OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Using Embedded Feature Selection and CNN for Classification on CCD-INID-V1—A New IoT Dataset
Zhipeng Liu, Niraj Thapa, Addison Shaver, et al.
Sensors (2021) Vol. 21, Iss. 14, pp. 4834-4834
Open Access | Times Cited: 38

Showing 1-25 of 38 citing articles:

NFStream
Zied Aouini, Adrián Pekár
Computer Networks (2022) Vol. 204, pp. 108719-108719
Open Access | Times Cited: 59

SCADA intrusion detection scheme exploiting the fusion of modified decision tree and Chi-square feature selection
Love Allen Chijioke Ahakonye, Cosmas Ifeanyi Nwakanma, Jae‐Min Lee, et al.
Internet of Things (2022) Vol. 21, pp. 100676-100676
Open Access | Times Cited: 51

DDoS Attack Detection in IoT-Based Networks Using Machine Learning Models: A Survey and Research Directions
Amal A. Alahmadi, Malak Aljabri, Fahd Alhaidari, et al.
Electronics (2023) Vol. 12, Iss. 14, pp. 3103-3103
Open Access | Times Cited: 31

A Survey of Public IoT Datasets for Network Security Research
François De Keersmaeker, Yinan Cao, Gorby Kabasele Ndonda, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 3, pp. 1808-1840
Closed Access | Times Cited: 30

A Comprehensive Survey for IoT Security Datasets Taxonomy, Classification and Machine Learning Mechanisms
Christin Alex, Giselle Creado, Wesam Almobaideen, et al.
Computers & Security (2023) Vol. 132, pp. 103283-103283
Closed Access | Times Cited: 26

VMFCVD: An Optimized Framework to Combat Volumetric DDoS Attacks using Machine Learning
Arvind Prasad, Shalini Chandra
Arabian Journal for Science and Engineering (2022) Vol. 47, Iss. 8, pp. 9965-9983
Open Access | Times Cited: 32

Feature selection for online streaming high-dimensional data: A state-of-the-art review
Ezzatul Akmal Kamaru Zaman, Azlinah Mohamed, Azlin Ahmad
Applied Soft Computing (2022) Vol. 127, pp. 109355-109355
Closed Access | Times Cited: 28

Agnostic CH-DT Technique for SCADA Network High-Dimensional Data-Aware Intrusion Detection System
Love Allen Chijioke Ahakonye, Cosmas Ifeanyi Nwakanma, Jae‐Min Lee, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 12, pp. 10344-10356
Closed Access | Times Cited: 21

Insights into Modern Intrusion Detection Strategies for Internet of Things Ecosystems
Bassey Isong, Otshepeng Kgote, Adnan M. Abu‐Mahfouz
Electronics (2024) Vol. 13, Iss. 12, pp. 2370-2370
Open Access | Times Cited: 6

Application of Machine Learning Algorithms for the Validation of a New CoAP-IoT Anomaly Detection Dataset
Laura Vigoya, Alberto Pardal, Diego Fernández, et al.
Applied Sciences (2023) Vol. 13, Iss. 7, pp. 4482-4482
Open Access | Times Cited: 13

An Improved Binary Simulated Annealing Algorithm and TPE-FL-LightGBM for Fast Network Intrusion Detection
Yafei Luo, Ruihan Chen, Chuantao Li, et al.
Electronics (2025) Vol. 14, Iss. 2, pp. 231-231
Open Access

Deep Learning-driven Methods for Network-based Intrusion Detection Systems: A Systematic Review
Ramya Chinnasamy, Malliga Subramanian, Sathishkumar Veerappampalayam Easwaramoorthy, et al.
ICT Express (2025)
Open Access

Improved Salp Swarm Optimization Algorithm based on a Robust Search Strategy and a Novel Local Search Algorithm for Feature Selection Problems
Mahdieh Khorashadizade, Elham Abbasi, Seyed Abolfazl Shahzadeh Fazeli
Chemometrics and Intelligent Laboratory Systems (2025) Vol. 258, pp. 105343-105343
Closed Access

Efficient prediction of cyber crime breaches using decision tree compared with Naïve Bayes with improved accuracy
K. Venkateshwarprasad, K. Sashirekha
AIP conference proceedings (2025) Vol. 3270, pp. 020065-020065
Closed Access

A Novel Method for Survival Prediction of Hepatocellular Carcinoma Using Feature-Selection Techniques
Mona A. S. Ali, Rasha Orban, R. R. Rajalaxmi, et al.
Applied Sciences (2022) Vol. 12, Iss. 13, pp. 6427-6427
Open Access | Times Cited: 17

Vulnerability detection through cross-modal feature enhancement and fusion
Wenxin Tao, Xiaohong Su, Jiayuan Wan, et al.
Computers & Security (2023) Vol. 132, pp. 103341-103341
Closed Access | Times Cited: 9

A systematic literature review of recent lightweight detection approaches leveraging machine and deep learning mechanisms in Internet of Things networks
Ghada AL Mukhaini, Mohammed Anbar, Selvakumar Manickam, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 36, Iss. 1, pp. 101866-101866
Open Access | Times Cited: 9

Anomaly-Based Intrusion on IoT Networks Using AIGAN-a Generative Adversarial Network
Zhipeng Liu, Junyi Hu, Yang Liu, et al.
IEEE Access (2023) Vol. 11, pp. 91116-91132
Open Access | Times Cited: 8

BotDefender: A Collaborative Defense Framework Against Botnet Attacks using Network Traffic Analysis and Machine Learning
Arvind Prasad, Shalini Chandra
Arabian Journal for Science and Engineering (2023) Vol. 49, Iss. 3, pp. 3313-3329
Closed Access | Times Cited: 7

Adaptive threshold optimisation for online feature selection using dynamic particle swarm optimisation in determining feature relevancy and redundancy
Ezzatul Akmal Kamaru Zaman, Azlin Ahmad, Azlinah Mohamed
Applied Soft Computing (2024) Vol. 156, pp. 111477-111477
Closed Access | Times Cited: 2

Securing IoT network with hybrid evolutionary lion intrusion detection system: a composite motion optimisation algorithm for feature selection and ensemble classification
Anuvelavan Subramaniam, Sureshkumar Chelladurai, Stanly Kumar Ande, et al.
Journal of Experimental & Theoretical Artificial Intelligence (2024), pp. 1-23
Closed Access | Times Cited: 2

An Intrusion Detection System for IoT Using KNN and Decision-Tree Based Classification
Zainab Hussam Abdaljabar, Osman N. Uçan, Khattab M. Ali Alheeti
(2021)
Closed Access | Times Cited: 17

IoT Dataset Validation Using Machine Learning Techniques for Traffic Anomaly Detection
Laura Vigoya, Diego Fernández, Víctor Carneiro, et al.
Electronics (2021) Vol. 10, Iss. 22, pp. 2857-2857
Open Access | Times Cited: 14

IoT Intrusion Detection: A Review of ML and DL-Based Approaches
Imane Rakine, Kamal El Guemmat, Sara Ouahabi, et al.
(2024) Vol. 12, pp. 1-7
Closed Access | Times Cited: 1

A hybrid feature selection and aggregation strategy-based stacking ensemble technique for network intrusion detection
Yongqing Huang, Guoqing Chen, Jin Gou, et al.
Applied Intelligence (2024) Vol. 55, Iss. 1
Closed Access | Times Cited: 1

Page 1 - Next Page

Scroll to top