OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Enhanced Coyote Optimization with Deep Learning Based Cloud-Intrusion Detection System
Abdullah Basahel, Bohari M. Yamin, Sulafah M. Basahel, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 74, Iss. 2, pp. 4319-4336
Open Access | Times Cited: 8

Showing 8 citing articles:

Intrusion detection system for large-scale IoT NetFlow networks using machine learning with modified Arithmetic Optimization Algorithm
F.M.A. Salam, Sharif Naser Makhadmeh, Mohammed Awad, et al.
Internet of Things (2023) Vol. 22, pp. 100819-100819
Closed Access | Times Cited: 49

A crossover-integrated Marine Predator Algorithm for feature selection in intrusion detection systems within IoT environments
Sharif Naser Makhadmeh, F.M.A. Salam, Mohammed Awad, et al.
Internet of Things (2025), pp. 101536-101536
Closed Access

Machine learning-inspired intrusion detection system for IoT: Security issues and future challenges
Tariq Ahamed Ahanger, Imdad Ullah, Shabbab Algamdi, et al.
Computers & Electrical Engineering (2025) Vol. 123, pp. 110265-110265
Closed Access

RETRACTED: Optimizing deep learning-based intrusion detection in cloud computing environment with chaotic tunicate swarm algorithm
C. Jansi Sophia Mary, K. Mahalakshmi
Journal of Intelligent & Fuzzy Systems (2024), pp. 1-13
Closed Access | Times Cited: 1

Enhancing IoT Security: Quantum-Level Resilience against Threats
Hosam Alhakami
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 78, Iss. 1, pp. 329-356
Open Access | Times Cited: 3

Modeling of Improved Sine Cosine Algorithm with Optimal Deep Learning-Enabled Security Solution
Latifah Almuqren, Mohammed Maray, Sumayh S. Aljameel, et al.
Electronics (2023) Vol. 12, Iss. 19, pp. 4130-4130
Open Access | Times Cited: 2

A Survey on Recent Intrusion Detection Systems in Cloud Environment
Belcaid Saad, Siham Aouad, Mostapha Zbakh
(2023), pp. 01-06
Closed Access | Times Cited: 1

Enhancing Cloud Storage Security with Intrusion Detection System using CNN and Grey Wolf Optimization Algorithm
G. Eswari, G.K. Monica, V.K. Deepak, et al.
2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS) (2023), pp. 557-563
Closed Access

Page 1

Scroll to top