OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Showing 1-25 of 50 citing articles:

Metaheuristic-Driven Optimization for Efficient Resource Allocation in Cloud Environments
M. Revathi, K. Manju, B. Chitradevi, et al.
International Journal of Computational and Experimental Science and Engineering (2025) Vol. 11, Iss. 1
Open Access | Times Cited: 2

Hybrid wrapper feature selection method based on genetic algorithm and extreme learning machine for intrusion detection
Elijah M. Maseno, Zenghui Wang
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 12

Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review
Shubhkirti Sharma, Vijay Kumar, Kamlesh Dutta
Internet of Things and Cyber-Physical Systems (2024) Vol. 4, pp. 258-267
Open Access | Times Cited: 8

Intrusion detection systems for IoT based on bio-inspired and machine learning techniques: a systematic review of the literature
Rafika Saadouni, Chirihane Gherbi, Zibouda Aliouat, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 8655-8681
Closed Access | Times Cited: 7

IBJA: An improved binary DJaya algorithm for feature selection
Bilal H. Abed-alguni, Saqer Hamzeh AL-Jarah
Journal of Computational Science (2023) Vol. 75, pp. 102201-102201
Closed Access | Times Cited: 18

Hybrid Chaotic Zebra Optimization Algorithm and Long Short-Term Memory for Cyber Threats Detection
Reham Amin, Ghada Eltaweel, Ahmed F. Ali, et al.
IEEE Access (2024) Vol. 12, pp. 93235-93260
Open Access | Times Cited: 4

A comprehensive survey on optimization techniques for efficient cluster based routing in WSN
P. Karpurasundharapondian, M. Selvi
Peer-to-Peer Networking and Applications (2024)
Closed Access | Times Cited: 4

A crossover-integrated Marine Predator Algorithm for feature selection in intrusion detection systems within IoT environments
Sharif Naser Makhadmeh, F.M.A. Salam, Mohammed Awad, et al.
Internet of Things (2025), pp. 101536-101536
Closed Access

Intrusion Detection and Prevention System for Smart IoT Network
Richa Singh, R. L. Ujjwal
Lecture notes in electrical engineering (2025), pp. 135-147
Closed Access

Acoustic Internet of Things Network Life Optimization by BAT Clustering Algorithm
A.Q.K. Rajput, Divyarth Rai
Lecture notes in networks and systems (2025), pp. 545-556
Closed Access

Heart Disease Prediction Using Random Forest Based Hybrid Optimization Algorithms
Ravichandra Torthi, Ajay Dilip Kumar Marapatla, Soumya Mande, et al.
International journal of intelligent engineering and systems (2024) Vol. 17, Iss. 2, pp. 134-144
Open Access | Times Cited: 3

A deep analysis of nature-inspired and meta-heuristic algorithms for designing intrusion detection systems in cloud/edge and IoT: state-of-the-art techniques, challenges, and future directions
Wengui Hu, Cao Qingsong, Mehdi Darbandi, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 8789-8815
Closed Access | Times Cited: 3

Feature Selection by Multiobjective Optimization: Application to Spam Detection System by Neural Networks and Grasshopper Optimization Algorithm
Sanaa A. A. Ghaleb, Mumtazimah Mohamad, Waheed Ali H. M. Ghanem, et al.
IEEE Access (2022) Vol. 10, pp. 98475-98489
Open Access | Times Cited: 14

Hierarchical-Based Binary Moth Flame Optimization for Feature Extraction in Biomedical Application
S. Jayachitra, A. Prasanth, Shaik Mohammad Rafi, et al.
Communications in computer and information science (2022), pp. 27-38
Closed Access | Times Cited: 13

Unified Random Forest and Hybrid Bat Optimization Based Man-in-the-Middle Attack Detection in Advanced Metering Infrastructure
D. Jim Solomon Raja, R. Sriranjani, Parvathy Arulmozhi, et al.
IEEE Transactions on Instrumentation and Measurement (2024) Vol. 73, pp. 1-12
Closed Access | Times Cited: 2

Improved Fault Classification and Localization in Power Transmission Networks Using VAE-Generated Synthetic Data and Machine Learning Algorithms
Muhammad Amir Khan, Bilal Asad, Toomas Vaimann, et al.
Machines (2023) Vol. 11, Iss. 10, pp. 963-963
Open Access | Times Cited: 6

E-Commerce Supply Chains with Considerations of Cyber-Security
Firas Zawaideh, Waheeb Abu-Ulbeh, Yousef I. Majdalawi, et al.
(2023), pp. 1-8
Closed Access | Times Cited: 5

Blockchain Solution For SMEs Cybersecurity Threats In E-Commerce
Firas Zawaideh, Waheeb Abu-Ulbeh, Salameh A. Mjlae, et al.
(2023), pp. 1-7
Closed Access | Times Cited: 5

BAT Algorithm-Based Multi-Class Crop Leaf Disease Prediction Bootstrap Model
V. K. Choudhary, Archana Thakur
Proceedings of Engineering and Technology Innovation (2024) Vol. 26, pp. 72-82
Open Access | Times Cited: 1

Interrelated dynamic biased feature selection and classification model using enhanced gorilla troops optimizer for intrusion detection
Appalaraju Grandhi, Sunil Kumar Singh
Alexandria Engineering Journal (2024) Vol. 114, pp. 312-330
Open Access | Times Cited: 1

An Intrusion Detection and Identification System for Internet of Things Networks Using a Hybrid Ensemble Deep Learning Framework
Yanika Kongsorot, Pakarat Musikawan, Phet Aimtongkham, et al.
IEEE Transactions on Sustainable Computing (2023) Vol. 8, Iss. 4, pp. 596-613
Closed Access | Times Cited: 4

The Detection of E-Commerce Manipulated Reviews Using GPT-4
Hassan Al Wahshat, Waheeb Abu-Ulbeh, M. Hafiz Yusoff, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 3

Page 1 - Next Page

Scroll to top