
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review
Shubhkirti Sharma, Vijay Kumar, Kamlesh Dutta
Internet of Things and Cyber-Physical Systems (2024) Vol. 4, pp. 258-267
Open Access | Times Cited: 9
Shubhkirti Sharma, Vijay Kumar, Kamlesh Dutta
Internet of Things and Cyber-Physical Systems (2024) Vol. 4, pp. 258-267
Open Access | Times Cited: 9
Showing 9 citing articles:
An intrusion response approach based on multi-objective optimization and deep Q network for industrial control systems
Yiqun Yue, Dawei Zhao, Yang Zhou, et al.
Expert Systems with Applications (2025), pp. 126664-126664
Closed Access | Times Cited: 1
Yiqun Yue, Dawei Zhao, Yang Zhou, et al.
Expert Systems with Applications (2025), pp. 126664-126664
Closed Access | Times Cited: 1
Deep-IDS: A Real-Time Intrusion Detector for IoT Nodes Using Deep Learning
Sandeepkumar Racherla, Prathyusha Sripathi, Nuruzzaman Faruqui, et al.
IEEE Access (2024) Vol. 12, pp. 63584-63597
Open Access | Times Cited: 6
Sandeepkumar Racherla, Prathyusha Sripathi, Nuruzzaman Faruqui, et al.
IEEE Access (2024) Vol. 12, pp. 63584-63597
Open Access | Times Cited: 6
Anomaly-Based Intrusion Detection Model Using Deep Learning for IoT Networks
Muaadh A. Alsoufi, Maheyzah Md Siraj, Fuad A. Ghaleb, et al.
Computer Modeling in Engineering & Sciences (2024) Vol. 141, Iss. 1, pp. 823-845
Open Access | Times Cited: 6
Muaadh A. Alsoufi, Maheyzah Md Siraj, Fuad A. Ghaleb, et al.
Computer Modeling in Engineering & Sciences (2024) Vol. 141, Iss. 1, pp. 823-845
Open Access | Times Cited: 6
Optimizing Intrusion Detection in Wireless Sensor Networks via the Improved Chameleon Swarm Algorithm for Feature Selection
Laith Abualigah, Mohammad H. Almomani, Saleh Ali Alomari, et al.
IET Communications (2025) Vol. 19, Iss. 1
Open Access
Laith Abualigah, Mohammad H. Almomani, Saleh Ali Alomari, et al.
IET Communications (2025) Vol. 19, Iss. 1
Open Access
On the time complexity of achieving optimal throughput in time division multiple access communication networks
Samer Nofal
AIMS Mathematics (2024) Vol. 9, Iss. 5, pp. 13522-13536
Open Access
Samer Nofal
AIMS Mathematics (2024) Vol. 9, Iss. 5, pp. 13522-13536
Open Access
AI/ML driven intrusion detection framework for IoT enabled cold storage monitoring system
Mahendra Prasad, Pankaj Pal, Sachin Tripathi, et al.
Security and Privacy (2024) Vol. 7, Iss. 5
Open Access
Mahendra Prasad, Pankaj Pal, Sachin Tripathi, et al.
Security and Privacy (2024) Vol. 7, Iss. 5
Open Access
Grey Wolf optimizer for efficient feature selection in robotic systems
Khaled Obaideen, Mohammad Al‐Shabi, Maâmar Bettayeb, et al.
(2024), pp. 12-12
Closed Access
Khaled Obaideen, Mohammad Al‐Shabi, Maâmar Bettayeb, et al.
(2024), pp. 12-12
Closed Access
An Intrusion Detection Method Based on a Universal Gravitation Clustering Algorithm
Jian Yu, Gao-Feng Yu, Xiangmei Xiao, et al.
Journal of Cyber Security (2024) Vol. 6, pp. 41-68
Open Access
Jian Yu, Gao-Feng Yu, Xiangmei Xiao, et al.
Journal of Cyber Security (2024) Vol. 6, pp. 41-68
Open Access
A Novel Elm Optimization and Its Application in IoT Intrusion Detection
Elijah M. Maseno, Zenghui Wang
Communications in computer and information science (2024), pp. 202-216
Closed Access
Elijah M. Maseno, Zenghui Wang
Communications in computer and information science (2024), pp. 202-216
Closed Access