
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Intrusion detection using optimized ensemble classification in fog computing paradigm
Ramkumar M .P ., T. Daniya, P. Mano Paul, et al.
Knowledge-Based Systems (2022) Vol. 252, pp. 109364-109364
Closed Access | Times Cited: 24
Ramkumar M .P ., T. Daniya, P. Mano Paul, et al.
Knowledge-Based Systems (2022) Vol. 252, pp. 109364-109364
Closed Access | Times Cited: 24
Showing 24 citing articles:
Intrusion detection system for large-scale IoT NetFlow networks using machine learning with modified Arithmetic Optimization Algorithm
F.M.A. Salam, Sharif Naser Makhadmeh, Mohammed Awad, et al.
Internet of Things (2023) Vol. 22, pp. 100819-100819
Closed Access | Times Cited: 49
F.M.A. Salam, Sharif Naser Makhadmeh, Mohammed Awad, et al.
Internet of Things (2023) Vol. 22, pp. 100819-100819
Closed Access | Times Cited: 49
Cyber-physical systems security: A systematic review
Houda Harkat, Luís M. Camarinha-Matos, João Goês, et al.
Computers & Industrial Engineering (2024) Vol. 188, pp. 109891-109891
Closed Access | Times Cited: 18
Houda Harkat, Luís M. Camarinha-Matos, João Goês, et al.
Computers & Industrial Engineering (2024) Vol. 188, pp. 109891-109891
Closed Access | Times Cited: 18
GOSVM: Gannet optimization based support vector machine for malicious attack detection in cloud environment
M Arunkumar, K. Ashok Kumar
International Journal of Information Technology (2023) Vol. 15, Iss. 3, pp. 1653-1660
Closed Access | Times Cited: 19
M Arunkumar, K. Ashok Kumar
International Journal of Information Technology (2023) Vol. 15, Iss. 3, pp. 1653-1660
Closed Access | Times Cited: 19
Seagull Optimization-based Feature Selection with Optimal Extreme Learning Machine for Intrusion Detection in Fog Assisted WSN
Thiruppathi Muthu, Vinoth Kumar Kalimuthu
Tehnicki vjesnik - Technical Gazette (2023) Vol. 30, Iss. 5
Open Access | Times Cited: 14
Thiruppathi Muthu, Vinoth Kumar Kalimuthu
Tehnicki vjesnik - Technical Gazette (2023) Vol. 30, Iss. 5
Open Access | Times Cited: 14
A Fog Computing Framework for Intrusion Detection of Energy-Based Attacks on UAV-Assisted Smart Farming
Junaid Sajid, Kadhim Hayawi, Asad Waqar Malik, et al.
Applied Sciences (2023) Vol. 13, Iss. 6, pp. 3857-3857
Open Access | Times Cited: 13
Junaid Sajid, Kadhim Hayawi, Asad Waqar Malik, et al.
Applied Sciences (2023) Vol. 13, Iss. 6, pp. 3857-3857
Open Access | Times Cited: 13
Hybrid VGG19 and 2D-CNN for intrusion detection in the FOG-cloud environment
Adel Binbusayyis
Expert Systems with Applications (2023) Vol. 238, pp. 121758-121758
Closed Access | Times Cited: 11
Adel Binbusayyis
Expert Systems with Applications (2023) Vol. 238, pp. 121758-121758
Closed Access | Times Cited: 11
Fuzzy Theory in Fog Computing: Review, Taxonomy, and Open Issues
Zaid. J. Al-Araji, Sharifah Sakinah Syed Ahmad, Nasreen Kausar, et al.
IEEE Access (2022) Vol. 10, pp. 126931-126956
Open Access | Times Cited: 12
Zaid. J. Al-Araji, Sharifah Sakinah Syed Ahmad, Nasreen Kausar, et al.
IEEE Access (2022) Vol. 10, pp. 126931-126956
Open Access | Times Cited: 12
Moth Search Optimizer with Deep Learning Enabled Intrusion Detection System in Wireless Sensor Networks
C. Murugesh, S. Murugan
International Journal of Electrical and Electronics Engineering (2023) Vol. 10, Iss. 4, pp. 77-90
Open Access | Times Cited: 4
C. Murugesh, S. Murugan
International Journal of Electrical and Electronics Engineering (2023) Vol. 10, Iss. 4, pp. 77-90
Open Access | Times Cited: 4
Optimizing Smart Home Intrusion Detection with Harmony-Enhanced Extra Trees
Akmalbek Abdusalomov, Dusmurod Kilichev, Rashid Nasimov, et al.
(2024)
Closed Access | Times Cited: 1
Akmalbek Abdusalomov, Dusmurod Kilichev, Rashid Nasimov, et al.
(2024)
Closed Access | Times Cited: 1
Optimized Intrusion Detection System in Fog Computing Environment Using Automatic Termination-based Whale Optimization with ELM
Dipti Prava Sahu, Biswajit Tripathy, Leena Samantaray
International Journal of Computer Network and Information Security (2024) Vol. 16, Iss. 2, pp. 79-91
Open Access | Times Cited: 1
Dipti Prava Sahu, Biswajit Tripathy, Leena Samantaray
International Journal of Computer Network and Information Security (2024) Vol. 16, Iss. 2, pp. 79-91
Open Access | Times Cited: 1
Evaluation of soft computing in intrusion detection for secure social Internet of Things based on collaborative edge computing
Bishwajeet Kumar Pandey, Ashendra Kumar Saxena, Amit Barve, et al.
Soft Computing (2023)
Closed Access | Times Cited: 4
Bishwajeet Kumar Pandey, Ashendra Kumar Saxena, Amit Barve, et al.
Soft Computing (2023)
Closed Access | Times Cited: 4
Security analysis of fog computing environment for ensuring the security and privacy of information
Kamal Kumar Gola, Shikha Arya, Gulista Khan, et al.
Transactions on Emerging Telecommunications Technologies (2023) Vol. 34, Iss. 10
Open Access | Times Cited: 2
Kamal Kumar Gola, Shikha Arya, Gulista Khan, et al.
Transactions on Emerging Telecommunications Technologies (2023) Vol. 34, Iss. 10
Open Access | Times Cited: 2
Identification of Phishing URLs Using Machine Learning Models
Meghashyam Vivek, Nithin Premjith, Aaron Antonio Johnson, et al.
Lecture notes in networks and systems (2024), pp. 209-219
Closed Access
Meghashyam Vivek, Nithin Premjith, Aaron Antonio Johnson, et al.
Lecture notes in networks and systems (2024), pp. 209-219
Closed Access
Optimized deep autoencoder and BiLSTM for intrusion detection in IoTs-Fog computing
Abdullah Alqahtani
Multimedia Tools and Applications (2024)
Closed Access
Abdullah Alqahtani
Multimedia Tools and Applications (2024)
Closed Access
Enhancing Visual Passwords Using a Grid-Based Graphical Password Authentication to Mitigate Shoulder Surfing
P. Mano Paul, I. Berin Jeba Jingle, I. Diana Jeba Jingle
Lecture notes in networks and systems (2024), pp. 447-455
Closed Access
P. Mano Paul, I. Berin Jeba Jingle, I. Diana Jeba Jingle
Lecture notes in networks and systems (2024), pp. 447-455
Closed Access
Automatic Screw Jack Mobile Controller for Car Lifting Using the Car Battery
P. Mano Paul, Aby K. Thomas, Syed Alay Hashim, et al.
Lecture notes in electrical engineering (2024), pp. 309-320
Closed Access
P. Mano Paul, Aby K. Thomas, Syed Alay Hashim, et al.
Lecture notes in electrical engineering (2024), pp. 309-320
Closed Access
Enhancing Intrusion Detection Using Binary Arithmetic Optimization with Sparse Auto Encoder for Fog-Assisted Wireless Sensor Networks
Thiruppathi Muthu, Vinoth Kumar Kalimuthu, B. Srinivasan, et al.
Brazilian Archives of Biology and Technology (2024) Vol. 67
Open Access
Thiruppathi Muthu, Vinoth Kumar Kalimuthu, B. Srinivasan, et al.
Brazilian Archives of Biology and Technology (2024) Vol. 67
Open Access
Detection of ARP Spoofing with Optimized False Alarm Using Deep Learning Based Absolute Thresholding
M. Dharani, M Nivedhidha, A Sangeetha, et al.
(2024), pp. 1650-1657
Closed Access
M. Dharani, M Nivedhidha, A Sangeetha, et al.
(2024), pp. 1650-1657
Closed Access
Improvement of intrusion detection system in industrial Internet of Things based on deep learning with fog computing capability
W. Li, Nazila Mohammadnezhad
Electronic Commerce Research (2024)
Closed Access
W. Li, Nazila Mohammadnezhad
Electronic Commerce Research (2024)
Closed Access
Dynamic Arithmetic Optimization Algorithm with Deep Learning-based Intrusion Detection System in Wireless Sensor Networks
K. Nirmal, S. Murugan
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 6, pp. 18453-18458
Open Access
K. Nirmal, S. Murugan
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 6, pp. 18453-18458
Open Access
An enhanced algorithm for predicting IDH1 mutations and 1p19q mitigation in glioma tumor
Disha Sushant Wankhede, Chetan J. Shelke, Abraham George
AIP conference proceedings (2024) Vol. 3217, pp. 020025-020025
Closed Access
Disha Sushant Wankhede, Chetan J. Shelke, Abraham George
AIP conference proceedings (2024) Vol. 3217, pp. 020025-020025
Closed Access
Optimised convolutional neural network model for multiclass acute lymphoblastic leukemia classification in in peripheral blood smear images
Virendra Kumar Shrivastava, Chetan J. Shelke, Rathnakar Achary, et al.
AIP conference proceedings (2024) Vol. 3217, pp. 020027-020027
Closed Access
Virendra Kumar Shrivastava, Chetan J. Shelke, Rathnakar Achary, et al.
AIP conference proceedings (2024) Vol. 3217, pp. 020027-020027
Closed Access
Modified MMS: Minimization Approach for Model Subset Selection
C. Rajathi, P. Rukmani
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 77, Iss. 1, pp. 733-756
Open Access | Times Cited: 1
C. Rajathi, P. Rukmani
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 77, Iss. 1, pp. 733-756
Open Access | Times Cited: 1
CopulaGAN Boosted Random Forest based Network Intrusion Detection System for Hospital Network Infrastructure
Harshini Sivakami, M Nivedhidha, M P Ramkumar, et al.
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2023), pp. 1-7
Closed Access | Times Cited: 1
Harshini Sivakami, M Nivedhidha, M P Ramkumar, et al.
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2023), pp. 1-7
Closed Access | Times Cited: 1