
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An Innovative Perceptual Pigeon Galvanized Optimization (PPGO) Based Likelihood Naïve Bayes (LNB) Classification Approach for Network Intrusion Detection System
Shitharth Selvarajan, Pravin R. Kshirsagar, Praveen Kumar Balachandran, et al.
IEEE Access (2022) Vol. 10, pp. 46424-46441
Open Access | Times Cited: 38
Shitharth Selvarajan, Pravin R. Kshirsagar, Praveen Kumar Balachandran, et al.
IEEE Access (2022) Vol. 10, pp. 46424-46441
Open Access | Times Cited: 38
Showing 1-25 of 38 citing articles:
An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems
Shitharth Selvarajan, Gautam Srivastava, Alaa O. Khadidos, et al.
Journal of Cloud Computing Advances Systems and Applications (2023) Vol. 12, Iss. 1
Open Access | Times Cited: 87
Shitharth Selvarajan, Gautam Srivastava, Alaa O. Khadidos, et al.
Journal of Cloud Computing Advances Systems and Applications (2023) Vol. 12, Iss. 1
Open Access | Times Cited: 87
Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models
Fatima Alwahedi, Alyazia Aldhaheri, Mohamed Amine Ferrag, et al.
Internet of Things and Cyber-Physical Systems (2024) Vol. 4, pp. 167-185
Open Access | Times Cited: 63
Fatima Alwahedi, Alyazia Aldhaheri, Mohamed Amine Ferrag, et al.
Internet of Things and Cyber-Physical Systems (2024) Vol. 4, pp. 167-185
Open Access | Times Cited: 63
Survey on Intrusion Detection Systems Based on Machine Learning Techniques for the Protection of Critical Infrastructure
Andrea Pinto, Luis-Carlos Herrera, Yezid Donoso, et al.
Sensors (2023) Vol. 23, Iss. 5, pp. 2415-2415
Open Access | Times Cited: 62
Andrea Pinto, Luis-Carlos Herrera, Yezid Donoso, et al.
Sensors (2023) Vol. 23, Iss. 5, pp. 2415-2415
Open Access | Times Cited: 62
An investigation of feature reduction, transferability, and generalization in AWID datasets for secure Wi-Fi networks
Nashmia Khalid, Sadaf Hina, Shabih Zaidi, et al.
PLoS ONE (2025) Vol. 20, Iss. 1, pp. e0306747-e0306747
Open Access | Times Cited: 1
Nashmia Khalid, Sadaf Hina, Shabih Zaidi, et al.
PLoS ONE (2025) Vol. 20, Iss. 1, pp. e0306747-e0306747
Open Access | Times Cited: 1
A Cluster-Based Energy-Efficient Secure Optimal Path-Routing Protocol for Wireless Body-Area Sensor Networks
D. Ruby, Manikandan Narayanan, Gayathri Ananthakrishnan, et al.
Sensors (2023) Vol. 23, Iss. 14, pp. 6274-6274
Open Access | Times Cited: 23
D. Ruby, Manikandan Narayanan, Gayathri Ananthakrishnan, et al.
Sensors (2023) Vol. 23, Iss. 14, pp. 6274-6274
Open Access | Times Cited: 23
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Osama Rabie, Shitharth Selvarajan, Tawfiq Hasanin, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 11
Osama Rabie, Shitharth Selvarajan, Tawfiq Hasanin, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 11
A Hybrid Deep Learning Approach for Bottleneck Detection in IoT
Fraidoon Sattari, Ashfaq Hussain Farooqi, Zakria Qadir, et al.
IEEE Access (2022) Vol. 10, pp. 77039-77053
Open Access | Times Cited: 27
Fraidoon Sattari, Ashfaq Hussain Farooqi, Zakria Qadir, et al.
IEEE Access (2022) Vol. 10, pp. 77039-77053
Open Access | Times Cited: 27
Development of a Machine-Learning Intrusion Detection System and Testing of Its Performance Using a Generative Adversarial Network
Andrei-Grigore Mari, Daniel Zinca, Virgil Dobrotă
Sensors (2023) Vol. 23, Iss. 3, pp. 1315-1315
Open Access | Times Cited: 17
Andrei-Grigore Mari, Daniel Zinca, Virgil Dobrotă
Sensors (2023) Vol. 23, Iss. 3, pp. 1315-1315
Open Access | Times Cited: 17
Enhancing IoT Security: A Few-Shot Learning Approach for Intrusion Detection
Theyab Althiyabi, Iftikhar Ahmad, Madini O. Alassafi
Mathematics (2024) Vol. 12, Iss. 7, pp. 1055-1055
Open Access | Times Cited: 5
Theyab Althiyabi, Iftikhar Ahmad, Madini O. Alassafi
Mathematics (2024) Vol. 12, Iss. 7, pp. 1055-1055
Open Access | Times Cited: 5
Prevention of Cyber Security with the Internet of Things Using Particle Swarm Optimization
Hassan A. Alterazi, Pravin R. Kshirsagar, Hariprasath Manoharan, et al.
Sensors (2022) Vol. 22, Iss. 16, pp. 6117-6117
Open Access | Times Cited: 26
Hassan A. Alterazi, Pravin R. Kshirsagar, Hariprasath Manoharan, et al.
Sensors (2022) Vol. 22, Iss. 16, pp. 6117-6117
Open Access | Times Cited: 26
An Intelligent Security Framework Based on Collaborative Mutual Authentication Model for Smart City Networks
Alaa O. Khadidos, Shitharth Selvarajan, Hariprasath Manoharan, et al.
IEEE Access (2022) Vol. 10, pp. 85289-85304
Open Access | Times Cited: 24
Alaa O. Khadidos, Shitharth Selvarajan, Hariprasath Manoharan, et al.
IEEE Access (2022) Vol. 10, pp. 85289-85304
Open Access | Times Cited: 24
Optimal Feature Selection Based on Evolutionary Algorithm for Intrusion Detection
S Prashanth, Shitharth Selvarajan, Praveen Kumar Balachandran, et al.
SN Computer Science (2022) Vol. 3, Iss. 6
Closed Access | Times Cited: 23
S Prashanth, Shitharth Selvarajan, Praveen Kumar Balachandran, et al.
SN Computer Science (2022) Vol. 3, Iss. 6
Closed Access | Times Cited: 23
Intelligent Intrusion Detection Algorithm Based on Multi-Attack for Edge-Assisted Internet of Things
Shitharth Selvarajan, Gouse Baig Mohammed, Jayaraj Ramasamy, et al.
Advances in information security (2023), pp. 119-135
Closed Access | Times Cited: 14
Shitharth Selvarajan, Gouse Baig Mohammed, Jayaraj Ramasamy, et al.
Advances in information security (2023), pp. 119-135
Closed Access | Times Cited: 14
A distributed SDN-based intrusion detection system for IoT using optimized forests
Ke Luo
PLoS ONE (2023) Vol. 18, Iss. 8, pp. e0290694-e0290694
Open Access | Times Cited: 14
Ke Luo
PLoS ONE (2023) Vol. 18, Iss. 8, pp. e0290694-e0290694
Open Access | Times Cited: 14
Systematic literature review on intrusion detection systems: Research trends, algorithms, methods, datasets, and limitations
M. Issa, Mohammad Aljanabi, Hassan Mohamed Muhi-Aldeen
Journal of Intelligent Systems (2024) Vol. 33, Iss. 1
Open Access | Times Cited: 4
M. Issa, Mohammad Aljanabi, Hassan Mohamed Muhi-Aldeen
Journal of Intelligent Systems (2024) Vol. 33, Iss. 1
Open Access | Times Cited: 4
An improved Harris Hawks optimizer based feature selection technique with effective two-staged classifier for network intrusion detection system
U Nandhini, Santhosh Kumar SVN
Peer-to-Peer Networking and Applications (2024)
Closed Access | Times Cited: 4
U Nandhini, Santhosh Kumar SVN
Peer-to-Peer Networking and Applications (2024)
Closed Access | Times Cited: 4
Prediction and modeling of mechanical properties of concrete modified with ceramic waste using artificial neural network and regression model
Pravin R. Kshirsagar, Kamal Upreti, Virendra Singh Kushwah, et al.
Signal Image and Video Processing (2024) Vol. 18, Iss. S1, pp. 183-197
Closed Access | Times Cited: 3
Pravin R. Kshirsagar, Kamal Upreti, Virendra Singh Kushwah, et al.
Signal Image and Video Processing (2024) Vol. 18, Iss. S1, pp. 183-197
Closed Access | Times Cited: 3
Sliding principal component and dynamic reward reinforcement learning based IIoT attack detection
Vijayan Ellappan, Anand Mahendran, S. Murali, et al.
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 8
Vijayan Ellappan, Anand Mahendran, S. Murali, et al.
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 8
Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection
Tosin Ige, Christopher Kiekintveld
(2023), pp. 1-5
Open Access | Times Cited: 7
Tosin Ige, Christopher Kiekintveld
(2023), pp. 1-5
Open Access | Times Cited: 7
Give and Take: Federated Transfer Learning for Industrial IoT Network Intrusion Detection
L. Rajesh, Tapadhir Das, Raj Mani Shukla, et al.
(2023), pp. 2365-2371
Open Access | Times Cited: 7
L. Rajesh, Tapadhir Das, Raj Mani Shukla, et al.
(2023), pp. 2365-2371
Open Access | Times Cited: 7
A single-vendor multi-buyer inventory model with multiple raw material and quality degradation: A case study on agri-food industry
Dana Marsetiya Utama, Iludy Rosetta Kusuma, Ikhlasul Amallynda, et al.
Results in Control and Optimization (2023) Vol. 14, pp. 100353-100353
Open Access | Times Cited: 5
Dana Marsetiya Utama, Iludy Rosetta Kusuma, Ikhlasul Amallynda, et al.
Results in Control and Optimization (2023) Vol. 14, pp. 100353-100353
Open Access | Times Cited: 5
Blockchain‐based multi‐layered federated extreme learning networks in connected vehicles
Durga Rajan, E. Poovammal, Gautam Srivastava, et al.
Expert Systems (2022) Vol. 40, Iss. 6
Closed Access | Times Cited: 9
Durga Rajan, E. Poovammal, Gautam Srivastava, et al.
Expert Systems (2022) Vol. 40, Iss. 6
Closed Access | Times Cited: 9
Modeling the Dynamic Behaviors of Bank Account Fraudsters Using Combined Simultaneous Game Theory with Neural Networks
Abdullahi Ubale Usman, Sunusi Bala Abdullahi, Jin Ran, et al.
Research Square (Research Square) (2024)
Open Access | Times Cited: 1
Abdullahi Ubale Usman, Sunusi Bala Abdullahi, Jin Ran, et al.
Research Square (Research Square) (2024)
Open Access | Times Cited: 1
An optimized neural network for prediction of security threats on software testing
Suman Suman, Raees Ahmad Khan
Computers & Security (2023) Vol. 137, pp. 103626-103626
Closed Access | Times Cited: 4
Suman Suman, Raees Ahmad Khan
Computers & Security (2023) Vol. 137, pp. 103626-103626
Closed Access | Times Cited: 4
Internet of Things Intrusion Detection System Based on Convolutional Neural Network
Jie Yin, Yuxuan Shi, Wen Deng, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 75, Iss. 1, pp. 2119-2135
Open Access | Times Cited: 3
Jie Yin, Yuxuan Shi, Wen Deng, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 75, Iss. 1, pp. 2119-2135
Open Access | Times Cited: 3