
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An Effective Ensemble Automatic Feature Selection Method for Network Intrusion Detection
Yang Zhang, Hongpo Zhang, Bo Zhang
Information (2022) Vol. 13, Iss. 7, pp. 314-314
Open Access | Times Cited: 19
Yang Zhang, Hongpo Zhang, Bo Zhang
Information (2022) Vol. 13, Iss. 7, pp. 314-314
Open Access | Times Cited: 19
Showing 19 citing articles:
Improved discrete salp swarm algorithm using exploration and exploitation techniques for feature selection in intrusion detection systems
Malek Barhoush, Bilal H. Abed-alguni, Nour Alqudah
The Journal of Supercomputing (2023) Vol. 79, Iss. 18, pp. 21265-21309
Closed Access | Times Cited: 24
Malek Barhoush, Bilal H. Abed-alguni, Nour Alqudah
The Journal of Supercomputing (2023) Vol. 79, Iss. 18, pp. 21265-21309
Closed Access | Times Cited: 24
Intrusion Detection using hybridized Meta-heuristic techniques with Weighted XGBoost Classifier
Ghulam Mohi-Ud-Din, Lin Zhijun, Jiangbin Zheng, et al.
Expert Systems with Applications (2023) Vol. 232, pp. 120596-120596
Closed Access | Times Cited: 16
Ghulam Mohi-Ud-Din, Lin Zhijun, Jiangbin Zheng, et al.
Expert Systems with Applications (2023) Vol. 232, pp. 120596-120596
Closed Access | Times Cited: 16
Optimizing intrusion detection using intelligent feature selection with machine learning model
Nojood O. Aljehane, Hanan Abdullah Mengash, Siwar Ben Haj Hassine, et al.
Alexandria Engineering Journal (2024) Vol. 91, pp. 39-49
Open Access | Times Cited: 5
Nojood O. Aljehane, Hanan Abdullah Mengash, Siwar Ben Haj Hassine, et al.
Alexandria Engineering Journal (2024) Vol. 91, pp. 39-49
Open Access | Times Cited: 5
An Extensive Review of Machine Learning and Deep Learning Techniques on Network Intrusion Detection for IoT
Supongmen Walling, Sibesh Lodh
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 2
Closed Access
Supongmen Walling, Sibesh Lodh
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 2
Closed Access
ELIDS: Ensemble Feature Selection for Lightweight IDS against DDoS attacks in resource-constrained IoT environment
Mahawish Fatima, Osama Rehman, Saqib Ali, et al.
Future Generation Computer Systems (2024) Vol. 159, pp. 172-187
Closed Access | Times Cited: 4
Mahawish Fatima, Osama Rehman, Saqib Ali, et al.
Future Generation Computer Systems (2024) Vol. 159, pp. 172-187
Closed Access | Times Cited: 4
BOC-PDO: an intrusion detection model using binary opposition cellular prairie dog optimization algorithm
Bilal H. Abed-alguni, Basil M. Alzboun, Noor Aldeen Alawad
Cluster Computing (2024) Vol. 27, Iss. 10, pp. 14417-14449
Closed Access | Times Cited: 3
Bilal H. Abed-alguni, Basil M. Alzboun, Noor Aldeen Alawad
Cluster Computing (2024) Vol. 27, Iss. 10, pp. 14417-14449
Closed Access | Times Cited: 3
Feature Selection Techniques in Intrusion Detection: A Comprehensive Review
Lubna Thanoon Alkahla, Maher Khalaf Hussein, Asmaa Alqassab
Iraqi Journal for Computers and Informatics (2024) Vol. 50, Iss. 1, pp. 46-53
Open Access | Times Cited: 2
Lubna Thanoon Alkahla, Maher Khalaf Hussein, Asmaa Alqassab
Iraqi Journal for Computers and Informatics (2024) Vol. 50, Iss. 1, pp. 46-53
Open Access | Times Cited: 2
Anomaly detection in network traffic with ELSC learning algorithm
Muhammad Muntazir Khan, Muhammad Zubair Rehman, Abdullah Khan, et al.
Electronics Letters (2024) Vol. 60, Iss. 14
Open Access | Times Cited: 2
Muhammad Muntazir Khan, Muhammad Zubair Rehman, Abdullah Khan, et al.
Electronics Letters (2024) Vol. 60, Iss. 14
Open Access | Times Cited: 2
Towards Ensemble Feature Selection for Lightweight Intrusion Detection in Resource-Constrained IoT Devices
Mahawish Fatima, Osama Rehman, Ibrahim M. H. Rahman, et al.
Future Internet (2024) Vol. 16, Iss. 10, pp. 368-368
Open Access | Times Cited: 2
Mahawish Fatima, Osama Rehman, Ibrahim M. H. Rahman, et al.
Future Internet (2024) Vol. 16, Iss. 10, pp. 368-368
Open Access | Times Cited: 2
Securing IoT networks in cloud computing environments: a real-time IDS
Soham Biswas, Md. Sarfaraj Alam Ansari
The Journal of Supercomputing (2024) Vol. 80, Iss. 10, pp. 14489-14519
Closed Access | Times Cited: 1
Soham Biswas, Md. Sarfaraj Alam Ansari
The Journal of Supercomputing (2024) Vol. 80, Iss. 10, pp. 14489-14519
Closed Access | Times Cited: 1
Network intrusion detection system for IoT security using machine learning and statistical based hybrid feature selection
Supongmen Walling, Sibesh Lodh
Security and Privacy (2024)
Closed Access | Times Cited: 1
Supongmen Walling, Sibesh Lodh
Security and Privacy (2024)
Closed Access | Times Cited: 1
Improved Supervised and Unsupervised Metaheuristic-Based Approaches to Detect Intrusion in Various Datasets
Ouail Mjahed, Salah El Hadaj, El Mahdi El Guarmah, et al.
Computer Modeling in Engineering & Sciences (2023) Vol. 137, Iss. 1, pp. 265-298
Open Access | Times Cited: 3
Ouail Mjahed, Salah El Hadaj, El Mahdi El Guarmah, et al.
Computer Modeling in Engineering & Sciences (2023) Vol. 137, Iss. 1, pp. 265-298
Open Access | Times Cited: 3
An Integrated Force Myography and SVM-Based Machine Learning System for Enhanced Muscle Exertion Assessment in Industrial Settings
Souha Baklouti, Taysir Rezgui, Abdelbadiâ Chaker, et al.
Arabian Journal for Science and Engineering (2024)
Closed Access
Souha Baklouti, Taysir Rezgui, Abdelbadiâ Chaker, et al.
Arabian Journal for Science and Engineering (2024)
Closed Access
Intrusion Detection System Using Improved Gloden Jackal optimization for Security and Privacy in Internet of Things
Naresh Kumar Bhagavatham, Mohammed Al-Farouni, Komuravelly Sudheer Kumar, et al.
(2024), pp. 1-5
Closed Access
Naresh Kumar Bhagavatham, Mohammed Al-Farouni, Komuravelly Sudheer Kumar, et al.
(2024), pp. 1-5
Closed Access
New Denial of Service Attacks Detection Approach Using Hybridized Deep Neural Networks and Balanced Datasets
Ouail Mjahed, Salah El Hadaj, El Mahdi El Guarmah, et al.
Computer Systems Science and Engineering (2023) Vol. 47, Iss. 1, pp. 757-775
Open Access | Times Cited: 1
Ouail Mjahed, Salah El Hadaj, El Mahdi El Guarmah, et al.
Computer Systems Science and Engineering (2023) Vol. 47, Iss. 1, pp. 757-775
Open Access | Times Cited: 1
Association Rules for Buffer Overflow Vulnerability Detection Using Machine Learning
Intisar Al-Mandhari, Ahmed AlKalbani, Abdulaziz Al-Abri
Lecture notes in networks and systems (2023), pp. 599-614
Closed Access
Intisar Al-Mandhari, Ahmed AlKalbani, Abdulaziz Al-Abri
Lecture notes in networks and systems (2023), pp. 599-614
Closed Access
Protocol-Based Multi-Ensemble Classifier for Intrusion Detection Using Packet Header Fields
Vishnu Prasad Shenoy, B. Malarkodi, Michael Kutty
(2023)
Closed Access
Vishnu Prasad Shenoy, B. Malarkodi, Michael Kutty
(2023)
Closed Access
An AdamW-Based Deep Neural Network Using Feature Selection and Data Oversampling for Intrusion Detection
Zhuoer Lu, Xiaoyong Li, Pengfei Qiu
(2023), pp. 213-220
Closed Access
Zhuoer Lu, Xiaoyong Li, Pengfei Qiu
(2023), pp. 213-220
Closed Access
Sparse Autoencoder with SGReLU Activation Based Network Intrusion Detection System
Chandra Sekar P, Komuravelly Sudheer Kumar, Garikapati Bindu, et al.
(2023), pp. 1-5
Closed Access
Chandra Sekar P, Komuravelly Sudheer Kumar, Garikapati Bindu, et al.
(2023), pp. 1-5
Closed Access