
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Augmented whale feature selection for IoT attacks: Structure, analysis and applications
Majdi Mafarja, Ali Asghar Heidari, Maria Habib, et al.
Future Generation Computer Systems (2020) Vol. 112, pp. 18-40
Closed Access | Times Cited: 77
Majdi Mafarja, Ali Asghar Heidari, Maria Habib, et al.
Future Generation Computer Systems (2020) Vol. 112, pp. 18-40
Closed Access | Times Cited: 77
Showing 1-25 of 77 citing articles:
Evaluating Federated Learning for intrusion detection in Internet of Things: Review and challenges
Enrique Mármol Campos, Pablo Fernández Saura, Aurora González-Vidal, et al.
Computer Networks (2021) Vol. 203, pp. 108661-108661
Open Access | Times Cited: 137
Enrique Mármol Campos, Pablo Fernández Saura, Aurora González-Vidal, et al.
Computer Networks (2021) Vol. 203, pp. 108661-108661
Open Access | Times Cited: 137
Advanced Feature Extraction and Selection Approach Using Deep Learning and Aquila Optimizer for IoT Intrusion Detection System
Abdulaziz Fatani, Abdelghani Dahou, Mohammed A. A. Al‐qaness, et al.
Sensors (2021) Vol. 22, Iss. 1, pp. 140-140
Open Access | Times Cited: 133
Abdulaziz Fatani, Abdelghani Dahou, Mohammed A. A. Al‐qaness, et al.
Sensors (2021) Vol. 22, Iss. 1, pp. 140-140
Open Access | Times Cited: 133
Comparative Analysis of Intrusion Detection Systems and Machine Learning-Based Model Analysis Through Decision Tree
Zahedi Azam, Md. Motaharul Islam, Mohammad Nurul Huda
IEEE Access (2023) Vol. 11, pp. 80348-80391
Open Access | Times Cited: 62
Zahedi Azam, Md. Motaharul Islam, Mohammad Nurul Huda
IEEE Access (2023) Vol. 11, pp. 80348-80391
Open Access | Times Cited: 62
Intrusion detection approach for cloud and IoT environments using deep learning and Capuchin Search Algorithm
Mohamed Abd Elaziz, Mohammed A. A. Al‐qaness, Abdelghani Dahou, et al.
Advances in Engineering Software (2023) Vol. 176, pp. 103402-103402
Closed Access | Times Cited: 57
Mohamed Abd Elaziz, Mohammed A. A. Al‐qaness, Abdelghani Dahou, et al.
Advances in Engineering Software (2023) Vol. 176, pp. 103402-103402
Closed Access | Times Cited: 57
Anomaly-based intrusion detection system in the Internet of Things using a convolutional neural network and multi-objective enhanced Capuchin Search Algorithm
Hossein Asgharzadeh, Ali Ghaffari, Mohammad Masdari, et al.
Journal of Parallel and Distributed Computing (2023) Vol. 175, pp. 1-21
Closed Access | Times Cited: 57
Hossein Asgharzadeh, Ali Ghaffari, Mohammad Masdari, et al.
Journal of Parallel and Distributed Computing (2023) Vol. 175, pp. 1-21
Closed Access | Times Cited: 57
Classification framework for faulty-software using enhanced exploratory whale optimizer-based feature selection scheme and random forest ensemble learning
Majdi Mafarja, Thaer Thaher, Mohammed Azmi Al‐Betar, et al.
Applied Intelligence (2023)
Open Access | Times Cited: 55
Majdi Mafarja, Thaer Thaher, Mohammed Azmi Al‐Betar, et al.
Applied Intelligence (2023)
Open Access | Times Cited: 55
Evolutionary computation for feature selection in classification: A comprehensive survey of solutions, applications and challenges
Xianfang Song, Yong Zhang, Wanqiu Zhang, et al.
Swarm and Evolutionary Computation (2024) Vol. 90, pp. 101661-101661
Closed Access | Times Cited: 15
Xianfang Song, Yong Zhang, Wanqiu Zhang, et al.
Swarm and Evolutionary Computation (2024) Vol. 90, pp. 101661-101661
Closed Access | Times Cited: 15
Energy-Aware Metaheuristic Algorithm for Industrial-Internet-of-Things Task Scheduling Problems in Fog Computing Applications
Mohamed Abdel‐Basset, Syed Bilal Hussain Shah, Mohamed Elhoseny, et al.
IEEE Internet of Things Journal (2020) Vol. 8, Iss. 16, pp. 12638-12649
Closed Access | Times Cited: 89
Mohamed Abdel‐Basset, Syed Bilal Hussain Shah, Mohamed Elhoseny, et al.
IEEE Internet of Things Journal (2020) Vol. 8, Iss. 16, pp. 12638-12649
Closed Access | Times Cited: 89
An IoT-Focused Intrusion Detection System Approach Based on Preprocessing Characterization for Cybersecurity Datasets
Xavier Larriva-Novo, Víctor A. Villagrá, Mario Vega-Barbas, et al.
Sensors (2021) Vol. 21, Iss. 2, pp. 656-656
Open Access | Times Cited: 73
Xavier Larriva-Novo, Víctor A. Villagrá, Mario Vega-Barbas, et al.
Sensors (2021) Vol. 21, Iss. 2, pp. 656-656
Open Access | Times Cited: 73
Boosted Whale Optimization Algorithm With Natural Selection Operators for Software Fault Prediction
Yousef Hassouneh, Hamza Turabieh, Thaer Thaher, et al.
IEEE Access (2021) Vol. 9, pp. 14239-14258
Open Access | Times Cited: 72
Yousef Hassouneh, Hamza Turabieh, Thaer Thaher, et al.
IEEE Access (2021) Vol. 9, pp. 14239-14258
Open Access | Times Cited: 72
Improved Salp Swarm Algorithm with mutation schemes for solving global optimization and engineering problems
Bhaskar Nautiyal, Rıshı Prakash, Vrince Vimal, et al.
Engineering With Computers (2021) Vol. 38, Iss. S5, pp. 3927-3949
Closed Access | Times Cited: 59
Bhaskar Nautiyal, Rıshı Prakash, Vrince Vimal, et al.
Engineering With Computers (2021) Vol. 38, Iss. S5, pp. 3927-3949
Closed Access | Times Cited: 59
Chaotic diffusion‐limited aggregation enhanced grey wolf optimizer: Insights, analysis, binarization, and feature selection
Jiao Hu, Ali Asghar Heidari, Lejun Zhang, et al.
International Journal of Intelligent Systems (2021) Vol. 37, Iss. 8, pp. 4864-4927
Open Access | Times Cited: 55
Jiao Hu, Ali Asghar Heidari, Lejun Zhang, et al.
International Journal of Intelligent Systems (2021) Vol. 37, Iss. 8, pp. 4864-4927
Open Access | Times Cited: 55
Boolean Particle Swarm Optimization with various Evolutionary Population Dynamics approaches for feature selection problems
Thaer Thaher, Hamouda Chantar, Jingwei Too, et al.
Expert Systems with Applications (2022) Vol. 195, pp. 116550-116550
Closed Access | Times Cited: 55
Thaer Thaher, Hamouda Chantar, Jingwei Too, et al.
Expert Systems with Applications (2022) Vol. 195, pp. 116550-116550
Closed Access | Times Cited: 55
Binary improved white shark algorithm for intrusion detection systems
Noor Aldeen Alawad, Bilal H. Abed-alguni, Mohammed Azmi Al‐Betar, et al.
Neural Computing and Applications (2023) Vol. 35, Iss. 26, pp. 19427-19451
Closed Access | Times Cited: 27
Noor Aldeen Alawad, Bilal H. Abed-alguni, Mohammed Azmi Al‐Betar, et al.
Neural Computing and Applications (2023) Vol. 35, Iss. 26, pp. 19427-19451
Closed Access | Times Cited: 27
Anomaly-based cyberattacks detection for smart homes: A systematic literature review
Juan Ignacio Iturbe Araya, Helena Rifà-Pous
Internet of Things (2023) Vol. 22, pp. 100792-100792
Open Access | Times Cited: 22
Juan Ignacio Iturbe Araya, Helena Rifà-Pous
Internet of Things (2023) Vol. 22, pp. 100792-100792
Open Access | Times Cited: 22
Advanced orthogonal moth flame optimization with Broyden–Fletcher–Goldfarb–Shanno algorithm: Framework and real-world problems
Hongliang Zhang, Rong Li, Zhennao Cai, et al.
Expert Systems with Applications (2020) Vol. 159, pp. 113617-113617
Closed Access | Times Cited: 63
Hongliang Zhang, Rong Li, Zhennao Cai, et al.
Expert Systems with Applications (2020) Vol. 159, pp. 113617-113617
Closed Access | Times Cited: 63
Intelligent Detection of False Information in Arabic Tweets Utilizing Hybrid Harris Hawks Based Feature Selection and Machine Learning Models
Thaer Thaher, Mahmoud Saheb, Hamza Turabieh, et al.
Symmetry (2021) Vol. 13, Iss. 4, pp. 556-556
Open Access | Times Cited: 53
Thaer Thaher, Mahmoud Saheb, Hamza Turabieh, et al.
Symmetry (2021) Vol. 13, Iss. 4, pp. 556-556
Open Access | Times Cited: 53
Memory-based Harris hawk optimization with learning agents: a feature selection approach
Jingwei Too, Guoxi Liang, Huiling Chen
Engineering With Computers (2021) Vol. 38, Iss. S5, pp. 4457-4478
Closed Access | Times Cited: 49
Jingwei Too, Guoxi Liang, Huiling Chen
Engineering With Computers (2021) Vol. 38, Iss. S5, pp. 4457-4478
Closed Access | Times Cited: 49
Dealing with multi-modality using synthesis of Moth-flame optimizer with sine cosine mechanisms
Chengcheng Chen, Xianchang Wang, Helong Yu, et al.
Mathematics and Computers in Simulation (2021) Vol. 188, pp. 291-318
Closed Access | Times Cited: 41
Chengcheng Chen, Xianchang Wang, Helong Yu, et al.
Mathematics and Computers in Simulation (2021) Vol. 188, pp. 291-318
Closed Access | Times Cited: 41
VMFCVD: An Optimized Framework to Combat Volumetric DDoS Attacks using Machine Learning
Arvind Prasad, Shalini Chandra
Arabian Journal for Science and Engineering (2022) Vol. 47, Iss. 8, pp. 9965-9983
Open Access | Times Cited: 32
Arvind Prasad, Shalini Chandra
Arabian Journal for Science and Engineering (2022) Vol. 47, Iss. 8, pp. 9965-9983
Open Access | Times Cited: 32
Directional mutation and crossover for immature performance of whale algorithm with application to engineering optimization
Ailiang Qi, Dong Zhao, Fanhua Yu, et al.
Journal of Computational Design and Engineering (2022) Vol. 9, Iss. 2, pp. 519-563
Open Access | Times Cited: 32
Ailiang Qi, Dong Zhao, Fanhua Yu, et al.
Journal of Computational Design and Engineering (2022) Vol. 9, Iss. 2, pp. 519-563
Open Access | Times Cited: 32
Security enhancement and attack detection using optimized hybrid deep learning and improved encryption algorithm over Internet of Things
Syed Shahul Hameed M, V. Akshaya, Vishwanadham Mandala, et al.
Measurement Sensors (2023) Vol. 30, pp. 100917-100917
Open Access | Times Cited: 19
Syed Shahul Hameed M, V. Akshaya, Vishwanadham Mandala, et al.
Measurement Sensors (2023) Vol. 30, pp. 100917-100917
Open Access | Times Cited: 19
IBJA: An improved binary DJaya algorithm for feature selection
Bilal H. Abed-alguni, Saqer Hamzeh AL-Jarah
Journal of Computational Science (2023) Vol. 75, pp. 102201-102201
Closed Access | Times Cited: 18
Bilal H. Abed-alguni, Saqer Hamzeh AL-Jarah
Journal of Computational Science (2023) Vol. 75, pp. 102201-102201
Closed Access | Times Cited: 18
A Hybrid Meta-heuristics Algorithm: XGBoost-Based Approach for IDS in IoT
Soumya Bajpai, Kapil Dev Sharma, Brijesh Kumar Chaurasia
SN Computer Science (2024) Vol. 5, Iss. 5
Closed Access | Times Cited: 5
Soumya Bajpai, Kapil Dev Sharma, Brijesh Kumar Chaurasia
SN Computer Science (2024) Vol. 5, Iss. 5
Closed Access | Times Cited: 5
Enhanced Polar Lights Optimization with Cryptobiosis and Differential Evolution for Global Optimization and Feature Selection
Yang Gao, Liang Cheng
Biomimetics (2025) Vol. 10, Iss. 1, pp. 53-53
Open Access
Yang Gao, Liang Cheng
Biomimetics (2025) Vol. 10, Iss. 1, pp. 53-53
Open Access