OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Network Intrusion Detection Based on PSO-Xgboost Model
Hui Jiang, Zheng He, Gang Ye, et al.
IEEE Access (2020) Vol. 8, pp. 58392-58401
Open Access | Times Cited: 175

Showing 1-25 of 175 citing articles:

Intrusion Detection System Using Machine Learning for Vehicular Ad Hoc Networks Based on ToN-IoT Dataset
Abdallah R. Gad, Ahmed A. Nashat, Tamer M. Barkat
IEEE Access (2021) Vol. 9, pp. 142206-142217
Open Access | Times Cited: 203

Hybrid CNN and XGBoost Model Tuned by Modified Arithmetic Optimization Algorithm for COVID-19 Early Diagnostics from X-ray Images
Miodrag Živković, Nebojša Bačanin, Miloš Antonijević, et al.
Electronics (2022) Vol. 11, Iss. 22, pp. 3798-3798
Open Access | Times Cited: 106

Novel hybrid firefly algorithm: an application to enhance XGBoost tuning for intrusion detection classification
Miodrag Živković, Milan Tair, K. Venkatachalam, et al.
PeerJ Computer Science (2022) Vol. 8, pp. e956-e956
Open Access | Times Cited: 78

A Machine Learning-Based Classification and Prediction Technique for DDoS Attacks
Ismail, Muhammad Ismail Mohmand, Hameed Hussain, et al.
IEEE Access (2022) Vol. 10, pp. 21443-21454
Open Access | Times Cited: 71

The Explainable Potential of Coupling Metaheuristics-Optimized-XGBoost and SHAP in Revealing VOCs’ Environmental Fate
Luka Jovanovic, Gordana Jovanović, Mirjana Perišić, et al.
Atmosphere (2023) Vol. 14, Iss. 1, pp. 109-109
Open Access | Times Cited: 55

Secure and privacy-preserving intrusion detection in wireless sensor networks: Federated learning with SCNN-Bi-LSTM for enhanced reliability
Syed Muhammad Salman Bukhari, Muhammad Hamza Zafar, Mohamad Abou Houran, et al.
Ad Hoc Networks (2024) Vol. 155, pp. 103407-103407
Open Access | Times Cited: 43

A novel flood risk management approach based on future climate and land use change scenarios
Huu Duy Nguyen, Quoc‐Huy Nguyen, Dinh Kha Dang, et al.
The Science of The Total Environment (2024) Vol. 921, pp. 171204-171204
Closed Access | Times Cited: 19

Ensemble learning for intrusion detection systems: A systematic mapping study and cross-benchmark evaluation
Bayu Adhi Tama, Sunghoon Lim
Computer Science Review (2020) Vol. 39, pp. 100357-100357
Open Access | Times Cited: 130

A Survey on Data-driven Network Intrusion Detection
Dylan Chou, Meng Jiang
ACM Computing Surveys (2021) Vol. 54, Iss. 9, pp. 1-36
Open Access | Times Cited: 91

Swarm Intelligence inspired Intrusion Detection Systems — A systematic literature review
Muhammad Nasir, Salman A. Khan, Muhammad Mubashir Khan, et al.
Computer Networks (2022) Vol. 205, pp. 108708-108708
Closed Access | Times Cited: 57

XGBoost Hyperparameters Tuning by Fitness-Dependent Optimizer for Network Intrusion Detection
Miodrag Živković, Luka Jovanovic, Milica Ivanovic, et al.
Lecture notes in networks and systems (2022), pp. 947-962
Closed Access | Times Cited: 45

Optimization of Intrusion Detection Using Likely Point PSO and Enhanced LSTM-RNN Hybrid Technique in Communication Networks
A. A. Donkol, Ali G. Hafez, Aziza I. Hussein, et al.
IEEE Access (2023) Vol. 11, pp. 9469-9482
Open Access | Times Cited: 35

Deep residual convolutional neural Network: An efficient technique for intrusion detection system
Gunupudi Sai Chaitanya Kumar, R. Kiran Kumar, Kuricheti Parish Venkata Kumar, et al.
Expert Systems with Applications (2023) Vol. 238, pp. 121912-121912
Closed Access | Times Cited: 32

A framework for detection of cyber attacks by the classification of intrusion detection datasets
Durgesh Srivastava, Rajeshwar Singh, Chinmay Chakraborty, et al.
Microprocessors and Microsystems (2023) Vol. 105, pp. 104964-104964
Closed Access | Times Cited: 31

A novel network intrusion detection method based on metaheuristic optimisation algorithms
Reza Ghanbarzadeh, Ali Hosseinalipour, Ali Ghaffari
Journal of Ambient Intelligence and Humanized Computing (2023) Vol. 14, Iss. 6, pp. 7575-7592
Open Access | Times Cited: 21

Electrical Faults Analysis and Detection in Photovoltaic Arrays Based on Machine Learning Classifiers
Fouad Suliman, Fatih Anayi, Michael Packianather
Sustainability (2024) Vol. 16, Iss. 3, pp. 1102-1102
Open Access | Times Cited: 9

IIsy: Hybrid In-Network Classification Using Programmable Switches
Changgang Zheng, Zhaoqi Xiong, Thanh Bui-Tien, et al.
IEEE/ACM Transactions on Networking (2024) Vol. 32, Iss. 3, pp. 2555-2570
Open Access | Times Cited: 9

A Systematic Literature Review on Swarm Intelligence Based Intrusion Detection System: Past, Present and Future
Dukka Karun Kumar Reddy, Janmenjoy Nayak, H. S. Behera, et al.
Archives of Computational Methods in Engineering (2024) Vol. 31, Iss. 5, pp. 2717-2784
Closed Access | Times Cited: 9

A Novel Hybrid Feature Selection with Cascaded LSTM: Enhancing Security in IoT Networks
Karthic Sundaram, Yuvaraj Natarajan, Anitha Perumalsamy, et al.
Wireless Communications and Mobile Computing (2024) Vol. 2024, pp. 1-15
Open Access | Times Cited: 8

Machine Learning-Based Forward and Inverse Designs for Prediction and Optimization of Fracture Toughness of Aluminum Alloy
Jaka Fajar Fatriansyah, Muhammad Satrio, Andreas Federico, et al.
Results in Engineering (2024) Vol. 23, pp. 102717-102717
Open Access | Times Cited: 7

The XGBoost Model for Network Intrusion Detection Boosted by Enhanced Sine Cosine Algorithm
Nadheera AlHosni, Luka Jovanovic, Miloš Antonijević, et al.
Lecture notes in networks and systems (2022), pp. 213-228
Closed Access | Times Cited: 36

An emperor penguin optimizer application for medical diagnostics
Luka Jovanovic, Miodrag Živković, Miloš Antonijević, et al.
(2022)
Closed Access | Times Cited: 36

iNIDS: SWOT Analysis and TOWS Inferences of State-of-the-Art NIDS solutions for the development of Intelligent Network Intrusion Detection System
Jyoti Verma, Abhinav Bhandari, Gurpreet Singh
Computer Communications (2022) Vol. 195, pp. 227-247
Closed Access | Times Cited: 28

Page 1 - Next Page

Scroll to top