
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Bi-objective Hyper-Heuristic Support Vector Machines for Big Data Cyber-Security
Nasser R. Sabar, Xun Yi, Andy Song
IEEE Access (2018) Vol. 6, pp. 10421-10431
Open Access | Times Cited: 45
Nasser R. Sabar, Xun Yi, Andy Song
IEEE Access (2018) Vol. 6, pp. 10421-10431
Open Access | Times Cited: 45
Showing 1-25 of 45 citing articles:
Deep Learning Approach for Intelligent Intrusion Detection System
R. Vinayakumar, Mamoun Alazab, K. P. Soman, et al.
IEEE Access (2019) Vol. 7, pp. 41525-41550
Open Access | Times Cited: 1347
R. Vinayakumar, Mamoun Alazab, K. P. Soman, et al.
IEEE Access (2019) Vol. 7, pp. 41525-41550
Open Access | Times Cited: 1347
Machine learning methods for cyber security intrusion detection: Datasets and comparative study
Ilhan Firat Kilinçer, Fatih Ertam, Abdulkadir Şengür
Computer Networks (2021) Vol. 188, pp. 107840-107840
Closed Access | Times Cited: 280
Ilhan Firat Kilinçer, Fatih Ertam, Abdulkadir Şengür
Computer Networks (2021) Vol. 188, pp. 107840-107840
Closed Access | Times Cited: 280
A dynamic MLP-based DDoS attack detection method using feature selection and feedback
Meng Wang, Yiqin Lu, Jiancheng Qin
Computers & Security (2019) Vol. 88, pp. 101645-101645
Open Access | Times Cited: 173
Meng Wang, Yiqin Lu, Jiancheng Qin
Computers & Security (2019) Vol. 88, pp. 101645-101645
Open Access | Times Cited: 173
Big Data Issues in Smart Grids: A Survey
Maedeh Ghorbanian, Sarineh Hacopian Dolatabadi, Pierluigi Siano
IEEE Systems Journal (2019) Vol. 13, Iss. 4, pp. 4158-4168
Closed Access | Times Cited: 103
Maedeh Ghorbanian, Sarineh Hacopian Dolatabadi, Pierluigi Siano
IEEE Systems Journal (2019) Vol. 13, Iss. 4, pp. 4158-4168
Closed Access | Times Cited: 103
A hybrid heuristics artificial intelligence feature selection for intrusion detection classifiers in cloud of things
Arun Kumar Sangaiah, Amir Javadpour, Forough Ja’fari, et al.
Cluster Computing (2022) Vol. 26, Iss. 1, pp. 599-612
Closed Access | Times Cited: 44
Arun Kumar Sangaiah, Amir Javadpour, Forough Ja’fari, et al.
Cluster Computing (2022) Vol. 26, Iss. 1, pp. 599-612
Closed Access | Times Cited: 44
Computational Intelligence Enabled Cybersecurity for the Internet of Things
Shanshan Zhao, Shancang Li, Lianyong Qi, et al.
IEEE Transactions on Emerging Topics in Computational Intelligence (2020) Vol. 4, Iss. 5, pp. 666-674
Closed Access | Times Cited: 52
Shanshan Zhao, Shancang Li, Lianyong Qi, et al.
IEEE Transactions on Emerging Topics in Computational Intelligence (2020) Vol. 4, Iss. 5, pp. 666-674
Closed Access | Times Cited: 52
Multi-Objective Evolutionary Optimization Algorithms for Machine Learning: A Recent Survey
Stamatios-Aggelos N. Alexandropoulos, Christos K. Aridas, Sotiris Kotsiantis, et al.
Springer optimization and its applications (2019), pp. 35-55
Closed Access | Times Cited: 40
Stamatios-Aggelos N. Alexandropoulos, Christos K. Aridas, Sotiris Kotsiantis, et al.
Springer optimization and its applications (2019), pp. 35-55
Closed Access | Times Cited: 40
A Survey on Representation Learning Efforts in Cybersecurity Domain
Muhammad Usman, Mian Ahmad Jan, Xiangjian He, et al.
ACM Computing Surveys (2019) Vol. 52, Iss. 6, pp. 1-28
Closed Access | Times Cited: 36
Muhammad Usman, Mian Ahmad Jan, Xiangjian He, et al.
ACM Computing Surveys (2019) Vol. 52, Iss. 6, pp. 1-28
Closed Access | Times Cited: 36
Artificial Intelligence and Human Psychology in Online Transaction Fraud
Raheela Firdaus, Yang Xue, Li Gang, et al.
Frontiers in Psychology (2022) Vol. 13
Open Access | Times Cited: 20
Raheela Firdaus, Yang Xue, Li Gang, et al.
Frontiers in Psychology (2022) Vol. 13
Open Access | Times Cited: 20
A Systematic Review of Defensive and Offensive Cybersecurity with Machine Learning
Imatitikua D. Aiyanyo, Hamman Samuel, Heuiseok Lim
Applied Sciences (2020) Vol. 10, Iss. 17, pp. 5811-5811
Open Access | Times Cited: 30
Imatitikua D. Aiyanyo, Hamman Samuel, Heuiseok Lim
Applied Sciences (2020) Vol. 10, Iss. 17, pp. 5811-5811
Open Access | Times Cited: 30
Detection and defending the XSS attack using novel hybrid stacking ensemble learning-based DNN approach
Muralitharan Krishnan, Yongdo Lim, Seethalakshmi Perumal, et al.
Digital Communications and Networks (2022) Vol. 10, Iss. 3, pp. 716-727
Open Access | Times Cited: 13
Muralitharan Krishnan, Yongdo Lim, Seethalakshmi Perumal, et al.
Digital Communications and Networks (2022) Vol. 10, Iss. 3, pp. 716-727
Open Access | Times Cited: 13
Proactive Threat Hunting in Critical Infrastructure Protection through Hybrid Machine Learning Algorithm Application
Shan Ali, Seunghwan Myeong
Sensors (2024) Vol. 24, Iss. 15, pp. 4888-4888
Open Access | Times Cited: 2
Shan Ali, Seunghwan Myeong
Sensors (2024) Vol. 24, Iss. 15, pp. 4888-4888
Open Access | Times Cited: 2
CUSTOMHyS: Customising Optimisation Metaheuristics via Hyper-heuristic Search
Jorge M. Cruz‐Duarte, Iván Amaya, José Carlos Ortíz-Bayliss, et al.
SoftwareX (2020) Vol. 12, pp. 100628-100628
Open Access | Times Cited: 19
Jorge M. Cruz‐Duarte, Iván Amaya, José Carlos Ortíz-Bayliss, et al.
SoftwareX (2020) Vol. 12, pp. 100628-100628
Open Access | Times Cited: 19
Machine Learning and Deep Learning Models for Big Data Issues
Youssef Gahi, Imane El Alaoui
Studies in computational intelligence (2020), pp. 29-49
Closed Access | Times Cited: 18
Youssef Gahi, Imane El Alaoui
Studies in computational intelligence (2020), pp. 29-49
Closed Access | Times Cited: 18
Machine learning approach for detection of fileless cryptocurrency mining malware
Wilfridus Bambang Triadi Handaya, Mohd Najwadi Yusoff, Aman Jantan
Journal of Physics Conference Series (2020) Vol. 1450, Iss. 1, pp. 012075-012075
Open Access | Times Cited: 12
Wilfridus Bambang Triadi Handaya, Mohd Najwadi Yusoff, Aman Jantan
Journal of Physics Conference Series (2020) Vol. 1450, Iss. 1, pp. 012075-012075
Open Access | Times Cited: 12
Big data classification with optimization driven MapReduce framework
Mujeeb Shaik Mohammed, Praveen Sam Rachapudy, Madhavi Kasa
International Journal of Knowledge-based and Intelligent Engineering Systems (2021) Vol. 25, Iss. 2, pp. 173-183
Closed Access | Times Cited: 6
Mujeeb Shaik Mohammed, Praveen Sam Rachapudy, Madhavi Kasa
International Journal of Knowledge-based and Intelligent Engineering Systems (2021) Vol. 25, Iss. 2, pp. 173-183
Closed Access | Times Cited: 6
Metaheuristic Techniques in Attack and Defense Strategies for Cybersecurity: A Systematic Review
Agustín Salas-Fernández, Broderick Crawford, Ricardo Soto, et al.
Studies in computational intelligence (2021), pp. 449-467
Closed Access | Times Cited: 5
Agustín Salas-Fernández, Broderick Crawford, Ricardo Soto, et al.
Studies in computational intelligence (2021), pp. 449-467
Closed Access | Times Cited: 5
Use of Apache Flume in the Big Data Environment for Processing and Evaluation of the Data Quality of the Twitter Social Network
Gladys-Alicia Tenesaca-Luna, Diego Imba, María-Belén Mora-Arciniegas, et al.
Advances in intelligent systems and computing (2018), pp. 314-326
Closed Access | Times Cited: 4
Gladys-Alicia Tenesaca-Luna, Diego Imba, María-Belén Mora-Arciniegas, et al.
Advances in intelligent systems and computing (2018), pp. 314-326
Closed Access | Times Cited: 4
An Emperical Study on Application of Big Data Analytics to Automate Service Desk Business Process
Dan Lo, Karl Kevin Tiba, Sergiu Buciumas, et al.
(2019) Vol. 3, pp. 670-675
Closed Access | Times Cited: 4
Dan Lo, Karl Kevin Tiba, Sergiu Buciumas, et al.
(2019) Vol. 3, pp. 670-675
Closed Access | Times Cited: 4
Cyber Security Affairs in Empowering Technologies
R.Santhi Sri, M. Mohankumar
International Journal of Innovative Technology and Exploring Engineering (2019) Vol. 8, Iss. 10S, pp. 1-7
Open Access | Times Cited: 4
R.Santhi Sri, M. Mohankumar
International Journal of Innovative Technology and Exploring Engineering (2019) Vol. 8, Iss. 10S, pp. 1-7
Open Access | Times Cited: 4
Big Data Analytics for Cyber Security using binary crow search algorithm based Deep Neural Network
Rajkumar Banoth, Aruna Kranthi Godishala
2022 IEEE 7th International conference for Convergence in Technology (I2CT) (2022), pp. 1-5
Closed Access | Times Cited: 3
Rajkumar Banoth, Aruna Kranthi Godishala
2022 IEEE 7th International conference for Convergence in Technology (I2CT) (2022), pp. 1-5
Closed Access | Times Cited: 3
A Hybrid Support Vector Machine and Artificial Neural Network Based Cyber Security Framework
Mohammed Altaf Ahmed, Rama Mohan Babu G
International Journal of Electronics and Communication Engineering (2024) Vol. 11, Iss. 1, pp. 143-149
Open Access
Mohammed Altaf Ahmed, Rama Mohan Babu G
International Journal of Electronics and Communication Engineering (2024) Vol. 11, Iss. 1, pp. 143-149
Open Access
The Role of Mining and Detection of Big Data Processing Techniques in Cybersecurity
Yubao Wu
Applied Mathematics and Nonlinear Sciences (2024) Vol. 9, Iss. 1
Open Access
Yubao Wu
Applied Mathematics and Nonlinear Sciences (2024) Vol. 9, Iss. 1
Open Access
Multi-objective Optimal Feature Selection for Cyber Security Integrated with Deep Learning
Anupam Das, Subhajit Chakrabarty
Lecture notes in networks and systems (2024), pp. 165-183
Closed Access
Anupam Das, Subhajit Chakrabarty
Lecture notes in networks and systems (2024), pp. 165-183
Closed Access
Overview of Big Data Analytics in Power Quality Analysis and Assessment
Ricardo Siqueira de Carvalho, Helmo Kelis Morales Paredes, Carson Bates, et al.
Smart innovation, systems and technologies (2024), pp. 3-16
Closed Access
Ricardo Siqueira de Carvalho, Helmo Kelis Morales Paredes, Carson Bates, et al.
Smart innovation, systems and technologies (2024), pp. 3-16
Closed Access