
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Leveraging Metaheuristics for Feature Selection With Machine Learning Classification for Malicious Packet Detection in Computer Networks
Aganith Shanbhag, Shweta Vincent, Bore Gowda S B, et al.
IEEE Access (2024) Vol. 12, pp. 21745-21764
Open Access | Times Cited: 5
Aganith Shanbhag, Shweta Vincent, Bore Gowda S B, et al.
IEEE Access (2024) Vol. 12, pp. 21745-21764
Open Access | Times Cited: 5
Showing 5 citing articles:
EHHO-EL: a hybrid method for software defect detection in software product lines using extended Harris hawks optimization and ensemble learning
Mehdi Habibzadeh-khameneh, Akbar Nabiollahi-Najafabadi, Reza Tavoli, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 4
Closed Access
Mehdi Habibzadeh-khameneh, Akbar Nabiollahi-Najafabadi, Reza Tavoli, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 4
Closed Access
Blockchain-based IoT security solutions for IDS research centers
Selman Hızal, A. F. M. Suaib Akhter, Ünal Çavuşoğlu, et al.
Internet of Things (2024) Vol. 27, pp. 101307-101307
Closed Access | Times Cited: 4
Selman Hızal, A. F. M. Suaib Akhter, Ünal Çavuşoğlu, et al.
Internet of Things (2024) Vol. 27, pp. 101307-101307
Closed Access | Times Cited: 4
Enhanced Intrusion Detection Based Hybrid Meta-heuristic Feature Selection
Ali Hussein Ali, Boudour Ammar, Maha Charfeddine, et al.
Communications in computer and information science (2024), pp. 3-15
Closed Access | Times Cited: 1
Ali Hussein Ali, Boudour Ammar, Maha Charfeddine, et al.
Communications in computer and information science (2024), pp. 3-15
Closed Access | Times Cited: 1
Attack Detection with Optimal PSO Feature Selection with DTOHE Model
Jasmine Samraj, K. Abirami
SN Computer Science (2024) Vol. 5, Iss. 5
Closed Access
Jasmine Samraj, K. Abirami
SN Computer Science (2024) Vol. 5, Iss. 5
Closed Access
EHHO-EL: Hybrid Method for Software defect Detection in Software Product Lines using Extended Harris Hawks Optimization and Ensemble Learning
Mehdi Habibzadeh khameneh, Akbar Nabiollahi-Najafabadi, Reza Tavoli, et al.
Research Square (Research Square) (2024)
Open Access
Mehdi Habibzadeh khameneh, Akbar Nabiollahi-Najafabadi, Reza Tavoli, et al.
Research Square (Research Square) (2024)
Open Access