
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Evolutionary Algorithm-based Feature Selection for an Intrusion Detection System
Devendra Singh, Manish Shrivastava
Engineering Technology & Applied Science Research (2021) Vol. 11, Iss. 3, pp. 7130-7134
Open Access | Times Cited: 11
Devendra Singh, Manish Shrivastava
Engineering Technology & Applied Science Research (2021) Vol. 11, Iss. 3, pp. 7130-7134
Open Access | Times Cited: 11
Showing 11 citing articles:
Adaptive Method for Feature Selection in the Machine Learning Context
Yamen El Touati, Jihane Ben Slimane, Taoufik Saidani
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 3, pp. 14295-14300
Open Access | Times Cited: 3
Yamen El Touati, Jihane Ben Slimane, Taoufik Saidani
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 3, pp. 14295-14300
Open Access | Times Cited: 3
Optimization of Intrusion Detection Systems Determined by Ameliorated HNADAM-SGD Algorithm
Shyla Shyla, Vishal Bhatnagar, Vikram Bali, et al.
Electronics (2022) Vol. 11, Iss. 4, pp. 507-507
Open Access | Times Cited: 12
Shyla Shyla, Vishal Bhatnagar, Vikram Bali, et al.
Electronics (2022) Vol. 11, Iss. 4, pp. 507-507
Open Access | Times Cited: 12
Detection and Classification of Urea Adulteration in Milk with Deep Neural Networks
Ketaki Ghodinde, Uttam Chaskar
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 3, pp. 14319-14326
Open Access | Times Cited: 2
Ketaki Ghodinde, Uttam Chaskar
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 3, pp. 14319-14326
Open Access | Times Cited: 2
Enhancing IoT (Internet of Things) feature selection: A two-stage approach via an improved whale optimization algorithm
Kunpeng Zhang, Yanheng Liu, Xue Wang, et al.
Expert Systems with Applications (2024) Vol. 256, pp. 124936-124936
Closed Access | Times Cited: 2
Kunpeng Zhang, Yanheng Liu, Xue Wang, et al.
Expert Systems with Applications (2024) Vol. 256, pp. 124936-124936
Closed Access | Times Cited: 2
Performance Comparison of Ensemble Learning and Supervised Algorithms in Classifying Multi-label Network Traffic Flow
M. Machoke, Jimmy Mbelwa, Johnson I. Agbinya, et al.
Engineering Technology & Applied Science Research (2022) Vol. 12, Iss. 3, pp. 8667-8674
Open Access | Times Cited: 9
M. Machoke, Jimmy Mbelwa, Johnson I. Agbinya, et al.
Engineering Technology & Applied Science Research (2022) Vol. 12, Iss. 3, pp. 8667-8674
Open Access | Times Cited: 9
An Intrusion Detection System using a Hybrid Lightweight Deep Learning Algorithm
Rusul H. Altaie, Haider K. Hoomod
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 5, pp. 16740-16743
Open Access | Times Cited: 1
Rusul H. Altaie, Haider K. Hoomod
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 5, pp. 16740-16743
Open Access | Times Cited: 1
Intrusion Detection Techniques in Social Media Cloud: Review and Future Directions
Khadija M. Abuali, Liyth Nissirat, Aida AlâSamawi
Wireless Communications and Mobile Computing (2023) Vol. 2023, pp. 1-25
Open Access | Times Cited: 3
Khadija M. Abuali, Liyth Nissirat, Aida AlâSamawi
Wireless Communications and Mobile Computing (2023) Vol. 2023, pp. 1-25
Open Access | Times Cited: 3
Anti-Phishing Awareness Delivery Methods
Abdulbasit A. Darem
Engineering Technology & Applied Science Research (2021) Vol. 11, Iss. 6, pp. 7944-7949
Open Access | Times Cited: 8
Abdulbasit A. Darem
Engineering Technology & Applied Science Research (2021) Vol. 11, Iss. 6, pp. 7944-7949
Open Access | Times Cited: 8
Optimization of Intrusion Detection Systems Determined by Ameliorated HNADAM-SGD Algorithm
Shyla Shyla, Vishal Bhatnagar, Vikram Bali, et al.
(2021)
Open Access | Times Cited: 1
Shyla Shyla, Vishal Bhatnagar, Vikram Bali, et al.
(2021)
Open Access | Times Cited: 1
Lightweight Hybrid CAE-ELM and Enhanced Smote Based Intrusion Detection for Networks
D. Shankar, G Victo, Sudha George, et al.
International journal of intelligent engineering and systems (2023) Vol. 16, Iss. 6, pp. 1006-1021
Open Access
D. Shankar, G Victo, Sudha George, et al.
International journal of intelligent engineering and systems (2023) Vol. 16, Iss. 6, pp. 1006-1021
Open Access
The Fisher Component-based Feature Selection Method
Abdul Baseer Buriro, Santosh Kumar
Engineering Technology & Applied Science Research (2022) Vol. 12, Iss. 4, pp. 9023-9027
Open Access
Abdul Baseer Buriro, Santosh Kumar
Engineering Technology & Applied Science Research (2022) Vol. 12, Iss. 4, pp. 9023-9027
Open Access