OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A new intrusion detection system based on Moth–Flame Optimizer algorithm
Moutaz Alazab, Ruba Abu Khurma, Albara Awajan, et al.
Expert Systems with Applications (2022) Vol. 210, pp. 118439-118439
Closed Access | Times Cited: 45

Showing 1-25 of 45 citing articles:

A Novel Deep Learning-Based Intrusion Detection System for IoT Networks
Albara Awajan
Computers (2023) Vol. 12, Iss. 2, pp. 34-34
Open Access | Times Cited: 114

Intrusion detection system for large-scale IoT NetFlow networks using machine learning with modified Arithmetic Optimization Algorithm
F.M.A. Salam, Sharif Naser Makhadmeh, Mohammed Awad, et al.
Internet of Things (2023) Vol. 22, pp. 100819-100819
Closed Access | Times Cited: 48

Enhancing Intrusion Detection Systems for IoT and Cloud Environments Using a Growth Optimizer Algorithm and Conventional Neural Networks
Abdulaziz Fatani, Abdelghani Dahou, Mohamed Abd Elaziz, et al.
Sensors (2023) Vol. 23, Iss. 9, pp. 4430-4430
Open Access | Times Cited: 42

Optimized Machine Learning-Based Intrusion Detection System for Fog and Edge Computing Environment
Omar A. Alzubi, Jafar A. Alzubi, Moutaz Alazab, et al.
Electronics (2022) Vol. 11, Iss. 19, pp. 3007-3007
Open Access | Times Cited: 63

Improved discrete salp swarm algorithm using exploration and exploitation techniques for feature selection in intrusion detection systems
Malek Barhoush, Bilal H. Abed-alguni, Nour Alqudah
The Journal of Supercomputing (2023) Vol. 79, Iss. 18, pp. 21265-21309
Closed Access | Times Cited: 24

Novel memetic of beluga whale optimization with self-adaptive exploration–exploitation balance for global optimization and engineering problems
Abdelazim G. Hussien, Ruba Abu Khurma, Abdullah Alzaqebah, et al.
Soft Computing (2023) Vol. 27, Iss. 19, pp. 13951-13989
Open Access | Times Cited: 20

Intrusion Detection using hybridized Meta-heuristic techniques with Weighted XGBoost Classifier
Ghulam Mohi-Ud-Din, Lin Zhijun, Jiangbin Zheng, et al.
Expert Systems with Applications (2023) Vol. 232, pp. 120596-120596
Closed Access | Times Cited: 16

Intrusion detection in internet of things using improved binary golden jackal optimization algorithm and LSTM
Amir Vafid Hanafi, Ali Ghaffari, Hesam Rezaei, et al.
Cluster Computing (2023) Vol. 27, Iss. 3, pp. 2673-2690
Closed Access | Times Cited: 16

Challenges and Limitation Analysis of an IoT-Dependent System for Deployment in Smart Healthcare Using Communication Standards Features
Shrikant Upadhyay, Mohit Kumar, Aditi Upadhyay, et al.
Sensors (2023) Vol. 23, Iss. 11, pp. 5155-5155
Open Access | Times Cited: 15

A Novel IDS with a Dynamic Access Control Algorithm to Detect and Defend Intrusion at IoT Nodes
Moutaz Alazab, Albara Awajan, Hadeel Alazzam, et al.
Sensors (2024) Vol. 24, Iss. 7, pp. 2188-2188
Open Access | Times Cited: 6

PSO-ACO-based bi-phase lightweight intrusion detection system combined with GA optimized ensemble classifiers
Arpita Srivastava, Ditipriya Sinha
Cluster Computing (2024) Vol. 27, Iss. 10, pp. 14835-14890
Closed Access | Times Cited: 6

Enhancing Network Intrusion Detection Through the Application of the Dung Beetle Optimized Fusion Model
Yue Li, Jiale Zhang, Yiting Yan, et al.
IEEE Access (2024) Vol. 12, pp. 9483-9496
Open Access | Times Cited: 5

An echo state network model with the protein structure for time series prediction
Yuanpeng Gong, Shuxian Lun, Ming Li, et al.
Applied Soft Computing (2024) Vol. 153, pp. 111257-111257
Closed Access | Times Cited: 5

Intrusion Detection System Using Stacked Ensemble Learning with Light Gradient Boosting Machine and Decision Tree
Anil Kumar Dasari, Saroj Kr. Biswas, Barnana Baruah, et al.
Lecture notes in networks and systems (2025), pp. 291-303
Closed Access

Hybrid network intrusion detection system based on sliding window and information entropy in imbalanced dataset
Jingrong Mo, Jie Ke, Huiyi Zhou, et al.
Applied Intelligence (2025) Vol. 55, Iss. 6
Closed Access

A crossover-integrated Marine Predator Algorithm for feature selection in intrusion detection systems within IoT environments
Sharif Naser Makhadmeh, F.M.A. Salam, Mohammed Awad, et al.
Internet of Things (2025), pp. 101536-101536
Closed Access

An effective model for network selection and resource allocation in 5G heterogeneous network using hybrid heuristic-assisted multi-objective function
Shabana Urooj, Rajesh Arunachalam, Mohamad A. Alawad, et al.
Expert Systems with Applications (2024) Vol. 248, pp. 123307-123307
Closed Access | Times Cited: 4

Hybrid VGG19 and 2D-CNN for intrusion detection in the FOG-cloud environment
Adel Binbusayyis
Expert Systems with Applications (2023) Vol. 238, pp. 121758-121758
Closed Access | Times Cited: 11

An effective networks intrusion detection approach based on hybrid Harris Hawks and multi-layer perceptron
Moutaz Alazab, Ruba Abu Khurma, Pedro Á. Castillo, et al.
Egyptian Informatics Journal (2023) Vol. 25, pp. 100423-100423
Open Access | Times Cited: 11

BBO-CFAT: Network Intrusion Detection Model Based on BBO Algorithm and Hierarchical Transformer
Tingyao Jiang, Xiaobo Fu, Min Wang
IEEE Access (2024) Vol. 12, pp. 54191-54201
Open Access | Times Cited: 3

Using the ToN-IoT dataset to develop a new intrusion detection system for industrial IoT devices
Zhong Cao, Zhicai Zhao, Wenli Shang, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 3

A Random Particle Swarm Optimization Based on Cosine Similarity for Global Optimization and Classification Problems
Yujia Liu, Yuan Zeng, Rui Li, et al.
Biomimetics (2024) Vol. 9, Iss. 4, pp. 204-204
Open Access | Times Cited: 2

Feature Engineering and Model Optimization Based Classification Method for Network Intrusion Detection
Yujie Zhang, Zebin Wang
Applied Sciences (2023) Vol. 13, Iss. 16, pp. 9363-9363
Open Access | Times Cited: 7

Network Intrusion Detection Method Based on Hybrid Improved Residual Network Blocks and Bidirectional Gated Recurrent Units
Hongchen Yu, Chun-Ying Kang, Yao Xiao, et al.
IEEE Access (2023) Vol. 11, pp. 68961-68971
Open Access | Times Cited: 6

Online Banking User Authentication Methods: A Systematic Literature Review
Nader Abdel Karim, Osama A. Khashan, Hasan Kanaker, et al.
IEEE Access (2023) Vol. 12, pp. 741-757
Open Access | Times Cited: 6

Page 1 - Next Page

Scroll to top