OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Novel Feature Selection Approach for Intrusion Detection Data Classification
Mohammed A. Ambusaidi, Xiangjian He, Zhiyuan Tan, et al.
(2014)
Closed Access | Times Cited: 33

Showing 1-25 of 33 citing articles:

Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm
Mohammed A. Ambusaidi, Xiangjian He, Priyadarsi Nanda, et al.
IEEE Transactions on Computers (2016) Vol. 65, Iss. 10, pp. 2986-2998
Open Access | Times Cited: 567

A feature selection algorithm for intrusion detection system based on Pigeon Inspired Optimizer
Hadeel Alazzam, Ahmad Sharieh, Khair Eddin Sabri
Expert Systems with Applications (2020) Vol. 148, pp. 113249-113249
Closed Access | Times Cited: 320

Anomaly-Based Intrusion Detection by Machine Learning: A Case Study on Probing Attacks to an Institutional Network
Emrah Tufan, Cihangir Tezcan, Cengiz Acartürk
IEEE Access (2021) Vol. 9, pp. 50078-50092
Open Access | Times Cited: 40

Improved Crow Search-Based Feature Selection and Ensemble Learning for IoT Intrusion Detection
D. Jayalatchumy, Rajakumar Ramalingam, Aravind Balakrishnan, et al.
IEEE Access (2024) Vol. 12, pp. 33218-33235
Open Access | Times Cited: 4

Review on intrusion detection using feature selection with machine learning techniques
C. Kalimuthan, J. Arokia Renjit
Materials Today Proceedings (2020) Vol. 33, pp. 3794-3802
Closed Access | Times Cited: 38

Hybrid feature selection technique for intrusion detection system
Muhammad Hilmi Kamarudin, Carsten Maple, Tim Watson
International Journal of High Performance Computing and Networking (2019) Vol. 13, Iss. 2, pp. 232-232
Open Access | Times Cited: 35

Intrusion detection using Highest Wins feature selection algorithm
Rami Mustafa A. Mohammad, Mutasem K. Alsmadi
Neural Computing and Applications (2021) Vol. 33, Iss. 16, pp. 9805-9816
Closed Access | Times Cited: 30

Detection of Cyber Attacks by using Gray Wolf Optimizer
Durgesh Srivastava, Susheela Hooda, Rupali Gill, et al.
(2023), pp. 596-600
Closed Access | Times Cited: 10

A novel intrusion detection system for wireless mesh network with hybrid feature selection technique based on GA and MI
R. Vijayanand, D. Devaraj, B. Kannapiran
Journal of Intelligent & Fuzzy Systems (2018) Vol. 34, Iss. 3, pp. 1243-1250
Closed Access | Times Cited: 28

Ca-NIDS: A network intrusion detection system using combinatorial algorithm approach
Olusegun Folorunso, Femi Emmanuel Ayo, Yetunde Ebunoluwa Babalola
Journal of Information Privacy and Security (2016) Vol. 12, Iss. 4, pp. 181-196
Closed Access | Times Cited: 23

A Comparative Analysis of Intrusion Detection Systems: Leveraging Algorithm Classifications and Feature Selection Techniques
Vaman Shakir, Adnan Mohsin
Journal of Applied Science and Technology Trends (2024) Vol. 5, Iss. 01, pp. 34-45
Open Access | Times Cited: 2

Network Intrusion Detection Using Wrapper-based Decision Tree for Feature Selection
Mubarak Albarka Umar, Zhanfang Chen, Yan Liu
(2020), pp. 5-13
Open Access | Times Cited: 20

A homogeneous ensemble based dynamic artificial neural network for solving the intrusion detection problem
Muataz Salam Al-Daweri, Salwani Abdullah, Khairul Akram Zainol Ariffin
International Journal of Critical Infrastructure Protection (2021) Vol. 34, pp. 100449-100449
Closed Access | Times Cited: 16

Smart Attacks Learning Machine Advisor System for Protecting Smart Cities from Smart Threats
Ali Hussein, Omar M. Elzeki, Samir Elmougy
Applied Sciences (2022) Vol. 12, Iss. 13, pp. 6473-6473
Open Access | Times Cited: 11

Dynamic distributed generative adversarial network for intrusion detection system over internet of things
S. Balaji, S. Narayanan
Wireless Networks (2022) Vol. 29, Iss. 5, pp. 1949-1967
Closed Access | Times Cited: 11

Poisoning Machine Learning Based Wireless IDSs via Stealing Learning Model
Pan Li, Wentao Zhao, Qiang Liu, et al.
Lecture notes in computer science (2018), pp. 261-273
Closed Access | Times Cited: 19

An Efficient Hybrid Evolutionary Approach for Identification of Zero-Day Attacks on Wired/Wireless Network System
Alok Kumar Shukla
Wireless Personal Communications (2020) Vol. 123, Iss. 1, pp. 1-29
Closed Access | Times Cited: 15

Direct kernel method for machine learning with support vector machine
Akash G. Gedam, S. G. Shikalpure
(2017), pp. 1772-1775
Closed Access | Times Cited: 12

Unsupervised Feature Selection Method for Intrusion Detection System
Mohammed A. Ambusaidi, Xiangjian He, Priyadarsi Nanda
Trust, Security And Privacy In Computing And Communications (2015) Vol. 1, pp. 295-301
Closed Access | Times Cited: 11

Data Mining based Framework for Effective Intrusion Detection using Hybrid Feature Selection Approach
B. A. Manjunatha, Prasanta Gogoi, M. T. Akkalappa
International Journal of Computer Network and Information Security (2019) Vol. 11, Iss. 8, pp. 1-12
Open Access | Times Cited: 10

Diverse Analysis of Data Mining and Machine Learning Algorithms to Secure Computer Network
Neeraj Kumar, Upendra Kumar
Wireless Personal Communications (2021) Vol. 124, Iss. 2, pp. 1033-1059
Open Access | Times Cited: 8

Adaptive Learning Based Whale Optimization and Convolutional Neural Network Algorithm for Distributed Denial of Service Attack Detection in Software Defined Network Environment
Renuka Devi S, L. Shyamala, S. Saraswathi
International Journal on Recent and Innovation Trends in Computing and Communication (2022) Vol. 10, Iss. 6, pp. 80-93
Open Access | Times Cited: 4

NAIDS design using ChiMIC-KGS
Herman R.A. Talompo, Adang Suwandi Ahmad, Yudi Satria Gondokaryono, et al.
(2017) Vol. 6, pp. 346-351
Closed Access | Times Cited: 4

Fuzzy C-Means Based Feature Selection Mechanism for Wireless Intrusion Detection
Chinyang Henry Tseng, Woei-Jiunn Tsaur, Mujiono Mujiono
Smart innovation, systems and technologies (2022), pp. 143-152
Closed Access | Times Cited: 3

Page 1 - Next Page

Scroll to top