: 19
Empowering precision medicine: AI-driven schizophrenia diagnosis via EEG signals: A comprehensive review from 2002–2023
Mahboobeh Jafari, Delaram Sadeghi, Afshin Shoeibi, et al.
Applied Intelligence (2023) Vol. 54, Iss. 1, pp. 35-79
Closed Access | Times Cited: 18
Mahboobeh Jafari, Delaram Sadeghi, Afshin Shoeibi, et al.
Applied Intelligence (2023) Vol. 54, Iss. 1, pp. 35-79
Closed Access | Times Cited: 18
Golden jackal optimization algorithm with deep learning assisted intrusion detection system for network security
Nojood O. Aljehane, Hanan Abdullah Mengash, Majdy M. Eltahir, et al.
Alexandria Engineering Journal (2023) Vol. 86, pp. 415-424
Open Access | Times Cited: 17
Nojood O. Aljehane, Hanan Abdullah Mengash, Majdy M. Eltahir, et al.
Alexandria Engineering Journal (2023) Vol. 86, pp. 415-424
Open Access | Times Cited: 17
Nature-based metaheuristic optimisation techniques for band selection in drone-based hyperspectral images for plant-level crop classification
Anagha S. Sarma, Rama Rao Nidamanuri
Stochastic Environmental Research and Risk Assessment (2025)
Closed Access
Anagha S. Sarma, Rama Rao Nidamanuri
Stochastic Environmental Research and Risk Assessment (2025)
Closed Access
Review of filtering based feature selection for Botnet detection in the Internet of Things
Mohamed Saied, Shawkat K. Guirguis, Magda M. Madbouly
Artificial Intelligence Review (2025) Vol. 58, Iss. 4
Open Access
Mohamed Saied, Shawkat K. Guirguis, Magda M. Madbouly
Artificial Intelligence Review (2025) Vol. 58, Iss. 4
Open Access
Binary Banyan Tree Growth Optimization: A Practical Approach to High-dimensional Feature Selection
Xian Wu, Minrui Fei, Wenju Zhou, et al.
Knowledge-Based Systems (2025), pp. 113252-113252
Closed Access
Xian Wu, Minrui Fei, Wenju Zhou, et al.
Knowledge-Based Systems (2025), pp. 113252-113252
Closed Access
A method for optimizing the layout of magnetic sensors in tokamaks based on improved minimal-redundancy-maximal-relevance criterion
Tingyu Li, Biao Shen, Dalong Chen, et al.
Measurement (2025), pp. 117172-117172
Closed Access
Tingyu Li, Biao Shen, Dalong Chen, et al.
Measurement (2025), pp. 117172-117172
Closed Access
A Hypernetwork-Based Feature Selection Method for EEG Classification
Dunmin Chen, Yu Tang, Zhiping Tan
International Journal of Cognitive Informatics and Natural Intelligence (2025) Vol. 19, Iss. 1, pp. 1-17
Open Access
Dunmin Chen, Yu Tang, Zhiping Tan
International Journal of Cognitive Informatics and Natural Intelligence (2025) Vol. 19, Iss. 1, pp. 1-17
Open Access
Partial multi-label feature selection based on label distribution learning
Yaojin Lin, Yulin Li, Shidong Lin, et al.
Pattern Recognition (2025) Vol. 164, pp. 111523-111523
Closed Access
Yaojin Lin, Yulin Li, Shidong Lin, et al.
Pattern Recognition (2025) Vol. 164, pp. 111523-111523
Closed Access
Robust stacking ensemble model for darknet traffic classification under adversarial settings
Hardhik Mohanty, Arousha Haghighian Roudsari, Arash Habibi Lashkari
Computers & Security (2022) Vol. 120, pp. 102830-102830
Closed Access | Times Cited: 24
Hardhik Mohanty, Arousha Haghighian Roudsari, Arash Habibi Lashkari
Computers & Security (2022) Vol. 120, pp. 102830-102830
Closed Access | Times Cited: 24
Importance analysis of decision making factors based on fuzzy decision trees
Elena Zaitseva, Jan Rabčan, Vitaly Levashenko, et al.
Applied Soft Computing (2023) Vol. 134, pp. 109988-109988
Closed Access | Times Cited: 13
Elena Zaitseva, Jan Rabčan, Vitaly Levashenko, et al.
Applied Soft Computing (2023) Vol. 134, pp. 109988-109988
Closed Access | Times Cited: 13