
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An Evolutionary Computation Based Feature Selection Method for Intrusion Detection
Yu Xue, Weiwei Jia, Xuejian Zhao, et al.
Security and Communication Networks (2018) Vol. 2018, pp. 1-10
Open Access | Times Cited: 42
Yu Xue, Weiwei Jia, Xuejian Zhao, et al.
Security and Communication Networks (2018) Vol. 2018, pp. 1-10
Open Access | Times Cited: 42
Showing 1-25 of 42 citing articles:
African vultures optimization algorithm: A new nature-inspired metaheuristic algorithm for global optimization problems
Benyamın Abdollahzadeh, Farhad Soleimanian Gharehchopogh, Seyedali Mirjalili
Computers & Industrial Engineering (2021) Vol. 158, pp. 107408-107408
Closed Access | Times Cited: 999
Benyamın Abdollahzadeh, Farhad Soleimanian Gharehchopogh, Seyedali Mirjalili
Computers & Industrial Engineering (2021) Vol. 158, pp. 107408-107408
Closed Access | Times Cited: 999
Multiclass feature selection with metaheuristic optimization algorithms: a review
Olatunji Akinola, Absalom E. Ezugwu, Jeffrey O. Agushaka, et al.
Neural Computing and Applications (2022) Vol. 34, Iss. 22, pp. 19751-19790
Open Access | Times Cited: 121
Olatunji Akinola, Absalom E. Ezugwu, Jeffrey O. Agushaka, et al.
Neural Computing and Applications (2022) Vol. 34, Iss. 22, pp. 19751-19790
Open Access | Times Cited: 121
A review of recent approaches on wrapper feature selection for intrusion detection
Javier Maldonado, María Cristina Riff, Bertrand Neveu
Expert Systems with Applications (2022) Vol. 198, pp. 116822-116822
Closed Access | Times Cited: 100
Javier Maldonado, María Cristina Riff, Bertrand Neveu
Expert Systems with Applications (2022) Vol. 198, pp. 116822-116822
Closed Access | Times Cited: 100
A multi-objective mutation-based dynamic Harris Hawks optimization for botnet detection in IoT
Farhad Soleimanian Gharehchopogh, Benyamın Abdollahzadeh, Saeid Barshandeh, et al.
Internet of Things (2023) Vol. 24, pp. 100952-100952
Closed Access | Times Cited: 87
Farhad Soleimanian Gharehchopogh, Benyamın Abdollahzadeh, Saeid Barshandeh, et al.
Internet of Things (2023) Vol. 24, pp. 100952-100952
Closed Access | Times Cited: 87
A NSGA2-LR wrapper approach for feature selection in network intrusion detection
Chaouki Khammassi, Saoussen Krichen
Computer Networks (2020) Vol. 172, pp. 107183-107183
Closed Access | Times Cited: 106
Chaouki Khammassi, Saoussen Krichen
Computer Networks (2020) Vol. 172, pp. 107183-107183
Closed Access | Times Cited: 106
A systematic review of emerging feature selection optimization methods for optimal text classification: the present state and prospective opportunities
Abiodun Esther Omolara, Abdulatif Alabdulatif, Oludare Isaac Abiodun, et al.
Neural Computing and Applications (2021) Vol. 33, Iss. 22, pp. 15091-15118
Open Access | Times Cited: 101
Abiodun Esther Omolara, Abdulatif Alabdulatif, Oludare Isaac Abiodun, et al.
Neural Computing and Applications (2021) Vol. 33, Iss. 22, pp. 15091-15118
Open Access | Times Cited: 101
Particle swarm optimization and feature selection for intrusion detection system
Nilesh Kunhare, Ritu Tiwari, Joydip Dhar
Sadhana (2020) Vol. 45, Iss. 1
Closed Access | Times Cited: 98
Nilesh Kunhare, Ritu Tiwari, Joydip Dhar
Sadhana (2020) Vol. 45, Iss. 1
Closed Access | Times Cited: 98
Augmented whale feature selection for IoT attacks: Structure, analysis and applications
Majdi Mafarja, Ali Asghar Heidari, Maria Habib, et al.
Future Generation Computer Systems (2020) Vol. 112, pp. 18-40
Closed Access | Times Cited: 78
Majdi Mafarja, Ali Asghar Heidari, Maria Habib, et al.
Future Generation Computer Systems (2020) Vol. 112, pp. 18-40
Closed Access | Times Cited: 78
Hybridizing genetic algorithm and grey wolf optimizer to advance an intelligent and lightweight intrusion detection system for IoT wireless networks
Azam Davahli, Mahboubeh Shamsi, Golnoush Abaei
Journal of Ambient Intelligence and Humanized Computing (2020) Vol. 11, Iss. 11, pp. 5581-5609
Closed Access | Times Cited: 75
Azam Davahli, Mahboubeh Shamsi, Golnoush Abaei
Journal of Ambient Intelligence and Humanized Computing (2020) Vol. 11, Iss. 11, pp. 5581-5609
Closed Access | Times Cited: 75
An improved African vultures optimization algorithm based on tent chaotic mapping and time-varying mechanism
Jiahao Fan, Ying Li, Tan Wang
PLoS ONE (2021) Vol. 16, Iss. 11, pp. e0260725-e0260725
Open Access | Times Cited: 56
Jiahao Fan, Ying Li, Tan Wang
PLoS ONE (2021) Vol. 16, Iss. 11, pp. e0260725-e0260725
Open Access | Times Cited: 56
A new deep-learning with swarm based feature selection for intelligent intrusion detection for the Internet of things
R. Anushiya, V. Lavanya
Measurement Sensors (2023) Vol. 26, pp. 100700-100700
Open Access | Times Cited: 23
R. Anushiya, V. Lavanya
Measurement Sensors (2023) Vol. 26, pp. 100700-100700
Open Access | Times Cited: 23
Intrusion Detection Systems, Issues, Challenges, and Needs
Mohammad Aljanabi, Mohd Arfian Ismail, Ahmed Hussein Ali
International Journal of Computational Intelligence Systems (2021) Vol. 14, Iss. 1, pp. 560-560
Open Access | Times Cited: 52
Mohammad Aljanabi, Mohd Arfian Ismail, Ahmed Hussein Ali
International Journal of Computational Intelligence Systems (2021) Vol. 14, Iss. 1, pp. 560-560
Open Access | Times Cited: 52
IoT Botnet Detection Using Salp Swarm and Ant Lion Hybrid Optimization Model
Ruba Abu Khurma, Iman Almomani, Ibrahim Aljarah
Symmetry (2021) Vol. 13, Iss. 8, pp. 1377-1377
Open Access | Times Cited: 44
Ruba Abu Khurma, Iman Almomani, Ibrahim Aljarah
Symmetry (2021) Vol. 13, Iss. 8, pp. 1377-1377
Open Access | Times Cited: 44
LNNLS-KH: A Feature Selection Method for Network Intrusion Detection
Xin Li, Peng Yi, Wei Wei, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-22
Open Access | Times Cited: 41
Xin Li, Peng Yi, Wei Wei, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-22
Open Access | Times Cited: 41
MOAEOSCA: an enhanced multi-objective hybrid artificial ecosystem-based optimization with sine cosine algorithm for feature selection in botnet detection in IoT
Fatemeh Hosseini, Farhad Soleimanian Gharehchopogh, Mohammad Masdari
Multimedia Tools and Applications (2022) Vol. 82, Iss. 9, pp. 13369-13399
Closed Access | Times Cited: 24
Fatemeh Hosseini, Farhad Soleimanian Gharehchopogh, Mohammad Masdari
Multimedia Tools and Applications (2022) Vol. 82, Iss. 9, pp. 13369-13399
Closed Access | Times Cited: 24
Hybrid of WOA-ABC and proposed CNN for intrusion detection system in wireless sensor networks
Khurram Hussain, Yuanqing Xia, Ameer N. Onaizah, et al.
Optik (2022) Vol. 271, pp. 170145-170145
Closed Access | Times Cited: 24
Khurram Hussain, Yuanqing Xia, Ameer N. Onaizah, et al.
Optik (2022) Vol. 271, pp. 170145-170145
Closed Access | Times Cited: 24
A Comparative Analysis Of African Vultures Optimization Algorithm With Current Metaheuristics
Sibel Arslan, Yıldız Zoralioğlu, Muhammed Furkan Gul
Osmaniye Korkut Ata Üniversitesi Fen Bilimleri Enstitüsü Dergisi (2025) Vol. 8, Iss. 1, pp. 325-352
Closed Access
Sibel Arslan, Yıldız Zoralioğlu, Muhammed Furkan Gul
Osmaniye Korkut Ata Üniversitesi Fen Bilimleri Enstitüsü Dergisi (2025) Vol. 8, Iss. 1, pp. 325-352
Closed Access
Large-Scale Feedforward Neural Network Optimization by a Self-Adaptive Strategy and Parameter Based Particle Swarm Optimization
Yu Xue, Tao Tang, Alex X. Liu
IEEE Access (2019) Vol. 7, pp. 52473-52483
Open Access | Times Cited: 37
Yu Xue, Tao Tang, Alex X. Liu
IEEE Access (2019) Vol. 7, pp. 52473-52483
Open Access | Times Cited: 37
A Modified Multi-objective Particle Swarm Optimizer-Based Lévy Flight: An Approach Toward Intrusion Detection in Internet of Things
Maria Habib, Ibrahim Aljarah, Hossam Faris
Arabian Journal for Science and Engineering (2020) Vol. 45, Iss. 8, pp. 6081-6108
Closed Access | Times Cited: 32
Maria Habib, Ibrahim Aljarah, Hossam Faris
Arabian Journal for Science and Engineering (2020) Vol. 45, Iss. 8, pp. 6081-6108
Closed Access | Times Cited: 32
A Lightweight Intelligent Intrusion Detection Model for Wireless Sensor Networks
Jeng‐Shyang Pan, Fang Fan, Shu‐Chuan Chu, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-15
Open Access | Times Cited: 29
Jeng‐Shyang Pan, Fang Fan, Shu‐Chuan Chu, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-15
Open Access | Times Cited: 29
Fractional order adaptive hunter-prey optimizer for feature selection
Amr M. AbdelAty, Dalia Yousri, Samia Allaoua Chelloug, et al.
Alexandria Engineering Journal (2023) Vol. 75, pp. 531-547
Open Access | Times Cited: 11
Amr M. AbdelAty, Dalia Yousri, Samia Allaoua Chelloug, et al.
Alexandria Engineering Journal (2023) Vol. 75, pp. 531-547
Open Access | Times Cited: 11
Performance Evaluation of Intrusion Detection System using Selected Features and Machine Learning Classifiers
Raja Azlina Raja Mahmood, AmirHossien Abdi, Masnida Hussin
Baghdad Science Journal (2021) Vol. 18, Iss. 2(Suppl.), pp. 0884-0884
Open Access | Times Cited: 26
Raja Azlina Raja Mahmood, AmirHossien Abdi, Masnida Hussin
Baghdad Science Journal (2021) Vol. 18, Iss. 2(Suppl.), pp. 0884-0884
Open Access | Times Cited: 26
A novel sophisticated hybrid method for intrusion detection using the artificial immune system
Ehsan Farzadnia, Hossein Shirazi, Alireza Nowroozi
Journal of Information Security and Applications (2021) Vol. 58, pp. 102721-102721
Closed Access | Times Cited: 25
Ehsan Farzadnia, Hossein Shirazi, Alireza Nowroozi
Journal of Information Security and Applications (2021) Vol. 58, pp. 102721-102721
Closed Access | Times Cited: 25
Network Intrusion Traffic Detection Based on Feature Extraction
Xuecheng Yu, Yan Huang, Yu Zhang, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 1, pp. 473-492
Open Access | Times Cited: 3
Xuecheng Yu, Yan Huang, Yu Zhang, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 1, pp. 473-492
Open Access | Times Cited: 3
Lightweight Anomaly Detection Scheme Using Incremental Principal Component Analysis and Support Vector Machine
Nurfazrina Mohd Zamry, Anazida Zainal, Murad A. Rassam, et al.
Sensors (2021) Vol. 21, Iss. 23, pp. 8017-8017
Open Access | Times Cited: 16
Nurfazrina Mohd Zamry, Anazida Zainal, Murad A. Rassam, et al.
Sensors (2021) Vol. 21, Iss. 23, pp. 8017-8017
Open Access | Times Cited: 16