OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

An efficient intrusion detection system based on hypergraph - Genetic algorithm for parameter optimization and feature selection in support vector machine
M. R. Gauthama Raman, Nivethitha Somu, Kannan Kirthivasan, et al.
Knowledge-Based Systems (2017) Vol. 134, pp. 1-12
Closed Access | Times Cited: 222

Showing 1-25 of 222 citing articles:

Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection
Iftikhar Ahmad, Mohammad Basheri, Muhammad Iqbal, et al.
IEEE Access (2018) Vol. 6, pp. 33789-33795
Open Access | Times Cited: 556

A hybrid model for building energy consumption forecasting using long short term memory networks
Nivethitha Somu, M. R. Gauthama Raman, Krithi Ramamritham
Applied Energy (2020) Vol. 261, pp. 114131-114131
Closed Access | Times Cited: 294

Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection
Fadi Salo, Ali Bou Nassif, Aleksander Essex
Computer Networks (2018) Vol. 148, pp. 164-175
Closed Access | Times Cited: 270

A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection
Vajiheh Hajisalem, Shahram Babaie
Computer Networks (2018) Vol. 136, pp. 37-50
Closed Access | Times Cited: 258

Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms
Mehrnaz Mazini, Babak Shirazi, Iraj Mahdavi
Journal of King Saud University - Computer and Information Sciences (2018) Vol. 31, Iss. 4, pp. 541-553
Open Access | Times Cited: 229

A comprehensive survey and taxonomy of the SVM-based intrusion detection systems
Mokhtar Mohammadi, Tarik A. Rashid, Sarkhel H. Taher Karim, et al.
Journal of Network and Computer Applications (2021) Vol. 178, pp. 102983-102983
Closed Access | Times Cited: 191

A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions
Ankit Thakkar, Ritika Lohiya
Artificial Intelligence Review (2021) Vol. 55, Iss. 1, pp. 453-563
Closed Access | Times Cited: 174

A stacking-based ensemble learning method for earthquake casualty prediction
Shaoze Cui, Yunqiang Yin, Dujuan Wang, et al.
Applied Soft Computing (2020) Vol. 101, pp. 107038-107038
Closed Access | Times Cited: 167

Genetic algorithm-optimized multi-channel convolutional neural network for stock market prediction
Hye‐Jung Chung, Kyung‐shik Shin
Neural Computing and Applications (2019) Vol. 32, Iss. 12, pp. 7897-7914
Closed Access | Times Cited: 162

A novel approach to intrusion detection using SVM ensemble with feature augmentation
Jie Gu, Lihong Wang, Huiwen Wang, et al.
Computers & Security (2019) Vol. 86, pp. 53-62
Closed Access | Times Cited: 152

Real-Time DDoS Attack Detection System Using Big Data Approach
Mazhar Javed Awan, Umar Farooq, Hafiz Muhammad Aqeel Babar, et al.
Sustainability (2021) Vol. 13, Iss. 19, pp. 10743-10743
Open Access | Times Cited: 141

Advanced Feature Extraction and Selection Approach Using Deep Learning and Aquila Optimizer for IoT Intrusion Detection System
Abdulaziz Fatani, Abdelghani Dahou, Mohammed A. A. Al‐qaness, et al.
Sensors (2021) Vol. 22, Iss. 1, pp. 140-140
Open Access | Times Cited: 133

A multi-objective optimization algorithm for feature selection problems
Benyamın Abdollahzadeh, Farhad Soleimanian Gharehchopogh
Engineering With Computers (2021) Vol. 38, Iss. S3, pp. 1845-1863
Closed Access | Times Cited: 127

An Effective Feature Selection Model Using Hybrid Metaheuristic Algorithms for IoT Intrusion Detection
Saif S. Kareem, Reham R. Mostafa, Fatma A. Hashim, et al.
Sensors (2022) Vol. 22, Iss. 4, pp. 1396-1396
Open Access | Times Cited: 126

IoT Intrusion Detection System Using Deep Learning and Enhanced Transient Search Optimization
Abdulaziz Fatani, Mohamed Abd Elaziz, Abdelghani Dahou, et al.
IEEE Access (2021) Vol. 9, pp. 123448-123464
Open Access | Times Cited: 124

Comparing two SVM models through different metrics based on the confusion matrix
Daniel Valero-Carreras, Javier Alcaraz, Mercedes Landete
Computers & Operations Research (2022) Vol. 152, pp. 106131-106131
Open Access | Times Cited: 112

Hybrid Intrusion Detection using MapReduce based Black Widow Optimized Convolutional Long Short-Term Memory Neural Networks
P. Rajesh Kanna, P. Santhi
Expert Systems with Applications (2022) Vol. 194, pp. 116545-116545
Closed Access | Times Cited: 110

Intrusion Detection System for IoT Based on Deep Learning and Modified Reptile Search Algorithm
Abdelghani Dahou, Mohamed Abd Elaziz, Samia Allaoua Chelloug, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-15
Open Access | Times Cited: 105

A review of recent approaches on wrapper feature selection for intrusion detection
Javier Maldonado, María Cristina Riff, Bertrand Neveu
Expert Systems with Applications (2022) Vol. 198, pp. 116822-116822
Closed Access | Times Cited: 98

A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis
Salman Muneer, Umer Farooq, Atifa Athar, et al.
Journal of Engineering (2024) Vol. 2024, pp. 1-16
Open Access | Times Cited: 23

A novel intrusion detection system based on an optimal hybrid kernel extreme learning machine
Lu Lv, Wenhai Wang, Zeyin Zhang, et al.
Knowledge-Based Systems (2020) Vol. 195, pp. 105648-105648
Closed Access | Times Cited: 126

Hybrid approach to intrusion detection in fog-based IoT environments
Cristiano Antonio de Souza, Carlos Becker Westphall, Renato Bobsin Machado, et al.
Computer Networks (2020) Vol. 180, pp. 107417-107417
Closed Access | Times Cited: 126

Building an Effective Intrusion Detection System by Using Hybrid Data Optimization Based on Machine Learning Algorithms
Jiadong Ren, Jiawei Guo, Qian Wang, et al.
Security and Communication Networks (2019) Vol. 2019, pp. 1-11
Open Access | Times Cited: 110

A NSGA2-LR wrapper approach for feature selection in network intrusion detection
Chaouki Khammassi, Saoussen Krichen
Computer Networks (2020) Vol. 172, pp. 107183-107183
Closed Access | Times Cited: 105

Intrusion Detection Systems: A Cross-Domain Overview
Lionel Nganyewou Tidjon, Marc Frappier, Amel Mammar
IEEE Communications Surveys & Tutorials (2019) Vol. 21, Iss. 4, pp. 3639-3681
Closed Access | Times Cited: 98

Page 1 - Next Page

Scroll to top