
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An improved binary manta ray foraging optimization algorithm based feature selection and random forest classifier for network intrusion detection
Ibrahim Hayatu Hassan, Mohammed Abdullahi, Mansur Masama Aliyu, et al.
Intelligent Systems with Applications (2022) Vol. 16, pp. 200114-200114
Open Access | Times Cited: 36
Ibrahim Hayatu Hassan, Mohammed Abdullahi, Mansur Masama Aliyu, et al.
Intelligent Systems with Applications (2022) Vol. 16, pp. 200114-200114
Open Access | Times Cited: 36
Showing 1-25 of 36 citing articles:
Efficient Feature Selection Using Weighted Superposition Attraction Optimization Algorithm
N. Ganesh, Rajendran Shankar, Róbert Čep, et al.
Applied Sciences (2023) Vol. 13, Iss. 5, pp. 3223-3223
Open Access | Times Cited: 60
N. Ganesh, Rajendran Shankar, Róbert Čep, et al.
Applied Sciences (2023) Vol. 13, Iss. 5, pp. 3223-3223
Open Access | Times Cited: 60
Advances in Manta Ray Foraging Optimization: A Comprehensive Survey
Farhad Soleimanian Gharehchopogh, Shafi Ghafouri, Mohammad Hasan Namazi, et al.
Journal of Bionic Engineering (2024) Vol. 21, Iss. 2, pp. 953-990
Closed Access | Times Cited: 51
Farhad Soleimanian Gharehchopogh, Shafi Ghafouri, Mohammad Hasan Namazi, et al.
Journal of Bionic Engineering (2024) Vol. 21, Iss. 2, pp. 953-990
Closed Access | Times Cited: 51
A Novel Hybrid Feature Selection with Cascaded LSTM: Enhancing Security in IoT Networks
Karthic Sundaram, Yuvaraj Natarajan, Anitha Perumalsamy, et al.
Wireless Communications and Mobile Computing (2024) Vol. 2024, pp. 1-15
Open Access | Times Cited: 8
Karthic Sundaram, Yuvaraj Natarajan, Anitha Perumalsamy, et al.
Wireless Communications and Mobile Computing (2024) Vol. 2024, pp. 1-15
Open Access | Times Cited: 8
Golden jackal optimization algorithm with deep learning assisted intrusion detection system for network security
Nojood O. Aljehane, Hanan Abdullah Mengash, Majdy M. Eltahir, et al.
Alexandria Engineering Journal (2023) Vol. 86, pp. 415-424
Open Access | Times Cited: 17
Nojood O. Aljehane, Hanan Abdullah Mengash, Majdy M. Eltahir, et al.
Alexandria Engineering Journal (2023) Vol. 86, pp. 415-424
Open Access | Times Cited: 17
Parameter extraction of photovoltaic cells and modules by hybrid white shark optimizer and artificial rabbits optimization
İpek Çetinbaş, Bünyamin Tamyürek, Mehmet Demirtaş
Energy Conversion and Management (2023) Vol. 296, pp. 117621-117621
Closed Access | Times Cited: 16
İpek Çetinbaş, Bünyamin Tamyürek, Mehmet Demirtaş
Energy Conversion and Management (2023) Vol. 296, pp. 117621-117621
Closed Access | Times Cited: 16
IBMRFO: Improved binary manta ray foraging optimization with chaotic tent map and adaptive somersault factor for feature selection
Kunpeng Zhang, Yanheng Liu, Xue Wang, et al.
Expert Systems with Applications (2024) Vol. 251, pp. 123977-123977
Closed Access | Times Cited: 7
Kunpeng Zhang, Yanheng Liu, Xue Wang, et al.
Expert Systems with Applications (2024) Vol. 251, pp. 123977-123977
Closed Access | Times Cited: 7
Optimized fuzzy K-nearest neighbor approach for accurate lung cancer prediction based on radial endobronchial ultrasonography
Jie Xing, Chengye Li, Peiliang Wu, et al.
Computers in Biology and Medicine (2024) Vol. 171, pp. 108038-108038
Closed Access | Times Cited: 6
Jie Xing, Chengye Li, Peiliang Wu, et al.
Computers in Biology and Medicine (2024) Vol. 171, pp. 108038-108038
Closed Access | Times Cited: 6
Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges
Ziadoon Kamil Maseer, Qusay Kanaan Kadhim, Baidaa Al‐Bander, et al.
IET Networks (2024) Vol. 13, Iss. 5-6, pp. 339-376
Open Access | Times Cited: 6
Ziadoon Kamil Maseer, Qusay Kanaan Kadhim, Baidaa Al‐Bander, et al.
IET Networks (2024) Vol. 13, Iss. 5-6, pp. 339-376
Open Access | Times Cited: 6
Overcoming the Challenges of Data Lack, Leakage, and Dimensionality in Intrusion Detection Systems: A Comprehensive Review
Mohamed Aly Bouke, Azizol Abdullah, Nur Izura Udzir, et al.
Journal of Communication and Information Systems (2024) Vol. 39, Iss. 2024, pp. 22-34
Open Access | Times Cited: 5
Mohamed Aly Bouke, Azizol Abdullah, Nur Izura Udzir, et al.
Journal of Communication and Information Systems (2024) Vol. 39, Iss. 2024, pp. 22-34
Open Access | Times Cited: 5
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
Siva Surya Narayana Chintapalli, Satya Prakash Singh, Jaroslav Frnda, et al.
Heliyon (2024) Vol. 10, Iss. 8, pp. e29410-e29410
Open Access | Times Cited: 5
Siva Surya Narayana Chintapalli, Satya Prakash Singh, Jaroslav Frnda, et al.
Heliyon (2024) Vol. 10, Iss. 8, pp. e29410-e29410
Open Access | Times Cited: 5
Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection systems
Mohamed Aly Bouke, Azizol Abdullah, Korhan Cengiz, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2043-e2043
Open Access | Times Cited: 5
Mohamed Aly Bouke, Azizol Abdullah, Korhan Cengiz, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2043-e2043
Open Access | Times Cited: 5
IDS-Anta: An open-source code with a defense mechanism to detect adversarial attacks for intrusion detection system
Kousik Barik, Sanjay Misra
Software Impacts (2024) Vol. 21, pp. 100664-100664
Open Access | Times Cited: 5
Kousik Barik, Sanjay Misra
Software Impacts (2024) Vol. 21, pp. 100664-100664
Open Access | Times Cited: 5
An optimization-inspired intrusion detection model for software-defined networking
Hui Xu, Ling Bai, Wei Huang
Electronic Research Archive (2025) Vol. 33, Iss. 1, pp. 231-254
Open Access
Hui Xu, Ling Bai, Wei Huang
Electronic Research Archive (2025) Vol. 33, Iss. 1, pp. 231-254
Open Access
An optimization-inspired intrusion detection model for software-defined networking
Hui Xu, Ling Bai, Wei Huang
Electronic Research Archive (2025) Vol. 33, Iss. 1, pp. 231-251
Open Access
Hui Xu, Ling Bai, Wei Huang
Electronic Research Archive (2025) Vol. 33, Iss. 1, pp. 231-251
Open Access
Feature Selection for High Dimensional Datasets Based on Quantum-Based Dwarf Mongoose Optimization
Mohamed Abd Elaziz, Ahmed A. Ewees, Mohammed A. A. Al‐qaness, et al.
Mathematics (2022) Vol. 10, Iss. 23, pp. 4565-4565
Open Access | Times Cited: 23
Mohamed Abd Elaziz, Ahmed A. Ewees, Mohammed A. A. Al‐qaness, et al.
Mathematics (2022) Vol. 10, Iss. 23, pp. 4565-4565
Open Access | Times Cited: 23
Manta Ray Foraging Optimization Algorithm: Modifications and Applications
Mohammed Abdullahi, Ibrahim Hayatu Hassan, Muhammad Abdullahi, et al.
IEEE Access (2023) Vol. 11, pp. 53315-53343
Open Access | Times Cited: 13
Mohammed Abdullahi, Ibrahim Hayatu Hassan, Muhammad Abdullahi, et al.
IEEE Access (2023) Vol. 11, pp. 53315-53343
Open Access | Times Cited: 13
IoT Intrusion Detection System Based on Machine Learning
Bayi Xu, Lei Sun, Xiuqing Mao, et al.
Electronics (2023) Vol. 12, Iss. 20, pp. 4289-4289
Open Access | Times Cited: 13
Bayi Xu, Lei Sun, Xiuqing Mao, et al.
Electronics (2023) Vol. 12, Iss. 20, pp. 4289-4289
Open Access | Times Cited: 13
BukaGini: A Stability-Aware Gini Index Feature Selection Algorithm for Robust Model Performance
Mohamed Aly Bouke, Azizol Abdullah, Jaroslav Frnda, et al.
IEEE Access (2023) Vol. 11, pp. 59386-59396
Open Access | Times Cited: 10
Mohamed Aly Bouke, Azizol Abdullah, Jaroslav Frnda, et al.
IEEE Access (2023) Vol. 11, pp. 59386-59396
Open Access | Times Cited: 10
Logistic Regression Ensemble Classifier for Intrusion Detection System in Internet of Things
Silpa Chalichalamala, Niranjana Govindan, Ramani Kasarapu
Sensors (2023) Vol. 23, Iss. 23, pp. 9583-9583
Open Access | Times Cited: 10
Silpa Chalichalamala, Niranjana Govindan, Ramani Kasarapu
Sensors (2023) Vol. 23, Iss. 23, pp. 9583-9583
Open Access | Times Cited: 10
Machine Learning-Based Intrusion Detection on Multi-Class Imbalanced Dataset Using SMOTE
Akdeas Oktanae Widodo, Bambang Setiawan, Rarasmaya Indraswari
Procedia Computer Science (2024) Vol. 234, pp. 578-583
Open Access | Times Cited: 3
Akdeas Oktanae Widodo, Bambang Setiawan, Rarasmaya Indraswari
Procedia Computer Science (2024) Vol. 234, pp. 578-583
Open Access | Times Cited: 3
Deep learning network selection and optimized information fusion for enhanced COVID ‐19 detection
Muhammad Umair Ali, Amad Zafar, Jawad Tanveer, et al.
International Journal of Imaging Systems and Technology (2023) Vol. 34, Iss. 2
Closed Access | Times Cited: 6
Muhammad Umair Ali, Amad Zafar, Jawad Tanveer, et al.
International Journal of Imaging Systems and Technology (2023) Vol. 34, Iss. 2
Closed Access | Times Cited: 6
Anomaly Detection for IOT Systems Using Active Learning
Mohammed Zakariah, Abdulaziz S. Almazyad
Applied Sciences (2023) Vol. 13, Iss. 21, pp. 12029-12029
Open Access | Times Cited: 5
Mohammed Zakariah, Abdulaziz S. Almazyad
Applied Sciences (2023) Vol. 13, Iss. 21, pp. 12029-12029
Open Access | Times Cited: 5
Malfunction diagnosis based on residence time distribution of radiotracer signals in industrial processes using machine learning techniques
Mohamed S. El Tokhy, H. Kasban, Elsayed H. Ali
Annals of Nuclear Energy (2024) Vol. 211, pp. 110976-110976
Closed Access | Times Cited: 1
Mohamed S. El Tokhy, H. Kasban, Elsayed H. Ali
Annals of Nuclear Energy (2024) Vol. 211, pp. 110976-110976
Closed Access | Times Cited: 1
BU-DLNet: Breast Ultrasonography-Based Cancer Detection Using Deep-Learning Network Selection and Feature Optimization
Amad Zafar, Jawad Tanveer, Muhammad Umair Ali, et al.
Bioengineering (2023) Vol. 10, Iss. 7, pp. 825-825
Open Access | Times Cited: 2
Amad Zafar, Jawad Tanveer, Muhammad Umair Ali, et al.
Bioengineering (2023) Vol. 10, Iss. 7, pp. 825-825
Open Access | Times Cited: 2
Network intrusion detection system using bacterial foraging optimization with random forest
Sudha Chikkalwar, Yugandhar Garapati
International Journal of Advanced Technology and Engineering Exploration (2023) Vol. 10, Iss. 105
Open Access | Times Cited: 2
Sudha Chikkalwar, Yugandhar Garapati
International Journal of Advanced Technology and Engineering Exploration (2023) Vol. 10, Iss. 105
Open Access | Times Cited: 2