
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Binary Chimp Optimization Algorithm with ML Based Intrusion Detection for Secure IoT-Assisted Wireless Sensor Networks
Mohammed Aljebreen, Manal Abdullah Alohali, Muhammad Kashif Saeed, et al.
Sensors (2023) Vol. 23, Iss. 8, pp. 4073-4073
Open Access | Times Cited: 10
Mohammed Aljebreen, Manal Abdullah Alohali, Muhammad Kashif Saeed, et al.
Sensors (2023) Vol. 23, Iss. 8, pp. 4073-4073
Open Access | Times Cited: 10
Showing 10 citing articles:
Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review
Shubhkirti Sharma, Vijay Kumar, Kamlesh Dutta
Internet of Things and Cyber-Physical Systems (2024) Vol. 4, pp. 258-267
Open Access | Times Cited: 8
Shubhkirti Sharma, Vijay Kumar, Kamlesh Dutta
Internet of Things and Cyber-Physical Systems (2024) Vol. 4, pp. 258-267
Open Access | Times Cited: 8
Optimising barrier placement for intrusion detection and prevention in WSNs
C. Kishor Kumar Reddy, Vijaya Sindhoori Kaza, P. R. Anisha, et al.
PLoS ONE (2024) Vol. 19, Iss. 2, pp. e0299334-e0299334
Open Access | Times Cited: 8
C. Kishor Kumar Reddy, Vijaya Sindhoori Kaza, P. R. Anisha, et al.
PLoS ONE (2024) Vol. 19, Iss. 2, pp. e0299334-e0299334
Open Access | Times Cited: 8
Recent Advances of Chimp Optimization Algorithm: Variants and Applications
Mohammad Sh. Daoud, Mohammad Shehab, Laith Abualigah, et al.
Journal of Bionic Engineering (2023) Vol. 20, Iss. 6, pp. 2840-2862
Closed Access | Times Cited: 10
Mohammad Sh. Daoud, Mohammad Shehab, Laith Abualigah, et al.
Journal of Bionic Engineering (2023) Vol. 20, Iss. 6, pp. 2840-2862
Closed Access | Times Cited: 10
Effective ensemble based intrusion detection and energy efficient load balancing using sunflower optimization in distributed wireless sensor network
V. S. Prasanth, A. Mary Posonia, A. Parveen Akhther
Multimedia Systems (2024) Vol. 30, Iss. 4
Closed Access | Times Cited: 3
V. S. Prasanth, A. Mary Posonia, A. Parveen Akhther
Multimedia Systems (2024) Vol. 30, Iss. 4
Closed Access | Times Cited: 3
Securing the Edge: CatBoost Classifier Optimized by the Lyrebird Algorithm to Detect Denial of Service Attacks in Internet of Things-Based Wireless Sensor Networks
Sennanur Srinivasan Abinayaa, Prakash Arumugam, Divya Bhavani Mohan, et al.
Future Internet (2024) Vol. 16, Iss. 10, pp. 381-381
Open Access | Times Cited: 2
Sennanur Srinivasan Abinayaa, Prakash Arumugam, Divya Bhavani Mohan, et al.
Future Internet (2024) Vol. 16, Iss. 10, pp. 381-381
Open Access | Times Cited: 2
Red Kite Optimization Algorithm With Average Ensemble Model for Intrusion Detection for Secure IoT
Fahad F. Alruwaili, Mashael M. Asiri, Fatma S. Alrayes, et al.
IEEE Access (2023) Vol. 11, pp. 131749-131758
Open Access | Times Cited: 6
Fahad F. Alruwaili, Mashael M. Asiri, Fatma S. Alrayes, et al.
IEEE Access (2023) Vol. 11, pp. 131749-131758
Open Access | Times Cited: 6
Adaptive convolutional-LSTM neural network with NADAM optimization for intrusion detection in underwater IoT wireless sensor networks
Samson S Arivumani, Mahesh Nagarajan
Engineering Research Express (2024) Vol. 6, Iss. 3, pp. 035243-035243
Closed Access | Times Cited: 1
Samson S Arivumani, Mahesh Nagarajan
Engineering Research Express (2024) Vol. 6, Iss. 3, pp. 035243-035243
Closed Access | Times Cited: 1
Comparative Study on Anomaly based Intrusion Detection using Deep Learning Techniques
S. Sabeena, S. Chitra
EAI Endorsed Transactions on Internet of Things (2024) Vol. 11
Open Access
S. Sabeena, S. Chitra
EAI Endorsed Transactions on Internet of Things (2024) Vol. 11
Open Access
Augmenting cybersecurity through attention based stacked autoencoder with optimization algorithm for detection and mitigation of attacks on IoT assisted networks
K. Sai Prasad, E. Laxmi Lydia, M. Rajesh, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
K. Sai Prasad, E. Laxmi Lydia, M. Rajesh, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
Analysis of Optimization Techniques of Throughput Capacity, Power and Energy for IoT Networks: A Critical Survey
Supriya Garlapati, G. Anil Kumar
SSRN Electronic Journal (2024)
Closed Access
Supriya Garlapati, G. Anil Kumar
SSRN Electronic Journal (2024)
Closed Access