
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
IoT Botnet Detection Using Salp Swarm and Ant Lion Hybrid Optimization Model
Ruba Abu Khurma, Iman Almomani, Ibrahim Aljarah
Symmetry (2021) Vol. 13, Iss. 8, pp. 1377-1377
Open Access | Times Cited: 44
Ruba Abu Khurma, Iman Almomani, Ibrahim Aljarah
Symmetry (2021) Vol. 13, Iss. 8, pp. 1377-1377
Open Access | Times Cited: 44
Showing 1-25 of 44 citing articles:
CPS-GUARD: Intrusion detection for cyber-physical systems and IoT devices using outlier-aware deep autoencoders
Marta Catillo, Antonio Pecchia, Umberto Villano
Computers & Security (2023) Vol. 129, pp. 103210-103210
Open Access | Times Cited: 42
Marta Catillo, Antonio Pecchia, Umberto Villano
Computers & Security (2023) Vol. 129, pp. 103210-103210
Open Access | Times Cited: 42
BotStop : Packet-based efficient and explainable IoT botnet detection using machine learning
Mohammed M. Alani
Computer Communications (2022) Vol. 193, pp. 53-62
Closed Access | Times Cited: 56
Mohammed M. Alani
Computer Communications (2022) Vol. 193, pp. 53-62
Closed Access | Times Cited: 56
A new intrusion detection system based on Moth–Flame Optimizer algorithm
Moutaz Alazab, Ruba Abu Khurma, Albara Awajan, et al.
Expert Systems with Applications (2022) Vol. 210, pp. 118439-118439
Closed Access | Times Cited: 46
Moutaz Alazab, Ruba Abu Khurma, Albara Awajan, et al.
Expert Systems with Applications (2022) Vol. 210, pp. 118439-118439
Closed Access | Times Cited: 46
Novel energy management scheme in IoT enabled smart irrigation system using optimized intelligence methods
Asif Irshad Khan, Fawaz Alsolami, Fahad Alqurashi, et al.
Engineering Applications of Artificial Intelligence (2022) Vol. 114, pp. 104996-104996
Closed Access | Times Cited: 42
Asif Irshad Khan, Fawaz Alsolami, Fahad Alqurashi, et al.
Engineering Applications of Artificial Intelligence (2022) Vol. 114, pp. 104996-104996
Closed Access | Times Cited: 42
Addressing Internet of Things security by enhanced sine cosine metaheuristics tuned hybrid machine learning model and results interpretation based on SHAP approach
Miloš Dobrojević, Miodrag Živković, Amit Chhabra, et al.
PeerJ Computer Science (2023) Vol. 9, pp. e1405-e1405
Open Access | Times Cited: 37
Miloš Dobrojević, Miodrag Živković, Amit Chhabra, et al.
PeerJ Computer Science (2023) Vol. 9, pp. e1405-e1405
Open Access | Times Cited: 37
Reliable Machine Learning Model for IIoT Botnet Detection
Fatma Taher, Mahmoud Abdel-Salam, Mohamed Elhoseny, et al.
IEEE Access (2023) Vol. 11, pp. 49319-49336
Open Access | Times Cited: 25
Fatma Taher, Mahmoud Abdel-Salam, Mohamed Elhoseny, et al.
IEEE Access (2023) Vol. 11, pp. 49319-49336
Open Access | Times Cited: 25
A new deep-learning with swarm based feature selection for intelligent intrusion detection for the Internet of things
R. Anushiya, V. Lavanya
Measurement Sensors (2023) Vol. 26, pp. 100700-100700
Open Access | Times Cited: 23
R. Anushiya, V. Lavanya
Measurement Sensors (2023) Vol. 26, pp. 100700-100700
Open Access | Times Cited: 23
Anomaly-based cyberattacks detection for smart homes: A systematic literature review
Juan Ignacio Iturbe Araya, Helena Rifà-Pous
Internet of Things (2023) Vol. 22, pp. 100792-100792
Open Access | Times Cited: 22
Juan Ignacio Iturbe Araya, Helena Rifà-Pous
Internet of Things (2023) Vol. 22, pp. 100792-100792
Open Access | Times Cited: 22
Novel hybrid of AOA-BSA with double adaptive and random spare for global optimization and engineering problems
Fatma A. Hashim, Ruba Abu Khurma, Dheeb Albashish, et al.
Alexandria Engineering Journal (2023) Vol. 73, pp. 543-577
Open Access | Times Cited: 19
Fatma A. Hashim, Ruba Abu Khurma, Dheeb Albashish, et al.
Alexandria Engineering Journal (2023) Vol. 73, pp. 543-577
Open Access | Times Cited: 19
Challenges and Limitation Analysis of an IoT-Dependent System for Deployment in Smart Healthcare Using Communication Standards Features
Shrikant Upadhyay, Mohit Kumar, Aditi Upadhyay, et al.
Sensors (2023) Vol. 23, Iss. 11, pp. 5155-5155
Open Access | Times Cited: 16
Shrikant Upadhyay, Mohit Kumar, Aditi Upadhyay, et al.
Sensors (2023) Vol. 23, Iss. 11, pp. 5155-5155
Open Access | Times Cited: 16
An intellectual intrusion detection system using Hybrid Hunger Games Search and Remora Optimization Algorithm for IoT wireless networks
Ravinder Kumar, Amita Malik, Virender Ranga
Knowledge-Based Systems (2022) Vol. 256, pp. 109762-109762
Closed Access | Times Cited: 26
Ravinder Kumar, Amita Malik, Virender Ranga
Knowledge-Based Systems (2022) Vol. 256, pp. 109762-109762
Closed Access | Times Cited: 26
Augmenting IoT Healthcare Security and Reliability with Early Detection of IoT Botnet Attacks
Atul Kumar, Ishu Sharma
(2023)
Closed Access | Times Cited: 13
Atul Kumar, Ishu Sharma
(2023)
Closed Access | Times Cited: 13
A Novel Hybrid Method Using Grey Wolf Algorithm and Genetic Algorithm for IoT Botnet DDoS Attacks Detection
Mahdieh Maazalahi, Soodeh Hosseini
International Journal of Computational Intelligence Systems (2025) Vol. 18, Iss. 1
Open Access
Mahdieh Maazalahi, Soodeh Hosseini
International Journal of Computational Intelligence Systems (2025) Vol. 18, Iss. 1
Open Access
An effective networks intrusion detection approach based on hybrid Harris Hawks and multi-layer perceptron
Moutaz Alazab, Ruba Abu Khurma, Pedro Á. Castillo, et al.
Egyptian Informatics Journal (2023) Vol. 25, pp. 100423-100423
Open Access | Times Cited: 11
Moutaz Alazab, Ruba Abu Khurma, Pedro Á. Castillo, et al.
Egyptian Informatics Journal (2023) Vol. 25, pp. 100423-100423
Open Access | Times Cited: 11
An Efficient Intrusion Detection Framework for Industrial Internet of Things Security
Samah Alshathri, Ayman El‐Sayed, Walid El‐Shafai, et al.
Computer Systems Science and Engineering (2023) Vol. 46, Iss. 1, pp. 819-834
Open Access | Times Cited: 10
Samah Alshathri, Ayman El‐Sayed, Walid El‐Shafai, et al.
Computer Systems Science and Engineering (2023) Vol. 46, Iss. 1, pp. 819-834
Open Access | Times Cited: 10
A deep analysis of nature-inspired and meta-heuristic algorithms for designing intrusion detection systems in cloud/edge and IoT: state-of-the-art techniques, challenges, and future directions
Wengui Hu, Cao Qingsong, Mehdi Darbandi, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 8789-8815
Closed Access | Times Cited: 3
Wengui Hu, Cao Qingsong, Mehdi Darbandi, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 8789-8815
Closed Access | Times Cited: 3
Feature selection for IoT botnet detection using equilibrium and Battle Royale Optimization
Qanita Bani Baker, Alaa Samarneh
Computers & Security (2024) Vol. 147, pp. 104060-104060
Closed Access | Times Cited: 2
Qanita Bani Baker, Alaa Samarneh
Computers & Security (2024) Vol. 147, pp. 104060-104060
Closed Access | Times Cited: 2
Elastic Hop Count Trickle Timer Algorithm in Internet of Things
Raja Masadeh, Bayan Al-Saaidah, Esra’a Masa’deh, et al.
Sustainability (2022) Vol. 14, Iss. 19, pp. 12417-12417
Open Access | Times Cited: 12
Raja Masadeh, Bayan Al-Saaidah, Esra’a Masa’deh, et al.
Sustainability (2022) Vol. 14, Iss. 19, pp. 12417-12417
Open Access | Times Cited: 12
Digital Forensics Classification Based on a Hybrid Neural Network and the Salp Swarm Algorithm
Moutaz Alazab, Ruba Abu Khurma, Albara Awajan, et al.
Electronics (2022) Vol. 11, Iss. 12, pp. 1903-1903
Open Access | Times Cited: 10
Moutaz Alazab, Ruba Abu Khurma, Albara Awajan, et al.
Electronics (2022) Vol. 11, Iss. 12, pp. 1903-1903
Open Access | Times Cited: 10
A discrete time-varying greywolf IoT botnet detection system
Moutaz Alazab
Computer Communications (2022) Vol. 192, pp. 405-416
Closed Access | Times Cited: 10
Moutaz Alazab
Computer Communications (2022) Vol. 192, pp. 405-416
Closed Access | Times Cited: 10
Dimensioning of Wide-Area Alternate Wetting and Drying (AWD) System for IoT-Based Automation
Mushran Siddiqui, Farhana Akther, Gazi M. E. Rahman, et al.
Sensors (2021) Vol. 21, Iss. 18, pp. 6040-6040
Open Access | Times Cited: 14
Mushran Siddiqui, Farhana Akther, Gazi M. E. Rahman, et al.
Sensors (2021) Vol. 21, Iss. 18, pp. 6040-6040
Open Access | Times Cited: 14
Fine-Tuned Understanding: Enhancing Social Bot Detection With Transformer-Based Classification
Amine Sallah, El Arbi Abdellaoui Alaoui, Saïd Agoujil, et al.
IEEE Access (2024) Vol. 12, pp. 118250-118269
Open Access | Times Cited: 1
Amine Sallah, El Arbi Abdellaoui Alaoui, Saïd Agoujil, et al.
IEEE Access (2024) Vol. 12, pp. 118250-118269
Open Access | Times Cited: 1
Trickle timer modification for RPL in Internet of things
Spoorthi P. Shetty, Mangala Shetty, Vijaya Kishore, et al.
Soft Computing (2024) Vol. 28, Iss. 3, pp. 2621-2635
Closed Access | Times Cited: 1
Spoorthi P. Shetty, Mangala Shetty, Vijaya Kishore, et al.
Soft Computing (2024) Vol. 28, Iss. 3, pp. 2621-2635
Closed Access | Times Cited: 1
An Artificial Intelligence-based Ensemble Technique for Intrusion Detection and Prevention in IoT Systems
Paul Olujide Adebayo, Monday Jubrin Abdulahi, Oladayo Morolake Lawrence, et al.
(2024), pp. 1-6
Closed Access | Times Cited: 1
Paul Olujide Adebayo, Monday Jubrin Abdulahi, Oladayo Morolake Lawrence, et al.
(2024), pp. 1-6
Closed Access | Times Cited: 1
A feature selection algorithm for intrusion detection system based on the enhanced heuristic optimizer
Hongchen Yu, Wei Zhang, Chunying Kang, et al.
Expert Systems with Applications (2024), pp. 125860-125860
Closed Access | Times Cited: 1
Hongchen Yu, Wei Zhang, Chunying Kang, et al.
Expert Systems with Applications (2024), pp. 125860-125860
Closed Access | Times Cited: 1