
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Cyber Intrusion Detection System Based on a Multiobjective Binary Bat Algorithm for Feature Selection and Enhanced Bat Algorithm for Parameter Optimization in Neural Networks
Waheed Ali H. M. Ghanem, Sanaa A. A. Ghaleb, Aman Jantan, et al.
IEEE Access (2022) Vol. 10, pp. 76318-76339
Open Access | Times Cited: 50
Waheed Ali H. M. Ghanem, Sanaa A. A. Ghaleb, Aman Jantan, et al.
IEEE Access (2022) Vol. 10, pp. 76318-76339
Open Access | Times Cited: 50
Showing 1-25 of 50 citing articles:
Metaheuristic-Driven Optimization for Efficient Resource Allocation in Cloud Environments
M. Revathi, K. Manju, B. Chitradevi, et al.
International Journal of Computational and Experimental Science and Engineering (2025) Vol. 11, Iss. 1
Open Access | Times Cited: 2
M. Revathi, K. Manju, B. Chitradevi, et al.
International Journal of Computational and Experimental Science and Engineering (2025) Vol. 11, Iss. 1
Open Access | Times Cited: 2
Hybrid wrapper feature selection method based on genetic algorithm and extreme learning machine for intrusion detection
Elijah M. Maseno, Zenghui Wang
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 12
Elijah M. Maseno, Zenghui Wang
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 12
Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review
Shubhkirti Sharma, Vijay Kumar, Kamlesh Dutta
Internet of Things and Cyber-Physical Systems (2024) Vol. 4, pp. 258-267
Open Access | Times Cited: 8
Shubhkirti Sharma, Vijay Kumar, Kamlesh Dutta
Internet of Things and Cyber-Physical Systems (2024) Vol. 4, pp. 258-267
Open Access | Times Cited: 8
Intrusion detection systems for IoT based on bio-inspired and machine learning techniques: a systematic review of the literature
Rafika Saadouni, Chirihane Gherbi, Zibouda Aliouat, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 8655-8681
Closed Access | Times Cited: 7
Rafika Saadouni, Chirihane Gherbi, Zibouda Aliouat, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 8655-8681
Closed Access | Times Cited: 7
IBJA: An improved binary DJaya algorithm for feature selection
Bilal H. Abed-alguni, Saqer Hamzeh AL-Jarah
Journal of Computational Science (2023) Vol. 75, pp. 102201-102201
Closed Access | Times Cited: 18
Bilal H. Abed-alguni, Saqer Hamzeh AL-Jarah
Journal of Computational Science (2023) Vol. 75, pp. 102201-102201
Closed Access | Times Cited: 18
Optimal Scheduling Method of Combined Wind–Photovoltaic–Pumped Storage System Based on Improved Bat Algorithm
Huiqing Fan, WU Hong-bo, Shilin Li, et al.
Processes (2025) Vol. 13, Iss. 1, pp. 101-101
Open Access
Huiqing Fan, WU Hong-bo, Shilin Li, et al.
Processes (2025) Vol. 13, Iss. 1, pp. 101-101
Open Access
Hybrid Chaotic Zebra Optimization Algorithm and Long Short-Term Memory for Cyber Threats Detection
Reham Amin, Ghada Eltaweel, Ahmed F. Ali, et al.
IEEE Access (2024) Vol. 12, pp. 93235-93260
Open Access | Times Cited: 4
Reham Amin, Ghada Eltaweel, Ahmed F. Ali, et al.
IEEE Access (2024) Vol. 12, pp. 93235-93260
Open Access | Times Cited: 4
A comprehensive survey on optimization techniques for efficient cluster based routing in WSN
P. Karpurasundharapondian, M. Selvi
Peer-to-Peer Networking and Applications (2024)
Closed Access | Times Cited: 4
P. Karpurasundharapondian, M. Selvi
Peer-to-Peer Networking and Applications (2024)
Closed Access | Times Cited: 4
A crossover-integrated Marine Predator Algorithm for feature selection in intrusion detection systems within IoT environments
Sharif Naser Makhadmeh, F.M.A. Salam, Mohammed Awad, et al.
Internet of Things (2025), pp. 101536-101536
Closed Access
Sharif Naser Makhadmeh, F.M.A. Salam, Mohammed Awad, et al.
Internet of Things (2025), pp. 101536-101536
Closed Access
Intrusion Detection and Prevention System for Smart IoT Network
Richa Singh, R. L. Ujjwal
Lecture notes in electrical engineering (2025), pp. 135-147
Closed Access
Richa Singh, R. L. Ujjwal
Lecture notes in electrical engineering (2025), pp. 135-147
Closed Access
Acoustic Internet of Things Network Life Optimization by BAT Clustering Algorithm
A.Q.K. Rajput, Divyarth Rai
Lecture notes in networks and systems (2025), pp. 545-556
Closed Access
A.Q.K. Rajput, Divyarth Rai
Lecture notes in networks and systems (2025), pp. 545-556
Closed Access
An improved synergistic dual-layer feature selection algorithm with two type classifier for efficient intrusion detection in IoT environment
G Logeswari, K. Thangaramya, M. Selvi, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
G Logeswari, K. Thangaramya, M. Selvi, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Heart Disease Prediction Using Random Forest Based Hybrid Optimization Algorithms
Ravichandra Torthi, Ajay Dilip Kumar Marapatla, Soumya Mande, et al.
International journal of intelligent engineering and systems (2024) Vol. 17, Iss. 2, pp. 134-144
Open Access | Times Cited: 3
Ravichandra Torthi, Ajay Dilip Kumar Marapatla, Soumya Mande, et al.
International journal of intelligent engineering and systems (2024) Vol. 17, Iss. 2, pp. 134-144
Open Access | Times Cited: 3
A deep analysis of nature-inspired and meta-heuristic algorithms for designing intrusion detection systems in cloud/edge and IoT: state-of-the-art techniques, challenges, and future directions
Wengui Hu, Cao Qingsong, Mehdi Darbandi, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 8789-8815
Closed Access | Times Cited: 3
Wengui Hu, Cao Qingsong, Mehdi Darbandi, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 8789-8815
Closed Access | Times Cited: 3
Feature Selection by Multiobjective Optimization: Application to Spam Detection System by Neural Networks and Grasshopper Optimization Algorithm
Sanaa A. A. Ghaleb, Mumtazimah Mohamad, Waheed Ali H. M. Ghanem, et al.
IEEE Access (2022) Vol. 10, pp. 98475-98489
Open Access | Times Cited: 14
Sanaa A. A. Ghaleb, Mumtazimah Mohamad, Waheed Ali H. M. Ghanem, et al.
IEEE Access (2022) Vol. 10, pp. 98475-98489
Open Access | Times Cited: 14
IGWO-SoE: Improved Grey Wolf Optimization Based Stack of Ensemble Learning Algorithm for Anomaly Detection in Internet of Things Edge Computing
J. Manokaran, G. Vairavel
IEEE Access (2023) Vol. 11, pp. 106934-106953
Open Access | Times Cited: 8
J. Manokaran, G. Vairavel
IEEE Access (2023) Vol. 11, pp. 106934-106953
Open Access | Times Cited: 8
Hierarchical-Based Binary Moth Flame Optimization for Feature Extraction in Biomedical Application
S. Jayachitra, A. Prasanth, Shaik Mohammad Rafi, et al.
Communications in computer and information science (2022), pp. 27-38
Closed Access | Times Cited: 13
S. Jayachitra, A. Prasanth, Shaik Mohammad Rafi, et al.
Communications in computer and information science (2022), pp. 27-38
Closed Access | Times Cited: 13
Unified Random Forest and Hybrid Bat Optimization Based Man-in-the-Middle Attack Detection in Advanced Metering Infrastructure
D. Jim Solomon Raja, R. Sriranjani, Parvathy Arulmozhi, et al.
IEEE Transactions on Instrumentation and Measurement (2024) Vol. 73, pp. 1-12
Closed Access | Times Cited: 2
D. Jim Solomon Raja, R. Sriranjani, Parvathy Arulmozhi, et al.
IEEE Transactions on Instrumentation and Measurement (2024) Vol. 73, pp. 1-12
Closed Access | Times Cited: 2
Improved Fault Classification and Localization in Power Transmission Networks Using VAE-Generated Synthetic Data and Machine Learning Algorithms
Muhammad Amir Khan, Bilal Asad, Toomas Vaimann, et al.
Machines (2023) Vol. 11, Iss. 10, pp. 963-963
Open Access | Times Cited: 6
Muhammad Amir Khan, Bilal Asad, Toomas Vaimann, et al.
Machines (2023) Vol. 11, Iss. 10, pp. 963-963
Open Access | Times Cited: 6
E-Commerce Supply Chains with Considerations of Cyber-Security
Firas Zawaideh, Waheeb Abu-Ulbeh, Yousef I. Majdalawi, et al.
(2023), pp. 1-8
Closed Access | Times Cited: 5
Firas Zawaideh, Waheeb Abu-Ulbeh, Yousef I. Majdalawi, et al.
(2023), pp. 1-8
Closed Access | Times Cited: 5
Blockchain Solution For SMEs Cybersecurity Threats In E-Commerce
Firas Zawaideh, Waheeb Abu-Ulbeh, Salameh A. Mjlae, et al.
(2023), pp. 1-7
Closed Access | Times Cited: 5
Firas Zawaideh, Waheeb Abu-Ulbeh, Salameh A. Mjlae, et al.
(2023), pp. 1-7
Closed Access | Times Cited: 5
BAT Algorithm-Based Multi-Class Crop Leaf Disease Prediction Bootstrap Model
V. K. Choudhary, Archana Thakur
Proceedings of Engineering and Technology Innovation (2024) Vol. 26, pp. 72-82
Open Access | Times Cited: 1
V. K. Choudhary, Archana Thakur
Proceedings of Engineering and Technology Innovation (2024) Vol. 26, pp. 72-82
Open Access | Times Cited: 1
Interrelated dynamic biased feature selection and classification model using enhanced gorilla troops optimizer for intrusion detection
Appalaraju Grandhi, Sunil Kumar Singh
Alexandria Engineering Journal (2024) Vol. 114, pp. 312-330
Open Access | Times Cited: 1
Appalaraju Grandhi, Sunil Kumar Singh
Alexandria Engineering Journal (2024) Vol. 114, pp. 312-330
Open Access | Times Cited: 1
An Intrusion Detection and Identification System for Internet of Things Networks Using a Hybrid Ensemble Deep Learning Framework
Yanika Kongsorot, Pakarat Musikawan, Phet Aimtongkham, et al.
IEEE Transactions on Sustainable Computing (2023) Vol. 8, Iss. 4, pp. 596-613
Closed Access | Times Cited: 4
Yanika Kongsorot, Pakarat Musikawan, Phet Aimtongkham, et al.
IEEE Transactions on Sustainable Computing (2023) Vol. 8, Iss. 4, pp. 596-613
Closed Access | Times Cited: 4
The Detection of E-Commerce Manipulated Reviews Using GPT-4
Hassan Al Wahshat, Waheeb Abu-Ulbeh, M. Hafiz Yusoff, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 3
Hassan Al Wahshat, Waheeb Abu-Ulbeh, M. Hafiz Yusoff, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 3