OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Dendritic Cell Algorithm Enhancement Using Fuzzy Inference System for Network Intrusion Detection
Noe Elisa, Longzhi Yang, Xin Fu, et al.
2022 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) (2019)
Open Access | Times Cited: 15

Showing 15 citing articles:

A Secure and Privacy-Preserving E-Government Framework Using Blockchain and Artificial Immunity
Noe Elisa, Longzhi Yang, Fei Chao, et al.
IEEE Access (2023) Vol. 11, pp. 8773-8789
Open Access | Times Cited: 18

Towards a Hybrid Immune Algorithm Based on Danger Theory for Database Security
Wael Said, Ayman Mohamed Mostafa
IEEE Access (2020) Vol. 8, pp. 145332-145362
Open Access | Times Cited: 14

A Review on Immune-Inspired Node Fault Detection in Wireless Sensor Networks with a Focus on the Danger Theory
Dominik Widhalm, Karl M. Goeschka, Wolfgang Kästner
Sensors (2023) Vol. 23, Iss. 3, pp. 1166-1166
Open Access | Times Cited: 4

A new version of the deterministic dendritic cell algorithm based on numerical differential and immune response
Zhou Wen, Yiwen Liang
Applied Soft Computing (2020) Vol. 102, pp. 107055-107055
Closed Access | Times Cited: 12

A New Intrusion Detection System Using the Improved Dendritic Cell Algorithm
Ehsan Farzadnia, Hossein Shirazi, Alireza Nowroozi
The Computer Journal (2020) Vol. 64, Iss. 8, pp. 1193-1214
Open Access | Times Cited: 11

Consortium Blockchain for Security and Privacy-Preserving in E-government Systems
Noe Elisa, Longzhi Yang, Honglei Li, et al.
arXiv (Cornell University) (2020)
Open Access | Times Cited: 9

Multiresolution dendritic cell algorithm for network anomaly detection
David Limon-Cantu, Vicente Alarcón-Aquino
PeerJ Computer Science (2021) Vol. 7, pp. e749-e749
Open Access | Times Cited: 6

Signal Categorisation for Dendritic Cell Algorithm Using GA with Partial Shuffle Mutation
Noe Elisa, Longzhi Yang, Fei Chao
Advances in intelligent systems and computing (2019), pp. 529-540
Closed Access | Times Cited: 5

GOVERNMENT SCHEME SPECULATION SYSTEM
T. V. Geetha
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT (2024) Vol. 08, Iss. 05, pp. 1-5
Open Access

An immune optimization based deterministic dendritic cell algorithm
Zhou Wen, Yiwen Liang
Applied Intelligence (2021) Vol. 52, Iss. 2, pp. 1461-1476
Closed Access | Times Cited: 4

DeepBlock: a Collaborative Intrusion Detection Framework Based on Blockchain and Deep Learning
Monirah AI-Ajlan, Mourad Ykhlef
(2023), pp. 180-185
Closed Access

Sensor Node Fault Detection in Wireless Sensor Networks Utilizing Node-Level Diagnostics
Dominik Widhalm, Karl M. Goeschka, Wolfgang Kästner
(2023), pp. 118-128
Closed Access

A New Intrusion Detection System using the Improved Dendritic Cell Algorithm
Ehsan Farzadnia, Hossein Shirazi, Alireza Nowroozi
arXiv (Cornell University) (2020)
Open Access

Technology, Science and Culture: A Global Vision, Volume III
Luis R. Hernández, Martín Alejandro Serrano Meneses
IntechOpen eBooks (2022)
Open Access

TwoDCA: A 2-Dimensional Dendritic Cell Algorithm with Dynamic Cell Migration
Julie Greensmith, Longzhi Yang
2022 IEEE Congress on Evolutionary Computation (CEC) (2022), pp. 1-8
Closed Access

Page 1

Scroll to top