
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Design of Metaheuristic Optimization Algorithms for Deep Learning Model for Secure IoT Environment
Amit Sagu, Nasib Singh Gill, Preeti Gulia, et al.
Sustainability (2023) Vol. 15, Iss. 3, pp. 2204-2204
Open Access | Times Cited: 25
Amit Sagu, Nasib Singh Gill, Preeti Gulia, et al.
Sustainability (2023) Vol. 15, Iss. 3, pp. 2204-2204
Open Access | Times Cited: 25
Showing 25 citing articles:
A Review on Nature-Inspired Algorithms for Cancer Disease Prediction and Classification
Abrar Yaqoob, Rabia Musheer Aziz, Navneet Kumar Verma, et al.
Mathematics (2023) Vol. 11, Iss. 5, pp. 1081-1081
Open Access | Times Cited: 56
Abrar Yaqoob, Rabia Musheer Aziz, Navneet Kumar Verma, et al.
Mathematics (2023) Vol. 11, Iss. 5, pp. 1081-1081
Open Access | Times Cited: 56
On the Implementation of the Artificial Neural Network Approach for Forecasting Different Healthcare Events
Huda M. Alshanbari, Hasnain Iftikhar, Faridoon Khan, et al.
Diagnostics (2023) Vol. 13, Iss. 7, pp. 1310-1310
Open Access | Times Cited: 25
Huda M. Alshanbari, Hasnain Iftikhar, Faridoon Khan, et al.
Diagnostics (2023) Vol. 13, Iss. 7, pp. 1310-1310
Open Access | Times Cited: 25
Meta-heuristics and deep learning for energy applications: Review and open research challenges (2018–2023)
Eghbal Hosseini, Abbas M. Al-Ghaili, Dler Hussein Kadir, et al.
Energy Strategy Reviews (2024) Vol. 53, pp. 101409-101409
Open Access | Times Cited: 13
Eghbal Hosseini, Abbas M. Al-Ghaili, Dler Hussein Kadir, et al.
Energy Strategy Reviews (2024) Vol. 53, pp. 101409-101409
Open Access | Times Cited: 13
Advanced computational techniques: Bridging metaheuristic optimization and deep learning for material design through image enhancement
Jagrati Talreja, Divya Chauhan
Elsevier eBooks (2025), pp. 197-228
Closed Access
Jagrati Talreja, Divya Chauhan
Elsevier eBooks (2025), pp. 197-228
Closed Access
Attacks on IoT: Side-Channel Power Acquisition Framework for Intrusion Detection
Dominic Lightbody, Duc‐Minh Ngo, Andriy Temko, et al.
Future Internet (2023) Vol. 15, Iss. 5, pp. 187-187
Open Access | Times Cited: 12
Dominic Lightbody, Duc‐Minh Ngo, Andriy Temko, et al.
Future Internet (2023) Vol. 15, Iss. 5, pp. 187-187
Open Access | Times Cited: 12
Self-Upgraded Cat Mouse Optimizer With Machine Learning Driven Lung Cancer Classification on Computed Tomography Imaging
Mahmoud Ragab, Iyad Katib, Sanaa Sharaf, et al.
IEEE Access (2023) Vol. 11, pp. 107972-107981
Open Access | Times Cited: 7
Mahmoud Ragab, Iyad Katib, Sanaa Sharaf, et al.
IEEE Access (2023) Vol. 11, pp. 107972-107981
Open Access | Times Cited: 7
Efficient optimization algorithms for various machine learning tasks, including classification, regression, and clustering
Hengki Tamando Sihotang, Marc K. Albert, Fristi Riandari, et al.
Idea Future Research (2023) Vol. 1, Iss. 1, pp. 14-24
Open Access | Times Cited: 5
Hengki Tamando Sihotang, Marc K. Albert, Fristi Riandari, et al.
Idea Future Research (2023) Vol. 1, Iss. 1, pp. 14-24
Open Access | Times Cited: 5
Secure multi-cloud resource allocation with SDN and self-adaptive authentication
Afnan M. Alhassan
Ain Shams Engineering Journal (2024) Vol. 15, Iss. 6, pp. 102742-102742
Open Access | Times Cited: 1
Afnan M. Alhassan
Ain Shams Engineering Journal (2024) Vol. 15, Iss. 6, pp. 102742-102742
Open Access | Times Cited: 1
A Review of Artificial Intelligence Techniques for Improved Cloud and IoT Security
Kassim Kalinaki, Wasswa Shafik, Magezi Masha, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 38-68
Closed Access | Times Cited: 1
Kassim Kalinaki, Wasswa Shafik, Magezi Masha, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 38-68
Closed Access | Times Cited: 1
A Robust Approach for Multi Classification-Based Intrusion Detection through Stacking Deep Learning Models
Samia Allaoua Chelloug
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 3, pp. 4845-4861
Open Access | Times Cited: 1
Samia Allaoua Chelloug
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 3, pp. 4845-4861
Open Access | Times Cited: 1
Metaheuristic machine learning for optimizing sustainable interior design: enhancing aesthetic and functional rehabilitation in housing projects
Mayyadah Fahmi Hussein, Mazin Arabasy, Mohammad Abukeshek, et al.
Asian Journal of Civil Engineering (2024)
Closed Access | Times Cited: 1
Mayyadah Fahmi Hussein, Mazin Arabasy, Mohammad Abukeshek, et al.
Asian Journal of Civil Engineering (2024)
Closed Access | Times Cited: 1
Multi-Objective Optimization of Two-Stage Helical Pairs in Helical Hydraulic Rotary Actuator Using Ensemble of Metamodels and NSGA-II
Song Liu, Baoren Li, Runlin Gan, et al.
Actuators (2023) Vol. 12, Iss. 10, pp. 385-385
Open Access | Times Cited: 3
Song Liu, Baoren Li, Runlin Gan, et al.
Actuators (2023) Vol. 12, Iss. 10, pp. 385-385
Open Access | Times Cited: 3
Preserving Users’ Sensitive Data in Physical and Virtual World Using Machine Learning: A Strategy
Nasib Singh Gill, Preeti Gulia, Amit Sagu, et al.
(2023), pp. 18-23
Closed Access | Times Cited: 3
Nasib Singh Gill, Preeti Gulia, Amit Sagu, et al.
(2023), pp. 18-23
Closed Access | Times Cited: 3
The Secured Optimization to Enhance the Maximum Target Audience in Online Advertising Using Deep Belief Networks
T Thiruvenkadam, Akhilendra Pratap Singh, Aakriti Chauhan
(2024), pp. 1-6
Closed Access
T Thiruvenkadam, Akhilendra Pratap Singh, Aakriti Chauhan
(2024), pp. 1-6
Closed Access
A comprehensive analysis of threat vectors in software-defined networking
Seema Dahiya, Harkesh Sehrawat, Seema Kharb, et al.
Multimedia Tools and Applications (2024) Vol. 83, Iss. 39, pp. 86791-86832
Closed Access
Seema Dahiya, Harkesh Sehrawat, Seema Kharb, et al.
Multimedia Tools and Applications (2024) Vol. 83, Iss. 39, pp. 86791-86832
Closed Access
DQ-NN and phantom routing for enhanced source location privacy for IoT under multiple source and destination
T. Arpitha, Dharamendra Chouhan, J Shreyas
EURASIP Journal on Information Security (2024) Vol. 2024, Iss. 1
Open Access
T. Arpitha, Dharamendra Chouhan, J Shreyas
EURASIP Journal on Information Security (2024) Vol. 2024, Iss. 1
Open Access
Extra dimension algorithm: a breakthrough for optimization and enhancing DNN efficiency
Eghbal Hosseini, Abbas M. Al-Ghaili, Dler Hussein Kadir, et al.
Artificial Intelligence Review (2024) Vol. 58, Iss. 1
Open Access
Eghbal Hosseini, Abbas M. Al-Ghaili, Dler Hussein Kadir, et al.
Artificial Intelligence Review (2024) Vol. 58, Iss. 1
Open Access
Dynamic adaptation of scan rates for efficient and congestion-aware internet-wide scanning in IoT security
A. Velayudham, M. S. Krishna Priya
Evolving Systems (2024) Vol. 16, Iss. 1
Closed Access
A. Velayudham, M. S. Krishna Priya
Evolving Systems (2024) Vol. 16, Iss. 1
Closed Access
Developing a Hybrid Approach with Whale Optimization and Deep Convolutional Neural Networks for Enhancing Security in Smart Home Environments’ Sustainability Through IoT Devices
R Kavitha, Balamurugan Vaithiyanathan
Sustainability (2024) Vol. 16, Iss. 24, pp. 11040-11040
Open Access
R Kavitha, Balamurugan Vaithiyanathan
Sustainability (2024) Vol. 16, Iss. 24, pp. 11040-11040
Open Access
Algorithmic means of ensuring network security and websites: trends, models, future cases
Gulmira Bekmagambetova, Anton Polukhin, V.A. Evdokimov, et al.
Revista Amazonia Investiga (2023) Vol. 12, Iss. 65, pp. 149-163
Open Access | Times Cited: 1
Gulmira Bekmagambetova, Anton Polukhin, V.A. Evdokimov, et al.
Revista Amazonia Investiga (2023) Vol. 12, Iss. 65, pp. 149-163
Open Access | Times Cited: 1
Intrusion detection system using metaheuristic fireworks optimization based feature selection with deep learning on Internet of Things environment
T. Jayasankar, R Buri, P. Maheswaravenkatesh
Journal of Forecasting (2023) Vol. 43, Iss. 2, pp. 415-428
Closed Access | Times Cited: 1
T. Jayasankar, R Buri, P. Maheswaravenkatesh
Journal of Forecasting (2023) Vol. 43, Iss. 2, pp. 415-428
Closed Access | Times Cited: 1
Research on smart grid management and security guarantee of sports stadiums based on GCNN-GRU and self-attention mechanism
Li Song
Frontiers in Energy Research (2023) Vol. 11
Open Access
Li Song
Frontiers in Energy Research (2023) Vol. 11
Open Access
New developed Methods used for Data Science Optimization
Mohamed Abdeldaiem Mahboub, T. Gopi Krishna
Research Square (Research Square) (2023)
Open Access
Mohamed Abdeldaiem Mahboub, T. Gopi Krishna
Research Square (Research Square) (2023)
Open Access
Security Framework for IoT Implementing Random Forest Classifier
Et al. Raju
International Journal on Recent and Innovation Trends in Computing and Communication (2023) Vol. 11, Iss. 9, pp. 4463-4470
Open Access
Et al. Raju
International Journal on Recent and Innovation Trends in Computing and Communication (2023) Vol. 11, Iss. 9, pp. 4463-4470
Open Access
IOT & Machine Learning Models to Develop The Architecture For Assessment Of Security Threats.
Mohammed Masaad Alotibi, Sivaram Rajeyyagari, Omaia Mohammed Al-Omari, et al.
(2023), pp. 1-6
Closed Access
Mohammed Masaad Alotibi, Sivaram Rajeyyagari, Omaia Mohammed Al-Omari, et al.
(2023), pp. 1-6
Closed Access