
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
SMO-DNN: Spider Monkey Optimization and Deep Neural Network Hybrid Classifier Model for Intrusion Detection
Neelu Khare, D Preethi, Chiranji Lal Chowdhary, et al.
Electronics (2020) Vol. 9, Iss. 4, pp. 692-692
Open Access | Times Cited: 120
Neelu Khare, D Preethi, Chiranji Lal Chowdhary, et al.
Electronics (2020) Vol. 9, Iss. 4, pp. 692-692
Open Access | Times Cited: 120
Showing 1-25 of 120 citing articles:
Internet of Things Applications, Security Challenges, Attacks, Intrusion Detection, and Future Visions: A Systematic Review
N. C. Mishra, Sharnil Pandya
IEEE Access (2021) Vol. 9, pp. 59353-59377
Open Access | Times Cited: 240
N. C. Mishra, Sharnil Pandya
IEEE Access (2021) Vol. 9, pp. 59353-59377
Open Access | Times Cited: 240
A Modified Grey Wolf Optimization Algorithm for an Intrusion Detection System
Abdullah Alzaqebah, Ibrahim Aljarah, Omar S. Al-Kadi, et al.
Mathematics (2022) Vol. 10, Iss. 6, pp. 999-999
Open Access | Times Cited: 87
Abdullah Alzaqebah, Ibrahim Aljarah, Omar S. Al-Kadi, et al.
Mathematics (2022) Vol. 10, Iss. 6, pp. 999-999
Open Access | Times Cited: 87
Zero-day attack detection: a systematic literature review
Rasheed Ahmad, Izzat Alsmadi, Wasim A. Al-Hamdani, et al.
Artificial Intelligence Review (2023) Vol. 56, Iss. 10, pp. 10733-10811
Closed Access | Times Cited: 61
Rasheed Ahmad, Izzat Alsmadi, Wasim A. Al-Hamdani, et al.
Artificial Intelligence Review (2023) Vol. 56, Iss. 10, pp. 10733-10811
Closed Access | Times Cited: 61
Evaluation and optimisation of pre-trained CNN models for asphalt pavement crack detection and classification
Sandra Matarneh, Faris Elghaish, Farzad Pour Rahimian, et al.
Automation in Construction (2024) Vol. 160, pp. 105297-105297
Open Access | Times Cited: 28
Sandra Matarneh, Faris Elghaish, Farzad Pour Rahimian, et al.
Automation in Construction (2024) Vol. 160, pp. 105297-105297
Open Access | Times Cited: 28
A two-phase cuckoo search based approach for gene selection and deep learning classification of cancer disease using gene expression data with a novel fitness function
Amol Avinash Joshi, Rabia Musheer Aziz
Multimedia Tools and Applications (2024) Vol. 83, Iss. 28, pp. 71721-71752
Closed Access | Times Cited: 23
Amol Avinash Joshi, Rabia Musheer Aziz
Multimedia Tools and Applications (2024) Vol. 83, Iss. 28, pp. 71721-71752
Closed Access | Times Cited: 23
DeepLG SecNet: utilizing deep LSTM and GRU with secure network for enhanced intrusion detection in IoT environments
N. Manikandan, K. Pradeep, Gobalakrishnan Natesan, et al.
Cluster Computing (2024) Vol. 27, Iss. 4, pp. 5459-5471
Closed Access | Times Cited: 16
N. Manikandan, K. Pradeep, Gobalakrishnan Natesan, et al.
Cluster Computing (2024) Vol. 27, Iss. 4, pp. 5459-5471
Closed Access | Times Cited: 16
An Efficient Segmentation and Classification System in Medical Images Using Intuitionist Possibilistic Fuzzy C-Mean Clustering and Fuzzy SVM Algorithm
Chiranji Lal Chowdhary, Mohit Mittal, P. Kumaresan, et al.
Sensors (2020) Vol. 20, Iss. 14, pp. 3903-3903
Open Access | Times Cited: 104
Chiranji Lal Chowdhary, Mohit Mittal, P. Kumaresan, et al.
Sensors (2020) Vol. 20, Iss. 14, pp. 3903-3903
Open Access | Times Cited: 104
National-scale electricity peak load forecasting: Traditional, machine learning, or hybrid model?
Juyong Lee, Youngsang Cho
Energy (2021) Vol. 239, pp. 122366-122366
Open Access | Times Cited: 88
Juyong Lee, Youngsang Cho
Energy (2021) Vol. 239, pp. 122366-122366
Open Access | Times Cited: 88
EWOA-OPF: Effective Whale Optimization Algorithm to Solve Optimal Power Flow Problem
Mohammad H. Nadimi-Shahraki, Shokooh Taghian, Seyedali Mirjalili, et al.
Electronics (2021) Vol. 10, Iss. 23, pp. 2975-2975
Open Access | Times Cited: 78
Mohammad H. Nadimi-Shahraki, Shokooh Taghian, Seyedali Mirjalili, et al.
Electronics (2021) Vol. 10, Iss. 23, pp. 2975-2975
Open Access | Times Cited: 78
P2SF-IoV: A Privacy-Preservation-Based Secured Framework for Internet of Vehicles
Randhir Kumar, Prabhat Kumar, Rakesh Tripathi, et al.
IEEE Transactions on Intelligent Transportation Systems (2021) Vol. 23, Iss. 11, pp. 22571-22582
Closed Access | Times Cited: 77
Randhir Kumar, Prabhat Kumar, Rakesh Tripathi, et al.
IEEE Transactions on Intelligent Transportation Systems (2021) Vol. 23, Iss. 11, pp. 22571-22582
Closed Access | Times Cited: 77
SAAE-DNN: Deep Learning Method on Intrusion Detection
Chaofei Tang, Nurbol Luktarhan, Yuxin Zhao
Symmetry (2020) Vol. 12, Iss. 10, pp. 1695-1695
Open Access | Times Cited: 73
Chaofei Tang, Nurbol Luktarhan, Yuxin Zhao
Symmetry (2020) Vol. 12, Iss. 10, pp. 1695-1695
Open Access | Times Cited: 73
FSDroid:- A feature selection technique to detect malware from Android using Machine Learning Techniques
Arvind Mahindru, Amrit Lal Sangal
Multimedia Tools and Applications (2021) Vol. 80, Iss. 9, pp. 13271-13323
Open Access | Times Cited: 60
Arvind Mahindru, Amrit Lal Sangal
Multimedia Tools and Applications (2021) Vol. 80, Iss. 9, pp. 13271-13323
Open Access | Times Cited: 60
Novel coronavirus (COVID-19) diagnosis using computer vision and artificial intelligence techniques: a review
Anuja Bhargava, Atul Bansal
Multimedia Tools and Applications (2021) Vol. 80, Iss. 13, pp. 19931-19946
Open Access | Times Cited: 58
Anuja Bhargava, Atul Bansal
Multimedia Tools and Applications (2021) Vol. 80, Iss. 13, pp. 19931-19946
Open Access | Times Cited: 58
A highly secured intrusion detection system for IoT using EXPSO-STFA feature selection for LAANN to detect attacks
M. Jeyaselvi, Rajesh Kumar Dhanaraj, M. Sathya, et al.
Cluster Computing (2022) Vol. 26, Iss. 1, pp. 559-574
Closed Access | Times Cited: 41
M. Jeyaselvi, Rajesh Kumar Dhanaraj, M. Sathya, et al.
Cluster Computing (2022) Vol. 26, Iss. 1, pp. 559-574
Closed Access | Times Cited: 41
A novel firefly algorithm approach for efficient feature selection with COVID-19 dataset
Nebojša Bačanin, K. Venkatachalam, Timea Bezdan, et al.
Microprocessors and Microsystems (2023) Vol. 98, pp. 104778-104778
Open Access | Times Cited: 32
Nebojša Bačanin, K. Venkatachalam, Timea Bezdan, et al.
Microprocessors and Microsystems (2023) Vol. 98, pp. 104778-104778
Open Access | Times Cited: 32
A novel and innovative cancer classification framework through a consecutive utilization of hybrid feature selection
Rajul Mahto, Saboor Uddin Ahmed, Rizwan Ur Rahman, et al.
BMC Bioinformatics (2023) Vol. 24, Iss. 1
Open Access | Times Cited: 26
Rajul Mahto, Saboor Uddin Ahmed, Rizwan Ur Rahman, et al.
BMC Bioinformatics (2023) Vol. 24, Iss. 1
Open Access | Times Cited: 26
XAI‐driven model for crop recommender system for use in precision agriculture
Parvathaneni Naga Srinivasu, Muhammad Fazal Ijaz, Marcin Woźniak
Computational Intelligence (2024) Vol. 40, Iss. 1
Closed Access | Times Cited: 14
Parvathaneni Naga Srinivasu, Muhammad Fazal Ijaz, Marcin Woźniak
Computational Intelligence (2024) Vol. 40, Iss. 1
Closed Access | Times Cited: 14
Using Big Data Fuzzy K‐Means Clustering and Information Fusion Algorithm in English Teaching Ability Evaluation
Chen Zhen
Complexity (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 54
Chen Zhen
Complexity (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 54
Diagnosis of Diabetic Retinopathy through Retinal Fundus Images and 3D Convolutional Neural Networks with Limited Number of Samples
Ahsan Bin Tufail, Inam Ullah, Wali Ullah Khan, et al.
Wireless Communications and Mobile Computing (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 50
Ahsan Bin Tufail, Inam Ullah, Wali Ullah Khan, et al.
Wireless Communications and Mobile Computing (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 50
Prediction of software vulnerability based deep symbiotic genetic algorithms: Phenotyping of dominant-features
Canan Batur Şahin, Özlem BATUR DİNLER, Laith Abualigah
Applied Intelligence (2021) Vol. 51, Iss. 11, pp. 8271-8287
Closed Access | Times Cited: 43
Canan Batur Şahin, Özlem BATUR DİNLER, Laith Abualigah
Applied Intelligence (2021) Vol. 51, Iss. 11, pp. 8271-8287
Closed Access | Times Cited: 43
Detecting IoT Attacks Using an Ensemble Machine Learning Model
Vikas Tomer, Sachin Sharma
Future Internet (2022) Vol. 14, Iss. 4, pp. 102-102
Open Access | Times Cited: 38
Vikas Tomer, Sachin Sharma
Future Internet (2022) Vol. 14, Iss. 4, pp. 102-102
Open Access | Times Cited: 38
Blockchain based context-aware CP-ABE schema for Internet of Medical Things security
Boubakeur Annane, Adel Alti, Abderrahim Lakehal
Array (2022) Vol. 14, pp. 100150-100150
Open Access | Times Cited: 29
Boubakeur Annane, Adel Alti, Abderrahim Lakehal
Array (2022) Vol. 14, pp. 100150-100150
Open Access | Times Cited: 29
Balanced Spider Monkey Optimization with Bi-LSTM for Sustainable Air Quality Prediction
C. Aarthi, Varatharaj Jeya Ramya, Przemysław Falkowski‐Gilski, et al.
Sustainability (2023) Vol. 15, Iss. 2, pp. 1637-1637
Open Access | Times Cited: 22
C. Aarthi, Varatharaj Jeya Ramya, Przemysław Falkowski‐Gilski, et al.
Sustainability (2023) Vol. 15, Iss. 2, pp. 1637-1637
Open Access | Times Cited: 22
Attack classification in network intrusion detection system based on optimization strategy and deep learning methodology
Et al. Ch. Kodanda Ramu, T. Srinivasa Rao, E. Uma Shankar Rao
Multimedia Tools and Applications (2024) Vol. 83, Iss. 31, pp. 75533-75555
Closed Access | Times Cited: 8
Et al. Ch. Kodanda Ramu, T. Srinivasa Rao, E. Uma Shankar Rao
Multimedia Tools and Applications (2024) Vol. 83, Iss. 31, pp. 75533-75555
Closed Access | Times Cited: 8
Intrusion detection systems for IoT based on bio-inspired and machine learning techniques: a systematic review of the literature
Rafika Saadouni, Chirihane Gherbi, Zibouda Aliouat, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 8655-8681
Closed Access | Times Cited: 7
Rafika Saadouni, Chirihane Gherbi, Zibouda Aliouat, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 8655-8681
Closed Access | Times Cited: 7