
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Building an Effective Approach toward Intrusion Detection Using Ensemble Feature Selection
Alok Kumar Shukla, Pradeep Kumar Singh
International Journal of Information Security and Privacy (2019) Vol. 13, Iss. 3, pp. 31-47
Closed Access | Times Cited: 26
Alok Kumar Shukla, Pradeep Kumar Singh
International Journal of Information Security and Privacy (2019) Vol. 13, Iss. 3, pp. 31-47
Closed Access | Times Cited: 26
Showing 1-25 of 26 citing articles:
Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection
Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi
Cluster Computing (2021) Vol. 24, Iss. 3, pp. 1881-1900
Closed Access | Times Cited: 56
Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi
Cluster Computing (2021) Vol. 24, Iss. 3, pp. 1881-1900
Closed Access | Times Cited: 56
A novel method for detecting soil salinity using AVIRIS-NG imaging spectroscopy and ensemble machine learning
Ayan Das, Bimal K. Bhattacharya, Raj Setia, et al.
ISPRS Journal of Photogrammetry and Remote Sensing (2023) Vol. 200, pp. 191-212
Open Access | Times Cited: 21
Ayan Das, Bimal K. Bhattacharya, Raj Setia, et al.
ISPRS Journal of Photogrammetry and Remote Sensing (2023) Vol. 200, pp. 191-212
Open Access | Times Cited: 21
An effect of chaos grasshopper optimization algorithm for protection of network infrastructure
Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi
Computer Networks (2020) Vol. 176, pp. 107251-107251
Closed Access | Times Cited: 49
Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi
Computer Networks (2020) Vol. 176, pp. 107251-107251
Closed Access | Times Cited: 49
A study on metaheuristics approaches for gene selection in microarray data: algorithms, applications and open challenges
Alok Kumar Shukla, Diwakar Tripathi, B. Ramachandra Reddy, et al.
Evolutionary Intelligence (2019) Vol. 13, Iss. 3, pp. 309-329
Closed Access | Times Cited: 50
Alok Kumar Shukla, Diwakar Tripathi, B. Ramachandra Reddy, et al.
Evolutionary Intelligence (2019) Vol. 13, Iss. 3, pp. 309-329
Closed Access | Times Cited: 50
Implementation of adaptive scheme in evolutionary technique for anomaly-based intrusion detection
Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi, et al.
Evolutionary Intelligence (2019) Vol. 13, Iss. 1, pp. 103-117
Closed Access | Times Cited: 49
Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi, et al.
Evolutionary Intelligence (2019) Vol. 13, Iss. 1, pp. 103-117
Closed Access | Times Cited: 49
Towards Data and Computation Offloading in Mobile Cloud Computing: Taxonomy, Overview, and Future Directions
Amir Masoud Rahmani, Mokhtar Mohammadi, Adil Hussein Mohammed, et al.
Wireless Personal Communications (2021) Vol. 119, Iss. 1, pp. 147-185
Closed Access | Times Cited: 33
Amir Masoud Rahmani, Mokhtar Mohammadi, Adil Hussein Mohammed, et al.
Wireless Personal Communications (2021) Vol. 119, Iss. 1, pp. 147-185
Closed Access | Times Cited: 33
EFS-DNN: An Ensemble Feature Selection-Based Deep Learning Approach to Network Intrusion Detection System
Zehong Wang, Jian Hua Liu, Leyao Sun
Security and Communication Networks (2022) Vol. 2022, pp. 1-14
Open Access | Times Cited: 20
Zehong Wang, Jian Hua Liu, Leyao Sun
Security and Communication Networks (2022) Vol. 2022, pp. 1-14
Open Access | Times Cited: 20
An Effective Ensemble Automatic Feature Selection Method for Network Intrusion Detection
Yang Zhang, Hongpo Zhang, Bo Zhang
Information (2022) Vol. 13, Iss. 7, pp. 314-314
Open Access | Times Cited: 19
Yang Zhang, Hongpo Zhang, Bo Zhang
Information (2022) Vol. 13, Iss. 7, pp. 314-314
Open Access | Times Cited: 19
Multi-population adaptive genetic algorithm for selection of microarray biomarkers
Alok Kumar Shukla
Neural Computing and Applications (2019) Vol. 32, Iss. 15, pp. 11897-11918
Closed Access | Times Cited: 29
Alok Kumar Shukla
Neural Computing and Applications (2019) Vol. 32, Iss. 15, pp. 11897-11918
Closed Access | Times Cited: 29
i-2NIDS Novel Intelligent Intrusion Detection Approach for a Strong Network Security
Sabrine Ennaji, Nabil El Akkad, Khalid Haddouch
International Journal of Information Security and Privacy (2023) Vol. 17, Iss. 1, pp. 1-17
Open Access | Times Cited: 8
Sabrine Ennaji, Nabil El Akkad, Khalid Haddouch
International Journal of Information Security and Privacy (2023) Vol. 17, Iss. 1, pp. 1-17
Open Access | Times Cited: 8
Incorporating evolutionary computation for securing wireless network against cyberthreats
Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi
The Journal of Supercomputing (2020) Vol. 76, Iss. 11, pp. 8691-8728
Closed Access | Times Cited: 23
Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi
The Journal of Supercomputing (2020) Vol. 76, Iss. 11, pp. 8691-8728
Closed Access | Times Cited: 23
An Efficient Hybrid Evolutionary Approach for Identification of Zero-Day Attacks on Wired/Wireless Network System
Alok Kumar Shukla
Wireless Personal Communications (2020) Vol. 123, Iss. 1, pp. 1-29
Closed Access | Times Cited: 15
Alok Kumar Shukla
Wireless Personal Communications (2020) Vol. 123, Iss. 1, pp. 1-29
Closed Access | Times Cited: 15
Novel Network Intrusion Detection Based on Feature Filtering Using FLAME and New Cuckoo Selection in a Genetic Algorithm
Kawthar Alzboon, Jehad Q. Odeh Alnihoud, Wafa Alsharafat
Applied Sciences (2023) Vol. 13, Iss. 23, pp. 12755-12755
Open Access | Times Cited: 4
Kawthar Alzboon, Jehad Q. Odeh Alnihoud, Wafa Alsharafat
Applied Sciences (2023) Vol. 13, Iss. 23, pp. 12755-12755
Open Access | Times Cited: 4
Evolutionary Algorithm-based Feature Selection for an Intrusion Detection System
Devendra Singh, Manish Shrivastava
Engineering Technology & Applied Science Research (2021) Vol. 11, Iss. 3, pp. 7130-7134
Open Access | Times Cited: 11
Devendra Singh, Manish Shrivastava
Engineering Technology & Applied Science Research (2021) Vol. 11, Iss. 3, pp. 7130-7134
Open Access | Times Cited: 11
DS-kNN
Redha Taguelmimt, Rachid Beghdad
International Journal of Information Security and Privacy (2021) Vol. 15, Iss. 2, pp. 131-144
Closed Access | Times Cited: 7
Redha Taguelmimt, Rachid Beghdad
International Journal of Information Security and Privacy (2021) Vol. 15, Iss. 2, pp. 131-144
Closed Access | Times Cited: 7
Clustered ensemble feature selection with M-GRU classification for efficient intrusion detection system of industrial systems
M Karthigha, L. Latha
Journal of Intelligent & Fuzzy Systems (2023) Vol. 44, Iss. 6, pp. 9109-9127
Open Access | Times Cited: 2
M Karthigha, L. Latha
Journal of Intelligent & Fuzzy Systems (2023) Vol. 44, Iss. 6, pp. 9109-9127
Open Access | Times Cited: 2
Multi-Parallel Adaptive Grasshopper Optimization Technique for Detecting Anonymous Attacks in Wireless Networks
Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi
Wireless Personal Communications (2021) Vol. 119, Iss. 3, pp. 2787-2816
Closed Access | Times Cited: 5
Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi
Wireless Personal Communications (2021) Vol. 119, Iss. 3, pp. 2787-2816
Closed Access | Times Cited: 5
Detecting anonymous attacks in wireless communication medium using adaptive grasshopper optimization algorithm
Shubhra Dwivedi
Cognitive Systems Research (2021) Vol. 69, pp. 1-21
Closed Access | Times Cited: 5
Shubhra Dwivedi
Cognitive Systems Research (2021) Vol. 69, pp. 1-21
Closed Access | Times Cited: 5
Design of network security monitoring system based on K-means clustering algorithm
Lin Yu, Yujie Bai
Intelligent Decision Technologies (2024), pp. 1-14
Closed Access
Lin Yu, Yujie Bai
Intelligent Decision Technologies (2024), pp. 1-14
Closed Access
Detecting impersonation episode using teaching learning‐based optimization and support vector machine techniques
Alok Kumar Shukla
Expert Systems (2023) Vol. 40, Iss. 7
Closed Access | Times Cited: 1
Alok Kumar Shukla
Expert Systems (2023) Vol. 40, Iss. 7
Closed Access | Times Cited: 1
Construction information security management system based on data sharing algorithm
Lihui Zhao
Intelligent Decision Technologies (2023), pp. 1-14
Closed Access | Times Cited: 1
Lihui Zhao
Intelligent Decision Technologies (2023), pp. 1-14
Closed Access | Times Cited: 1
GE-IDS: an intrusion detection system based on grayscale and entropy
Dan Liao, Ruijin Zhou, Hui Li, et al.
Peer-to-Peer Networking and Applications (2022) Vol. 15, Iss. 3, pp. 1521-1534
Closed Access | Times Cited: 2
Dan Liao, Ruijin Zhou, Hui Li, et al.
Peer-to-Peer Networking and Applications (2022) Vol. 15, Iss. 3, pp. 1521-1534
Closed Access | Times Cited: 2
An Intelligent Approach for Intrusion Detection using Snake Optimizer and Random Forest
Salahaldeen Duraibi
2021 International Conference on Computational Science and Computational Intelligence (CSCI) (2022), pp. 1016-1021
Closed Access | Times Cited: 1
Salahaldeen Duraibi
2021 International Conference on Computational Science and Computational Intelligence (CSCI) (2022), pp. 1016-1021
Closed Access | Times Cited: 1
RCALN: A Hybrid Intrusion Detection System Incorporating Channel Attention in CNN and Residual Networks with LSTM
Ming‐Hui Chen, Xi Luo, Yiming Zhang, et al.
(2023)
Closed Access
Ming‐Hui Chen, Xi Luo, Yiming Zhang, et al.
(2023)
Closed Access
Clustered Ensemble Feature Selection with M-GRU Classification for Efficient Intrusion Detection System of Industrial Systems
M Karthigha, L Latha
Research Square (Research Square) (2022)
Open Access
M Karthigha, L Latha
Research Square (Research Square) (2022)
Open Access