OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Design of Metaheuristic Optimization Algorithms for Deep Learning Model for Secure IoT Environment
Amit Sagu, Nasib Singh Gill, Preeti Gulia, et al.
Sustainability (2023) Vol. 15, Iss. 3, pp. 2204-2204
Open Access | Times Cited: 25

Showing 25 citing articles:

A Review on Nature-Inspired Algorithms for Cancer Disease Prediction and Classification
Abrar Yaqoob, Rabia Musheer Aziz, Navneet Kumar Verma, et al.
Mathematics (2023) Vol. 11, Iss. 5, pp. 1081-1081
Open Access | Times Cited: 56

On the Implementation of the Artificial Neural Network Approach for Forecasting Different Healthcare Events
Huda M. Alshanbari, Hasnain Iftikhar, Faridoon Khan, et al.
Diagnostics (2023) Vol. 13, Iss. 7, pp. 1310-1310
Open Access | Times Cited: 25

Meta-heuristics and deep learning for energy applications: Review and open research challenges (2018–2023)
Eghbal Hosseini, Abbas M. Al-Ghaili, Dler Hussein Kadir, et al.
Energy Strategy Reviews (2024) Vol. 53, pp. 101409-101409
Open Access | Times Cited: 13

Attacks on IoT: Side-Channel Power Acquisition Framework for Intrusion Detection
Dominic Lightbody, Duc‐Minh Ngo, Andriy Temko, et al.
Future Internet (2023) Vol. 15, Iss. 5, pp. 187-187
Open Access | Times Cited: 12

Self-Upgraded Cat Mouse Optimizer With Machine Learning Driven Lung Cancer Classification on Computed Tomography Imaging
Mahmoud Ragab, Iyad Katib, Sanaa Sharaf, et al.
IEEE Access (2023) Vol. 11, pp. 107972-107981
Open Access | Times Cited: 7

Efficient optimization algorithms for various machine learning tasks, including classification, regression, and clustering
Hengki Tamando Sihotang, Marc K. Albert, Fristi Riandari, et al.
Idea Future Research (2023) Vol. 1, Iss. 1, pp. 14-24
Open Access | Times Cited: 5

Secure multi-cloud resource allocation with SDN and self-adaptive authentication
Afnan M. Alhassan
Ain Shams Engineering Journal (2024) Vol. 15, Iss. 6, pp. 102742-102742
Open Access | Times Cited: 1

A Review of Artificial Intelligence Techniques for Improved Cloud and IoT Security
Kassim Kalinaki, Wasswa Shafik, Magezi Masha, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 38-68
Closed Access | Times Cited: 1

A Robust Approach for Multi Classification-Based Intrusion Detection through Stacking Deep Learning Models
Samia Allaoua Chelloug
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 3, pp. 4845-4861
Open Access | Times Cited: 1

Metaheuristic machine learning for optimizing sustainable interior design: enhancing aesthetic and functional rehabilitation in housing projects
Mayyadah Fahmi Hussein, Mazin Arabasy, Mohammad Abukeshek, et al.
Asian Journal of Civil Engineering (2024)
Closed Access | Times Cited: 1

Multi-Objective Optimization of Two-Stage Helical Pairs in Helical Hydraulic Rotary Actuator Using Ensemble of Metamodels and NSGA-II
Song Liu, Baoren Li, Runlin Gan, et al.
Actuators (2023) Vol. 12, Iss. 10, pp. 385-385
Open Access | Times Cited: 3

Preserving Users’ Sensitive Data in Physical and Virtual World Using Machine Learning: A Strategy
Nasib Singh Gill, Preeti Gulia, Amit Sagu, et al.
(2023), pp. 18-23
Closed Access | Times Cited: 3

The Secured Optimization to Enhance the Maximum Target Audience in Online Advertising Using Deep Belief Networks
T Thiruvenkadam, Akhilendra Pratap Singh, Aakriti Chauhan
(2024), pp. 1-6
Closed Access

A comprehensive analysis of threat vectors in software-defined networking
Seema Dahiya, Harkesh Sehrawat, Seema Kharb, et al.
Multimedia Tools and Applications (2024) Vol. 83, Iss. 39, pp. 86791-86832
Closed Access

DQ-NN and phantom routing for enhanced source location privacy for IoT under multiple source and destination
T. Arpitha, Dharamendra Chouhan, J Shreyas
EURASIP Journal on Information Security (2024) Vol. 2024, Iss. 1
Open Access

Extra dimension algorithm: a breakthrough for optimization and enhancing DNN efficiency
Eghbal Hosseini, Abbas M. Al-Ghaili, Dler Hussein Kadir, et al.
Artificial Intelligence Review (2024) Vol. 58, Iss. 1
Open Access

Dynamic adaptation of scan rates for efficient and congestion-aware internet-wide scanning in IoT security
A. Velayudham, M. S. Krishna Priya
Evolving Systems (2024) Vol. 16, Iss. 1
Closed Access

Algorithmic means of ensuring network security and websites: trends, models, future cases
Gulmira Bekmagambetova, Anton Polukhin, V.A. Evdokimov, et al.
Revista Amazonia Investiga (2023) Vol. 12, Iss. 65, pp. 149-163
Open Access | Times Cited: 1

Intrusion detection system using metaheuristic fireworks optimization based feature selection with deep learning on Internet of Things environment
T. Jayasankar, R Buri, P. Maheswaravenkatesh
Journal of Forecasting (2023) Vol. 43, Iss. 2, pp. 415-428
Closed Access | Times Cited: 1

New developed Methods used for Data Science Optimization
Mohamed Abdeldaiem Mahboub, T. Gopi Krishna
Research Square (Research Square) (2023)
Open Access

Security Framework for IoT Implementing Random Forest Classifier
Et al. Raju
International Journal on Recent and Innovation Trends in Computing and Communication (2023) Vol. 11, Iss. 9, pp. 4463-4470
Open Access

IOT & Machine Learning Models to Develop The Architecture For Assessment Of Security Threats.
Mohammed Masaad Alotibi, Sivaram Rajeyyagari, Omaia Mohammed Al-Omari, et al.
(2023), pp. 1-6
Closed Access

Page 1

Scroll to top