
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An effective genetic algorithm-based feature selection method for intrusion detection systems
Zahid Halim, Muhammad Nadeem Yousaf, Muhammad Waqas, et al.
Computers & Security (2021) Vol. 110, pp. 102448-102448
Closed Access | Times Cited: 112
Zahid Halim, Muhammad Nadeem Yousaf, Muhammad Waqas, et al.
Computers & Security (2021) Vol. 110, pp. 102448-102448
Closed Access | Times Cited: 112
Showing 1-25 of 112 citing articles:
Dual-IDS: A bagging-based gradient boosting decision tree model for network anomaly intrusion detection system
Maya Hilda Lestari Louk, Bayu Adhi Tama
Expert Systems with Applications (2022) Vol. 213, pp. 119030-119030
Closed Access | Times Cited: 135
Maya Hilda Lestari Louk, Bayu Adhi Tama
Expert Systems with Applications (2022) Vol. 213, pp. 119030-119030
Closed Access | Times Cited: 135
A systematic literature review for network intrusion detection system (IDS)
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed
International Journal of Information Security (2023) Vol. 22, Iss. 5, pp. 1125-1162
Closed Access | Times Cited: 72
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed
International Journal of Information Security (2023) Vol. 22, Iss. 5, pp. 1125-1162
Closed Access | Times Cited: 72
Optimizing IoT intrusion detection system: feature selection versus feature extraction in machine learning
Jing Li, Mohd Shahizan Othman, Hewan Chen, et al.
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 33
Jing Li, Mohd Shahizan Othman, Hewan Chen, et al.
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 33
Automatic design of machine learning via evolutionary computation: A survey
Nan Li, Lianbo Ma, Tiejun Xing, et al.
Applied Soft Computing (2023) Vol. 143, pp. 110412-110412
Closed Access | Times Cited: 29
Nan Li, Lianbo Ma, Tiejun Xing, et al.
Applied Soft Computing (2023) Vol. 143, pp. 110412-110412
Closed Access | Times Cited: 29
A feature selection based on genetic algorithm for intrusion detection of industrial control systems
Yushan Fang, Yu Yao, Xiaoli Lin, et al.
Computers & Security (2023) Vol. 139, pp. 103675-103675
Closed Access | Times Cited: 24
Yushan Fang, Yu Yao, Xiaoli Lin, et al.
Computers & Security (2023) Vol. 139, pp. 103675-103675
Closed Access | Times Cited: 24
Towards Effective Feature Selection for IoT Botnet Attack Detection Using a Genetic Algorithm
Xiangyu Liu, Yanhui Du
Electronics (2023) Vol. 12, Iss. 5, pp. 1260-1260
Open Access | Times Cited: 23
Xiangyu Liu, Yanhui Du
Electronics (2023) Vol. 12, Iss. 5, pp. 1260-1260
Open Access | Times Cited: 23
Enhanced Grey Wolf Optimization (EGWO) and random forest based mechanism for intrusion detection in IoT networks
Saad Said Alqahtany, Asadullah Shaikh, Ali Alqazzaz
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access | Times Cited: 1
Saad Said Alqahtany, Asadullah Shaikh, Ali Alqazzaz
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access | Times Cited: 1
An implementation of bi-phase network intrusion detection system by using real-time traffic analysis
Ratul Chowdhury, Shibaprasad Sen, Arpan Goswami, et al.
Expert Systems with Applications (2023) Vol. 224, pp. 119831-119831
Closed Access | Times Cited: 17
Ratul Chowdhury, Shibaprasad Sen, Arpan Goswami, et al.
Expert Systems with Applications (2023) Vol. 224, pp. 119831-119831
Closed Access | Times Cited: 17
Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of things
Uneneibotejit Otokwala, Andrei Petrovski, Harsha Kalutarage
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2559-2581
Open Access | Times Cited: 8
Uneneibotejit Otokwala, Andrei Petrovski, Harsha Kalutarage
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2559-2581
Open Access | Times Cited: 8
PSO-ACO-based bi-phase lightweight intrusion detection system combined with GA optimized ensemble classifiers
Arpita Srivastava, Ditipriya Sinha
Cluster Computing (2024) Vol. 27, Iss. 10, pp. 14835-14890
Closed Access | Times Cited: 8
Arpita Srivastava, Ditipriya Sinha
Cluster Computing (2024) Vol. 27, Iss. 10, pp. 14835-14890
Closed Access | Times Cited: 8
Fusion-based anomaly detection system using modified isolation forest for internet of things
Orieb AbuAlghanam, Hadeel Alazzam, Esraa Alhenawi, et al.
Journal of Ambient Intelligence and Humanized Computing (2022) Vol. 14, Iss. 1, pp. 131-145
Closed Access | Times Cited: 28
Orieb AbuAlghanam, Hadeel Alazzam, Esraa Alhenawi, et al.
Journal of Ambient Intelligence and Humanized Computing (2022) Vol. 14, Iss. 1, pp. 131-145
Closed Access | Times Cited: 28
MEMBER: A multi-task learning model with hybrid deep features for network intrusion detection
Jinghong Lan, Xudong Liu, Bo Li, et al.
Computers & Security (2022) Vol. 123, pp. 102919-102919
Closed Access | Times Cited: 28
Jinghong Lan, Xudong Liu, Bo Li, et al.
Computers & Security (2022) Vol. 123, pp. 102919-102919
Closed Access | Times Cited: 28
MGA-IDS: Optimal feature subset selection for anomaly detection framework on in-vehicle networks-CAN bus based on genetic algorithm and intrusion detection approach
Doğukan Aksu, Muhammed Ali Aydın
Computers & Security (2022) Vol. 118, pp. 102717-102717
Closed Access | Times Cited: 23
Doğukan Aksu, Muhammed Ali Aydın
Computers & Security (2022) Vol. 118, pp. 102717-102717
Closed Access | Times Cited: 23
Stacking ensemble approach for DDoS attack detection in software-defined cyber–physical systems
Ramya Mall, Kumar Abhishek, S. Manimurugan, et al.
Computers & Electrical Engineering (2023) Vol. 107, pp. 108635-108635
Closed Access | Times Cited: 16
Ramya Mall, Kumar Abhishek, S. Manimurugan, et al.
Computers & Electrical Engineering (2023) Vol. 107, pp. 108635-108635
Closed Access | Times Cited: 16
Glee: A granularity filter for feature selection
Jing Ba, Pingxin Wang, Xibei Yang, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 122, pp. 106080-106080
Closed Access | Times Cited: 14
Jing Ba, Pingxin Wang, Xibei Yang, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 122, pp. 106080-106080
Closed Access | Times Cited: 14
Strengthening Network Security: Deep Learning Models for Intrusion Detection with Optimized Feature Subset and Effective Imbalance Handling
Bayi Xu, Lei Sun, Xiuqing Mao, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 2, pp. 1995-2022
Open Access | Times Cited: 6
Bayi Xu, Lei Sun, Xiuqing Mao, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 2, pp. 1995-2022
Open Access | Times Cited: 6
Overcoming the Challenges of Data Lack, Leakage, and Dimensionality in Intrusion Detection Systems: A Comprehensive Review
Mohamed Aly Bouke, Azizol Abdullah, Nur Izura Udzir, et al.
Journal of Communication and Information Systems (2024) Vol. 39, Iss. 2024, pp. 22-34
Open Access | Times Cited: 5
Mohamed Aly Bouke, Azizol Abdullah, Nur Izura Udzir, et al.
Journal of Communication and Information Systems (2024) Vol. 39, Iss. 2024, pp. 22-34
Open Access | Times Cited: 5
A Novel Cloud-Based IoT Framework for Secure Health Monitoring
Sahar Ebadinezhad, Temitope Emmanuel Mobolade
Sustainability (2024) Vol. 16, Iss. 3, pp. 1349-1349
Open Access | Times Cited: 5
Sahar Ebadinezhad, Temitope Emmanuel Mobolade
Sustainability (2024) Vol. 16, Iss. 3, pp. 1349-1349
Open Access | Times Cited: 5
Time Series Feature Selection Method Based on Mutual Information
Lin Huang, Xingqiang Zhou, Lianhui Shi, et al.
Applied Sciences (2024) Vol. 14, Iss. 5, pp. 1960-1960
Open Access | Times Cited: 5
Lin Huang, Xingqiang Zhou, Lianhui Shi, et al.
Applied Sciences (2024) Vol. 14, Iss. 5, pp. 1960-1960
Open Access | Times Cited: 5
An efficient deep learning mechanisms for IoT/Non-IoT devices classification and attack detection in SDN-enabled smart environment
P. Malini, K R Kavitha
Computers & Security (2024) Vol. 141, pp. 103818-103818
Closed Access | Times Cited: 5
P. Malini, K R Kavitha
Computers & Security (2024) Vol. 141, pp. 103818-103818
Closed Access | Times Cited: 5
Intrusion detection system: a deep neural network-based concatenated approach
Hidangmayum Satyajeet Sharma, Khundrakpam Johnson Singh
The Journal of Supercomputing (2024) Vol. 80, Iss. 10, pp. 13918-13948
Closed Access | Times Cited: 5
Hidangmayum Satyajeet Sharma, Khundrakpam Johnson Singh
The Journal of Supercomputing (2024) Vol. 80, Iss. 10, pp. 13918-13948
Closed Access | Times Cited: 5
IoT Intrusion Detection System Based on Machine Learning
Bayi Xu, Lei Sun, Xiuqing Mao, et al.
Electronics (2023) Vol. 12, Iss. 20, pp. 4289-4289
Open Access | Times Cited: 13
Bayi Xu, Lei Sun, Xiuqing Mao, et al.
Electronics (2023) Vol. 12, Iss. 20, pp. 4289-4289
Open Access | Times Cited: 13
Feature Selection Problem and Metaheuristics: A Systematic Literature Review about Its Formulation, Evaluation and Applications
José Barrera-García, Felipe Cisternas-Caneo, Broderick Crawford, et al.
Biomimetics (2023) Vol. 9, Iss. 1, pp. 9-9
Open Access | Times Cited: 12
José Barrera-García, Felipe Cisternas-Caneo, Broderick Crawford, et al.
Biomimetics (2023) Vol. 9, Iss. 1, pp. 9-9
Open Access | Times Cited: 12
Logistic Regression Ensemble Classifier for Intrusion Detection System in Internet of Things
Silpa Chalichalamala, Niranjana Govindan, Ramani Kasarapu
Sensors (2023) Vol. 23, Iss. 23, pp. 9583-9583
Open Access | Times Cited: 11
Silpa Chalichalamala, Niranjana Govindan, Ramani Kasarapu
Sensors (2023) Vol. 23, Iss. 23, pp. 9583-9583
Open Access | Times Cited: 11
A novel federated learning aggregation algorithm for AIoT intrusion detection
Yidong Jia, Fuhong Lin, Yan Sun
IET Communications (2024) Vol. 18, Iss. 7, pp. 429-436
Open Access | Times Cited: 4
Yidong Jia, Fuhong Lin, Yan Sun
IET Communications (2024) Vol. 18, Iss. 7, pp. 429-436
Open Access | Times Cited: 4