OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Network Intrusion Detection Based on Feature Selection and Hybrid Metaheuristic Optimization
Reem Alkanhel, El-Sayed M. El-kenawy, Abdelaziz A. Abdelhamid, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 74, Iss. 2, pp. 2677-2693
Open Access | Times Cited: 26

Showing 1-25 of 26 citing articles:

Intrusion detection system for large-scale IoT NetFlow networks using machine learning with modified Arithmetic Optimization Algorithm
F.M.A. Salam, Sharif Naser Makhadmeh, Mohammed Awad, et al.
Internet of Things (2023) Vol. 22, pp. 100819-100819
Closed Access | Times Cited: 48

Advancing cybersecurity: a comprehensive review of AI-driven detection techniques
A Salem, Safaa M. Azzam, O. E. Emam, et al.
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 19

Leveraging Metaheuristics for Feature Selection With Machine Learning Classification for Malicious Packet Detection in Computer Networks
Aganith Shanbhag, Shweta Vincent, Bore Gowda S B, et al.
IEEE Access (2024) Vol. 12, pp. 21745-21764
Open Access | Times Cited: 5

A crossover-integrated Marine Predator Algorithm for feature selection in intrusion detection systems within IoT environments
Sharif Naser Makhadmeh, F.M.A. Salam, Mohammed Awad, et al.
Internet of Things (2025), pp. 101536-101536
Closed Access

An enhanced method for intrusion detection systems in IoT environment
Qusay M. Alzubi, Yousef Sanjalawe, Sharif Naser Makhadmeh, et al.
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access

Optimization and Prediction of Colored Pervious Concrete Properties: Enhancing Performance through Augmented Grey Wolf Optimizer and Artificial Neural Networks
Ahmet Tugrul Koc, Sadık Alper Yıldızel
Materials Today Communications (2025), pp. 112069-112069
Closed Access

Golden jackal optimization algorithm with deep learning assisted intrusion detection system for network security
Nojood O. Aljehane, Hanan Abdullah Mengash, Majdy M. Eltahir, et al.
Alexandria Engineering Journal (2023) Vol. 86, pp. 415-424
Open Access | Times Cited: 14

AI-driven improvement of monthly average rainfall forecasting in Mecca using grid search optimization for LSTM networks
Fehaid Alqahtani
Journal of Water and Climate Change (2024) Vol. 15, Iss. 4, pp. 1439-1458
Open Access | Times Cited: 4

A Hybrid Meta-heuristics Algorithm: XGBoost-Based Approach for IDS in IoT
Soumya Bajpai, Kapil Dev Sharma, Brijesh Kumar Chaurasia
SN Computer Science (2024) Vol. 5, Iss. 5
Closed Access | Times Cited: 4

Attentive transformer deep learning algorithm for intrusion detection on IoT systems using automatic Xplainable feature selection
Demóstenes Zegarra Rodríguez, Ogobuchi Daniel Okey, Siti Sarah Maidin, et al.
PLoS ONE (2023) Vol. 18, Iss. 10, pp. e0286652-e0286652
Open Access | Times Cited: 7

An Improved Binary Crayfish Optimization Algorithm for Handling Feature Selection Task in Supervised Classification
Shaymaa E. Sorour, Lamia Hassan, Amr A. Abohany, et al.
Mathematics (2024) Vol. 12, Iss. 15, pp. 2364-2364
Open Access | Times Cited: 2

Passive Rule-Based Approach to Detect Sinkhole Attack in RPL-Based Internet of Things Networks
Shadi Al-Sarawi, Mohammed Anbar, Basim Ahmad Alabsi, et al.
IEEE Access (2023) Vol. 11, pp. 94081-94093
Open Access | Times Cited: 6

A Novel CNN Model with Dimensionality Reduction for WSN Intrusion Detection
Ruqaya Abed Alhasan, Ekhlas Kadhum Hamza
Revue d intelligence artificielle (2023) Vol. 37, Iss. 5, pp. 1121-1131
Open Access | Times Cited: 5

IBEDO-DE: A Novel ChatGPT-Enhanced Model for ImprovingEducational Outcomes through Data-Driven Insights and Student Perceptions
Shaymaa E. Sorour, Hosnia.M.M. Ahmed, Alizadeh Amin, et al.
Research Square (Research Square) (2024)
Open Access | Times Cited: 1

Cloud Computing Malware Detection Using Feature Selection Based on Optimized White Shark Algorithm (WSO)
Hossam M. J. Mustafa, Mohammad H. Al-Zyod
(2024), pp. 1-6
Closed Access | Times Cited: 1

OPSMOTE-ML: an optimized SMOTE with machine learning models for selective forwarding attack detection in low power and lossy networks of internet of things
Taief Alaa Al-Amiedy, Mohammed Anbar, Bahari Belaton
Cluster Computing (2024) Vol. 27, Iss. 9, pp. 12141-12184
Closed Access | Times Cited: 1

A Novel Adaptive Sand Cat Swarm Optimization Algorithm for Feature Selection and Global Optimization
Ruru Liu, Rencheng Fang, Tao Zeng, et al.
Biomimetics (2024) Vol. 9, Iss. 11, pp. 701-701
Open Access | Times Cited: 1

WSN intrusion detection method using improved spatiotemporal ResNet and GAN
Jing Yang
Open Computer Science (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1

An Intrusion Detection Method Based on a Universal Gravitation Clustering Algorithm
Jian Yu, Gao-Feng Yu, Xiangmei Xiao, et al.
Journal of Cyber Security (2024) Vol. 6, pp. 41-68
Open Access

Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
Marwa Mohammad Obaid, Muna Hadi Saleh
Journal of Engineering (2024) Vol. 30, Iss. 07, pp. 184-201
Open Access

A multiscale approach for network intrusion detection based on variance–covariance subspace distance and EQL v2
Can Liu, Yu Fu, Kun Wang, et al.
Computers & Security (2024), pp. 104173-104173
Closed Access

Enhancing Intrusion Detection Systems with Dimensionality Reduction and Multi-Stacking Ensemble Techniques
Ali Mohammed Alsaffar, Mostafa Nouri-Baygi, Hamed M. Zolbanin
Algorithms (2024) Vol. 17, Iss. 12, pp. 550-550
Open Access

Dual-path feature extraction based hybrid intrusion detection in IoT networks
Arun Kumar Silivery, K. Ram Mohan Rao, Ramana Solleti
Computers & Electrical Engineering (2024) Vol. 122, pp. 109949-109949
Closed Access

Page 1 - Next Page

Scroll to top