
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Intrusion Detection System for IoT Based on Deep Learning and Modified Reptile Search Algorithm
Abdelghani Dahou, Mohamed Abd Elaziz, Samia Allaoua Chelloug, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-15
Open Access | Times Cited: 105
Abdelghani Dahou, Mohamed Abd Elaziz, Samia Allaoua Chelloug, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-15
Open Access | Times Cited: 105
Showing 1-25 of 105 citing articles:
A Survey of CNN-Based Network Intrusion Detection
Leila Mohammadpour, Teck Chaw Ling, Chee Sun Liew, et al.
Applied Sciences (2022) Vol. 12, Iss. 16, pp. 8162-8162
Open Access | Times Cited: 87
Leila Mohammadpour, Teck Chaw Ling, Chee Sun Liew, et al.
Applied Sciences (2022) Vol. 12, Iss. 16, pp. 8162-8162
Open Access | Times Cited: 87
Hybridized artificial intelligence models with nature-inspired algorithms for river flow modeling: A comprehensive review, assessment, and possible future research directions
Tao Hai, Sani I. Abba, Ahmed M. Al‐Areeq, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 129, pp. 107559-107559
Closed Access | Times Cited: 57
Tao Hai, Sani I. Abba, Ahmed M. Al‐Areeq, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 129, pp. 107559-107559
Closed Access | Times Cited: 57
Intrusion detection system for large-scale IoT NetFlow networks using machine learning with modified Arithmetic Optimization Algorithm
F.M.A. Salam, Sharif Naser Makhadmeh, Mohammed Awad, et al.
Internet of Things (2023) Vol. 22, pp. 100819-100819
Closed Access | Times Cited: 48
F.M.A. Salam, Sharif Naser Makhadmeh, Mohammed Awad, et al.
Internet of Things (2023) Vol. 22, pp. 100819-100819
Closed Access | Times Cited: 48
Enhancing Intrusion Detection Systems for IoT and Cloud Environments Using a Growth Optimizer Algorithm and Conventional Neural Networks
Abdulaziz Fatani, Abdelghani Dahou, Mohamed Abd Elaziz, et al.
Sensors (2023) Vol. 23, Iss. 9, pp. 4430-4430
Open Access | Times Cited: 42
Abdulaziz Fatani, Abdelghani Dahou, Mohamed Abd Elaziz, et al.
Sensors (2023) Vol. 23, Iss. 9, pp. 4430-4430
Open Access | Times Cited: 42
The explainable potential of coupling hybridized metaheuristics, XGBoost, and SHAP in revealing toluene behavior in the atmosphere
Nebojša Bačanin, Mirjana Perišić, Gordana Jovanović, et al.
The Science of The Total Environment (2024) Vol. 929, pp. 172195-172195
Closed Access | Times Cited: 15
Nebojša Bačanin, Mirjana Perišić, Gordana Jovanović, et al.
The Science of The Total Environment (2024) Vol. 929, pp. 172195-172195
Closed Access | Times Cited: 15
Review of the metaheuristic algorithms in applications: Visual analysis based on bibliometrics (1994–2023)
Guanghui Li, Taihua Zhang, Chieh-Yuan Tsai, et al.
Expert Systems with Applications (2024) Vol. 255, pp. 124857-124857
Closed Access | Times Cited: 15
Guanghui Li, Taihua Zhang, Chieh-Yuan Tsai, et al.
Expert Systems with Applications (2024) Vol. 255, pp. 124857-124857
Closed Access | Times Cited: 15
Anomaly Detection in Industrial IoT Using Distributional Reinforcement Learning and Generative Adversarial Networks
Hafsa Benaddi, Mohammed Jouhari, Khalil Ibrahimi, et al.
Sensors (2022) Vol. 22, Iss. 21, pp. 8085-8085
Open Access | Times Cited: 38
Hafsa Benaddi, Mohammed Jouhari, Khalil Ibrahimi, et al.
Sensors (2022) Vol. 22, Iss. 21, pp. 8085-8085
Open Access | Times Cited: 38
Binary improved white shark algorithm for intrusion detection systems
Noor Aldeen Alawad, Bilal H. Abed-alguni, Mohammed Azmi Al‐Betar, et al.
Neural Computing and Applications (2023) Vol. 35, Iss. 26, pp. 19427-19451
Closed Access | Times Cited: 27
Noor Aldeen Alawad, Bilal H. Abed-alguni, Mohammed Azmi Al‐Betar, et al.
Neural Computing and Applications (2023) Vol. 35, Iss. 26, pp. 19427-19451
Closed Access | Times Cited: 27
Distributed Blockchain-SDN Secure IoT System Based on ANN to Mitigate DDoS Attacks
Rihab Jmal, Walid Ghabri, Ramzi Guesmi, et al.
Applied Sciences (2023) Vol. 13, Iss. 8, pp. 4953-4953
Open Access | Times Cited: 26
Rihab Jmal, Walid Ghabri, Ramzi Guesmi, et al.
Applied Sciences (2023) Vol. 13, Iss. 8, pp. 4953-4953
Open Access | Times Cited: 26
Reptile Search Algorithm: Theory, Variants, Applications, and Performance Evaluation
Buddhadev Sasmal, Abdelazim G. Hussien, Arunita Das, et al.
Archives of Computational Methods in Engineering (2023) Vol. 31, Iss. 1, pp. 521-549
Closed Access | Times Cited: 25
Buddhadev Sasmal, Abdelazim G. Hussien, Arunita Das, et al.
Archives of Computational Methods in Engineering (2023) Vol. 31, Iss. 1, pp. 521-549
Closed Access | Times Cited: 25
Application of Swarm Intelligence Optimization Algorithms in Image Processing: A Comprehensive Review of Analysis, Synthesis, and Optimization
Minghai Xu, Li Cao, Dongwan Lu, et al.
Biomimetics (2023) Vol. 8, Iss. 2, pp. 235-235
Open Access | Times Cited: 23
Minghai Xu, Li Cao, Dongwan Lu, et al.
Biomimetics (2023) Vol. 8, Iss. 2, pp. 235-235
Open Access | Times Cited: 23
Modified reptile search algorithm with multi-hunting coordination strategy for global optimization problems
Di Wu, Changsheng Wen, Honghua Rao, et al.
Mathematical Biosciences & Engineering (2023) Vol. 20, Iss. 6, pp. 10090-10134
Open Access | Times Cited: 22
Di Wu, Changsheng Wen, Honghua Rao, et al.
Mathematical Biosciences & Engineering (2023) Vol. 20, Iss. 6, pp. 10090-10134
Open Access | Times Cited: 22
Improved Reptile Search Optimization Algorithm: Application on Regression and Classification Problems
Muhammad Kamran Khan, Muhammad Hamza Zafar, Saad Rashid, et al.
Applied Sciences (2023) Vol. 13, Iss. 2, pp. 945-945
Open Access | Times Cited: 21
Muhammad Kamran Khan, Muhammad Hamza Zafar, Saad Rashid, et al.
Applied Sciences (2023) Vol. 13, Iss. 2, pp. 945-945
Open Access | Times Cited: 21
Enhanced Intrusion Detection with LSTM-Based Model, Feature Selection, and SMOTE for Imbalanced Data
Hussein Ridha Sayegh, Dong Wang, Ali Mansour Al-madani
Applied Sciences (2024) Vol. 14, Iss. 2, pp. 479-479
Open Access | Times Cited: 13
Hussein Ridha Sayegh, Dong Wang, Ali Mansour Al-madani
Applied Sciences (2024) Vol. 14, Iss. 2, pp. 479-479
Open Access | Times Cited: 13
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Osama Rabie, Shitharth Selvarajan, Tawfiq Hasanin, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 11
Osama Rabie, Shitharth Selvarajan, Tawfiq Hasanin, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 11
Designing a modified feature aggregation model with hybrid sampling techniques for network intrusion detection
NarasimhaSwamy Biyyapu, Veerapaneni Esther Jyothi, Phani Praveen Surapaneni, et al.
Cluster Computing (2024) Vol. 27, Iss. 5, pp. 5913-5931
Closed Access | Times Cited: 9
NarasimhaSwamy Biyyapu, Veerapaneni Esther Jyothi, Phani Praveen Surapaneni, et al.
Cluster Computing (2024) Vol. 27, Iss. 5, pp. 5913-5931
Closed Access | Times Cited: 9
Intrusion detection systems for IoT based on bio-inspired and machine learning techniques: a systematic review of the literature
Rafika Saadouni, Chirihane Gherbi, Zibouda Aliouat, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 8655-8681
Closed Access | Times Cited: 7
Rafika Saadouni, Chirihane Gherbi, Zibouda Aliouat, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 8655-8681
Closed Access | Times Cited: 7
Hybrid Sine-Cosine Chimp optimization based feature selection with deep learning model for threat detection in IoT sensor networks
Mimouna Abdullah Alkhonaini, Alanoud Al Mazroa, Mohammed Aljebreen, et al.
Alexandria Engineering Journal (2024) Vol. 102, pp. 169-178
Open Access | Times Cited: 7
Mimouna Abdullah Alkhonaini, Alanoud Al Mazroa, Mohammed Aljebreen, et al.
Alexandria Engineering Journal (2024) Vol. 102, pp. 169-178
Open Access | Times Cited: 7
Federated AI-Enabled In-Vehicle Network Intrusion Detection for Internet of Vehicles
Jianfeng Yang, Jianling Hu, Tianqi Yu
Electronics (2022) Vol. 11, Iss. 22, pp. 3658-3658
Open Access | Times Cited: 29
Jianfeng Yang, Jianling Hu, Tianqi Yu
Electronics (2022) Vol. 11, Iss. 22, pp. 3658-3658
Open Access | Times Cited: 29
The Applications of Metaheuristics for Human Activity Recognition and Fall Detection Using Wearable Sensors: A Comprehensive Analysis
Mohammed A. A. Al‐qaness, Ahmed M. Helmi, Abdelghani Dahou, et al.
Biosensors (2022) Vol. 12, Iss. 10, pp. 821-821
Open Access | Times Cited: 28
Mohammed A. A. Al‐qaness, Ahmed M. Helmi, Abdelghani Dahou, et al.
Biosensors (2022) Vol. 12, Iss. 10, pp. 821-821
Open Access | Times Cited: 28
IBJA: An improved binary DJaya algorithm for feature selection
Bilal H. Abed-alguni, Saqer Hamzeh AL-Jarah
Journal of Computational Science (2023) Vol. 75, pp. 102201-102201
Closed Access | Times Cited: 18
Bilal H. Abed-alguni, Saqer Hamzeh AL-Jarah
Journal of Computational Science (2023) Vol. 75, pp. 102201-102201
Closed Access | Times Cited: 18
Enhancing Network Intrusion Detection Through the Application of the Dung Beetle Optimized Fusion Model
Yue Li, Jiale Zhang, Yiting Yan, et al.
IEEE Access (2024) Vol. 12, pp. 9483-9496
Open Access | Times Cited: 5
Yue Li, Jiale Zhang, Yiting Yan, et al.
IEEE Access (2024) Vol. 12, pp. 9483-9496
Open Access | Times Cited: 5
Overcoming the Challenges of Data Lack, Leakage, and Dimensionality in Intrusion Detection Systems: A Comprehensive Review
Mohamed Aly Bouke, Azizol Abdullah, Nur Izura Udzir, et al.
Journal of Communication and Information Systems (2024) Vol. 39, Iss. 2024, pp. 22-34
Open Access | Times Cited: 5
Mohamed Aly Bouke, Azizol Abdullah, Nur Izura Udzir, et al.
Journal of Communication and Information Systems (2024) Vol. 39, Iss. 2024, pp. 22-34
Open Access | Times Cited: 5
Modified artificial rabbits optimization combined with bottlenose dolphin optimizer in feature selection of network intrusion detection
Fukui Li, Hui Xu, Feng Qiu
Electronic Research Archive (2024) Vol. 32, Iss. 3, pp. 1770-1800
Open Access | Times Cited: 5
Fukui Li, Hui Xu, Feng Qiu
Electronic Research Archive (2024) Vol. 32, Iss. 3, pp. 1770-1800
Open Access | Times Cited: 5
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
Siva Surya Narayana Chintapalli, Satya Prakash Singh, Jaroslav Frnda, et al.
Heliyon (2024) Vol. 10, Iss. 8, pp. e29410-e29410
Open Access | Times Cited: 5
Siva Surya Narayana Chintapalli, Satya Prakash Singh, Jaroslav Frnda, et al.
Heliyon (2024) Vol. 10, Iss. 8, pp. e29410-e29410
Open Access | Times Cited: 5