
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
IoT information theft prediction using ensemble feature selection
Joffrey L. Leevy, John Hancock, Taghi M. Khoshgoftaar, et al.
Journal Of Big Data (2022) Vol. 9, Iss. 1
Open Access | Times Cited: 21
Joffrey L. Leevy, John Hancock, Taghi M. Khoshgoftaar, et al.
Journal Of Big Data (2022) Vol. 9, Iss. 1
Open Access | Times Cited: 21
Showing 21 citing articles:
Optimizing IoT intrusion detection system: feature selection versus feature extraction in machine learning
Jing Li, Mohd Shahizan Othman, Hewan Chen, et al.
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 32
Jing Li, Mohd Shahizan Othman, Hewan Chen, et al.
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 32
Machine Learning-Enabled Internet of Things (IoT): Data, Applications, and Industry Perspective
Jamal Bzai, Furqan Alam, Arwa Dhafer, et al.
Electronics (2022) Vol. 11, Iss. 17, pp. 2676-2676
Open Access | Times Cited: 54
Jamal Bzai, Furqan Alam, Arwa Dhafer, et al.
Electronics (2022) Vol. 11, Iss. 17, pp. 2676-2676
Open Access | Times Cited: 54
An end-to-end intrusion detection system with IoT dataset using deep learning with unsupervised feature extraction
Yesi Novaria Kunang, Siti Nurmaini, Deris Stiawan, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 1619-1648
Closed Access | Times Cited: 10
Yesi Novaria Kunang, Siti Nurmaini, Deris Stiawan, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 1619-1648
Closed Access | Times Cited: 10
Multi-Channel Assessment Policies for Energy-Efficient Data Transmission in Wireless Underground Sensor Networks
S. Rajasoundaran, Prince Mary Stanislaus, Senthil Ganesh Ramasamy, et al.
Energies (2023) Vol. 16, Iss. 5, pp. 2285-2285
Open Access | Times Cited: 11
S. Rajasoundaran, Prince Mary Stanislaus, Senthil Ganesh Ramasamy, et al.
Energies (2023) Vol. 16, Iss. 5, pp. 2285-2285
Open Access | Times Cited: 11
Efficient traffic-based IoT device identification using a feature selection approach with Lévy flight-based sine chaotic sub-swarm binary honey badger algorithm
Boxiong Wang, Hui Kang, Geng Sun, et al.
Applied Soft Computing (2024) Vol. 155, pp. 111455-111455
Closed Access | Times Cited: 4
Boxiong Wang, Hui Kang, Geng Sun, et al.
Applied Soft Computing (2024) Vol. 155, pp. 111455-111455
Closed Access | Times Cited: 4
Developing UI Network Traffic Analysis and Malicious Packet Detection System Application Using AI Algorithms
Sara Wahied Mohamed, Habib El-Rahman
Lecture notes on data engineering and communications technologies (2025), pp. 244-254
Closed Access
Sara Wahied Mohamed, Habib El-Rahman
Lecture notes on data engineering and communications technologies (2025), pp. 244-254
Closed Access
Hardware/Software Codesign of Real-Time Intrusion Detection System for Internet of Things Devices
Qingyu Zeng, Yuko Hara–Azumi
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 12, pp. 22351-22363
Open Access | Times Cited: 1
Qingyu Zeng, Yuko Hara–Azumi
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 12, pp. 22351-22363
Open Access | Times Cited: 1
A Hybrid Feature Extraction and Feature Selection Mechanism to Predict Disease in Plant Leaves
A Abisha, N. Bharathi
Journal of Advances in Information Technology (2024) Vol. 15, Iss. 4, pp. 480-491
Open Access | Times Cited: 1
A Abisha, N. Bharathi
Journal of Advances in Information Technology (2024) Vol. 15, Iss. 4, pp. 480-491
Open Access | Times Cited: 1
Enhancing IoT security: A comparative study of feature reduction techniques for intrusion detection system
Jing Li, Hewan Chen, Mohd Othman Shahizan, et al.
Intelligent Systems with Applications (2024) Vol. 23, pp. 200407-200407
Open Access | Times Cited: 1
Jing Li, Hewan Chen, Mohd Othman Shahizan, et al.
Intelligent Systems with Applications (2024) Vol. 23, pp. 200407-200407
Open Access | Times Cited: 1
IoT-Inspired Smart Theft Control Framework for Logistic Industry
Abed Alanazi, Abdullah Alqahtani, Shtwai Alsubai, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 23, pp. 38327-38336
Closed Access | Times Cited: 1
Abed Alanazi, Abdullah Alqahtani, Shtwai Alsubai, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 23, pp. 38327-38336
Closed Access | Times Cited: 1
Health monitoring of historic buildings using machine learning in real-time internet of things
Ahmed H. Eldeib, Ahmed Mohamed Abdelsalam, A. M. A. Shehata, et al.
Indonesian Journal of Electrical Engineering and Computer Science (2023) Vol. 32, Iss. 2, pp. 725-725
Open Access | Times Cited: 3
Ahmed H. Eldeib, Ahmed Mohamed Abdelsalam, A. M. A. Shehata, et al.
Indonesian Journal of Electrical Engineering and Computer Science (2023) Vol. 32, Iss. 2, pp. 725-725
Open Access | Times Cited: 3
D-Score: An expert-based method for assessing the detectability of IoT-related cyber-attacks
Yair Meidan, Daniel Benatar, Ron Bitton, et al.
Computers & Security (2022) Vol. 126, pp. 103073-103073
Open Access | Times Cited: 4
Yair Meidan, Daniel Benatar, Ron Bitton, et al.
Computers & Security (2022) Vol. 126, pp. 103073-103073
Open Access | Times Cited: 4
Missing Data Imputation Using Ensemble Learning Technique: A Review
K. Jegadeeswari, R. Ragunath, R. Rathipriya
Advances in intelligent systems and computing (2022), pp. 223-236
Closed Access | Times Cited: 3
K. Jegadeeswari, R. Ragunath, R. Rathipriya
Advances in intelligent systems and computing (2022), pp. 223-236
Closed Access | Times Cited: 3
Machine Learning in IoT: An In-Depth Dataset Analysis Based on Attack Detection
Kumari Tyagi, Anil Ahlawat, Himanshi Chaudhary
Communications in computer and information science (2024), pp. 332-348
Closed Access
Kumari Tyagi, Anil Ahlawat, Himanshi Chaudhary
Communications in computer and information science (2024), pp. 332-348
Closed Access
Prediction method of sugarcane important phenotype data based on multi-model and multi-task
Jihong Sun, Chen Sun, Zhaowen Li, et al.
PLoS ONE (2024) Vol. 19, Iss. 12, pp. e0312444-e0312444
Open Access
Jihong Sun, Chen Sun, Zhaowen Li, et al.
PLoS ONE (2024) Vol. 19, Iss. 12, pp. e0312444-e0312444
Open Access
ECBoA-OFS: An Ensemble Classification Model for Botnet Attacks based on Optimal Feature Selection using CPR in IoT
C. G., Kishor Kumar G, Siva Kumar A P
Journal of Machine and Computing (2024), pp. 870-885
Open Access
C. G., Kishor Kumar G, Siva Kumar A P
Journal of Machine and Computing (2024), pp. 870-885
Open Access
Blockchain-inspired intelligent framework for logistic theft control
Abed Alanazi, Abdullah Alqahtani, Shtwai Alsubai, et al.
Journal of Network and Computer Applications (2024) Vol. 234, pp. 104055-104055
Closed Access
Abed Alanazi, Abdullah Alqahtani, Shtwai Alsubai, et al.
Journal of Network and Computer Applications (2024) Vol. 234, pp. 104055-104055
Closed Access
Study on Classification Models Utilizing the Multilayer Perceptron Feature Selection and Ensemble Voting Classifier
Xiaohang Zhu, Huan Fang, Xinli Zhao
(2024), pp. 221-225
Closed Access
Xiaohang Zhu, Huan Fang, Xinli Zhao
(2024), pp. 221-225
Closed Access
Optimizing Iot Intrusion Detection System: Feature Selection Versus Feature Extraction in Machine Learning
Jing Li, Hewan Chen, Shahizan Othman Mohd, et al.
(2023)
Closed Access | Times Cited: 1
Jing Li, Hewan Chen, Shahizan Othman Mohd, et al.
(2023)
Closed Access | Times Cited: 1
Intrusion Detection on NF-BoT-IoT Dataset Using Artificial Intelligence Techniques
G. Aarthi, S. Sharon Priya, W. Aisha Banu
Advances in computational intelligence and robotics book series (2023), pp. 106-123
Closed Access
G. Aarthi, S. Sharon Priya, W. Aisha Banu
Advances in computational intelligence and robotics book series (2023), pp. 106-123
Closed Access
Advanced Feature Processing for IoT-Based Intrusion Detection System
Pham Văn Thinh, Tien Vu Huu, Minh Tuấn Nguyễn, et al.
2022 RIVF International Conference on Computing and Communication Technologies (RIVF) (2023), pp. 37-42
Closed Access
Pham Văn Thinh, Tien Vu Huu, Minh Tuấn Nguyễn, et al.
2022 RIVF International Conference on Computing and Communication Technologies (RIVF) (2023), pp. 37-42
Closed Access