
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Network Intrusion Detection Based on Feature Selection and Hybrid Metaheuristic Optimization
Reem Alkanhel, El-Sayed M. El-kenawy, Abdelaziz A. Abdelhamid, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 74, Iss. 2, pp. 2677-2693
Open Access | Times Cited: 26
Reem Alkanhel, El-Sayed M. El-kenawy, Abdelaziz A. Abdelhamid, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 74, Iss. 2, pp. 2677-2693
Open Access | Times Cited: 26
Showing 1-25 of 26 citing articles:
Intrusion detection system for large-scale IoT NetFlow networks using machine learning with modified Arithmetic Optimization Algorithm
F.M.A. Salam, Sharif Naser Makhadmeh, Mohammed Awad, et al.
Internet of Things (2023) Vol. 22, pp. 100819-100819
Closed Access | Times Cited: 48
F.M.A. Salam, Sharif Naser Makhadmeh, Mohammed Awad, et al.
Internet of Things (2023) Vol. 22, pp. 100819-100819
Closed Access | Times Cited: 48
Advancing cybersecurity: a comprehensive review of AI-driven detection techniques
A Salem, Safaa M. Azzam, O. E. Emam, et al.
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 19
A Salem, Safaa M. Azzam, O. E. Emam, et al.
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 19
Leveraging Metaheuristics for Feature Selection With Machine Learning Classification for Malicious Packet Detection in Computer Networks
Aganith Shanbhag, Shweta Vincent, Bore Gowda S B, et al.
IEEE Access (2024) Vol. 12, pp. 21745-21764
Open Access | Times Cited: 5
Aganith Shanbhag, Shweta Vincent, Bore Gowda S B, et al.
IEEE Access (2024) Vol. 12, pp. 21745-21764
Open Access | Times Cited: 5
Bowerbird courtship-inspired feature selection for efficient high-dimensional data analysis using a novel meta-heuristic
S Kumar Reddy Mallidi, Rajeswara Rao Ramisetty
Deleted Journal (2025) Vol. 28, Iss. 1
Open Access
S Kumar Reddy Mallidi, Rajeswara Rao Ramisetty
Deleted Journal (2025) Vol. 28, Iss. 1
Open Access
A crossover-integrated Marine Predator Algorithm for feature selection in intrusion detection systems within IoT environments
Sharif Naser Makhadmeh, F.M.A. Salam, Mohammed Awad, et al.
Internet of Things (2025), pp. 101536-101536
Closed Access
Sharif Naser Makhadmeh, F.M.A. Salam, Mohammed Awad, et al.
Internet of Things (2025), pp. 101536-101536
Closed Access
Advancements in cache management: a review of machine learning innovations for enhanced performance and security
Keshav Krishna
Frontiers in Artificial Intelligence (2025) Vol. 8
Open Access
Keshav Krishna
Frontiers in Artificial Intelligence (2025) Vol. 8
Open Access
An enhanced method for intrusion detection systems in IoT environment
Qusay M. Alzubi, Yousef Sanjalawe, Sharif Naser Makhadmeh, et al.
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access
Qusay M. Alzubi, Yousef Sanjalawe, Sharif Naser Makhadmeh, et al.
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access
Optimization and Prediction of Colored Pervious Concrete Properties: Enhancing Performance through Augmented Grey Wolf Optimizer and Artificial Neural Networks
Ahmet Tugrul Koc, Sadık Alper Yıldızel
Materials Today Communications (2025), pp. 112069-112069
Closed Access
Ahmet Tugrul Koc, Sadık Alper Yıldızel
Materials Today Communications (2025), pp. 112069-112069
Closed Access
Golden jackal optimization algorithm with deep learning assisted intrusion detection system for network security
Nojood O. Aljehane, Hanan Abdullah Mengash, Majdy M. Eltahir, et al.
Alexandria Engineering Journal (2023) Vol. 86, pp. 415-424
Open Access | Times Cited: 14
Nojood O. Aljehane, Hanan Abdullah Mengash, Majdy M. Eltahir, et al.
Alexandria Engineering Journal (2023) Vol. 86, pp. 415-424
Open Access | Times Cited: 14
AI-driven improvement of monthly average rainfall forecasting in Mecca using grid search optimization for LSTM networks
Fehaid Alqahtani
Journal of Water and Climate Change (2024) Vol. 15, Iss. 4, pp. 1439-1458
Open Access | Times Cited: 4
Fehaid Alqahtani
Journal of Water and Climate Change (2024) Vol. 15, Iss. 4, pp. 1439-1458
Open Access | Times Cited: 4
A Hybrid Meta-heuristics Algorithm: XGBoost-Based Approach for IDS in IoT
Soumya Bajpai, Kapil Dev Sharma, Brijesh Kumar Chaurasia
SN Computer Science (2024) Vol. 5, Iss. 5
Closed Access | Times Cited: 4
Soumya Bajpai, Kapil Dev Sharma, Brijesh Kumar Chaurasia
SN Computer Science (2024) Vol. 5, Iss. 5
Closed Access | Times Cited: 4
Attentive transformer deep learning algorithm for intrusion detection on IoT systems using automatic Xplainable feature selection
Demóstenes Zegarra Rodríguez, Ogobuchi Daniel Okey, Siti Sarah Maidin, et al.
PLoS ONE (2023) Vol. 18, Iss. 10, pp. e0286652-e0286652
Open Access | Times Cited: 7
Demóstenes Zegarra Rodríguez, Ogobuchi Daniel Okey, Siti Sarah Maidin, et al.
PLoS ONE (2023) Vol. 18, Iss. 10, pp. e0286652-e0286652
Open Access | Times Cited: 7
An Improved Binary Crayfish Optimization Algorithm for Handling Feature Selection Task in Supervised Classification
Shaymaa E. Sorour, Lamia Hassan, Amr A. Abohany, et al.
Mathematics (2024) Vol. 12, Iss. 15, pp. 2364-2364
Open Access | Times Cited: 2
Shaymaa E. Sorour, Lamia Hassan, Amr A. Abohany, et al.
Mathematics (2024) Vol. 12, Iss. 15, pp. 2364-2364
Open Access | Times Cited: 2
Passive Rule-Based Approach to Detect Sinkhole Attack in RPL-Based Internet of Things Networks
Shadi Al-Sarawi, Mohammed Anbar, Basim Ahmad Alabsi, et al.
IEEE Access (2023) Vol. 11, pp. 94081-94093
Open Access | Times Cited: 6
Shadi Al-Sarawi, Mohammed Anbar, Basim Ahmad Alabsi, et al.
IEEE Access (2023) Vol. 11, pp. 94081-94093
Open Access | Times Cited: 6
A Novel CNN Model with Dimensionality Reduction for WSN Intrusion Detection
Ruqaya Abed Alhasan, Ekhlas Kadhum Hamza
Revue d intelligence artificielle (2023) Vol. 37, Iss. 5, pp. 1121-1131
Open Access | Times Cited: 5
Ruqaya Abed Alhasan, Ekhlas Kadhum Hamza
Revue d intelligence artificielle (2023) Vol. 37, Iss. 5, pp. 1121-1131
Open Access | Times Cited: 5
IBEDO-DE: A Novel ChatGPT-Enhanced Model for ImprovingEducational Outcomes through Data-Driven Insights and Student Perceptions
Shaymaa E. Sorour, Hosnia.M.M. Ahmed, Alizadeh Amin, et al.
Research Square (Research Square) (2024)
Open Access | Times Cited: 1
Shaymaa E. Sorour, Hosnia.M.M. Ahmed, Alizadeh Amin, et al.
Research Square (Research Square) (2024)
Open Access | Times Cited: 1
Cloud Computing Malware Detection Using Feature Selection Based on Optimized White Shark Algorithm (WSO)
Hossam M. J. Mustafa, Mohammad H. Al-Zyod
(2024), pp. 1-6
Closed Access | Times Cited: 1
Hossam M. J. Mustafa, Mohammad H. Al-Zyod
(2024), pp. 1-6
Closed Access | Times Cited: 1
OPSMOTE-ML: an optimized SMOTE with machine learning models for selective forwarding attack detection in low power and lossy networks of internet of things
Taief Alaa Al-Amiedy, Mohammed Anbar, Bahari Belaton
Cluster Computing (2024) Vol. 27, Iss. 9, pp. 12141-12184
Closed Access | Times Cited: 1
Taief Alaa Al-Amiedy, Mohammed Anbar, Bahari Belaton
Cluster Computing (2024) Vol. 27, Iss. 9, pp. 12141-12184
Closed Access | Times Cited: 1
A Novel Adaptive Sand Cat Swarm Optimization Algorithm for Feature Selection and Global Optimization
Ruru Liu, Rencheng Fang, Tao Zeng, et al.
Biomimetics (2024) Vol. 9, Iss. 11, pp. 701-701
Open Access | Times Cited: 1
Ruru Liu, Rencheng Fang, Tao Zeng, et al.
Biomimetics (2024) Vol. 9, Iss. 11, pp. 701-701
Open Access | Times Cited: 1
WSN intrusion detection method using improved spatiotemporal ResNet and GAN
Jing Yang
Open Computer Science (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1
Jing Yang
Open Computer Science (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1
An Intrusion Detection Method Based on a Universal Gravitation Clustering Algorithm
Jian Yu, Gao-Feng Yu, Xiangmei Xiao, et al.
Journal of Cyber Security (2024) Vol. 6, pp. 41-68
Open Access
Jian Yu, Gao-Feng Yu, Xiangmei Xiao, et al.
Journal of Cyber Security (2024) Vol. 6, pp. 41-68
Open Access
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
Marwa Mohammad Obaid, Muna Hadi Saleh
Journal of Engineering (2024) Vol. 30, Iss. 07, pp. 184-201
Open Access
Marwa Mohammad Obaid, Muna Hadi Saleh
Journal of Engineering (2024) Vol. 30, Iss. 07, pp. 184-201
Open Access
A multiscale approach for network intrusion detection based on variance–covariance subspace distance and EQL v2
Can Liu, Yu Fu, Kun Wang, et al.
Computers & Security (2024), pp. 104173-104173
Closed Access
Can Liu, Yu Fu, Kun Wang, et al.
Computers & Security (2024), pp. 104173-104173
Closed Access
Enhancing Intrusion Detection Systems with Dimensionality Reduction and Multi-Stacking Ensemble Techniques
Ali Mohammed Alsaffar, Mostafa Nouri-Baygi, Hamed M. Zolbanin
Algorithms (2024) Vol. 17, Iss. 12, pp. 550-550
Open Access
Ali Mohammed Alsaffar, Mostafa Nouri-Baygi, Hamed M. Zolbanin
Algorithms (2024) Vol. 17, Iss. 12, pp. 550-550
Open Access
Dual-path feature extraction based hybrid intrusion detection in IoT networks
Arun Kumar Silivery, K. Ram Mohan Rao, Ramana Solleti
Computers & Electrical Engineering (2024) Vol. 122, pp. 109949-109949
Closed Access
Arun Kumar Silivery, K. Ram Mohan Rao, Ramana Solleti
Computers & Electrical Engineering (2024) Vol. 122, pp. 109949-109949
Closed Access