OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models
Fatima Alwahedi, Alyazia Aldhaheri, Mohamed Amine Ferrag, et al.
Internet of Things and Cyber-Physical Systems (2024) Vol. 4, pp. 167-185
Open Access | Times Cited: 62

Showing 26-50 of 62 citing articles:

Harnessing Generative AI for Enhanced Web Application Security
Muhammad Usman Tariq
Advances in web technologies and engineering book series (2024), pp. 161-192
Closed Access | Times Cited: 2

SmartGuardML: ML-based MQTT Data Analysis Approach for Threat Prediction in Smart Homes
Hrishita Patni, Jeenal Darji, Krisha Darji, et al.
(2024), pp. 76-81
Closed Access | Times Cited: 1

Federated Deep Learning Models for Intrusion Detection in IoT
El Mahfoud Ennaji, Salah El Hajla, Yassine Maleh, et al.
(2024), pp. 1-5
Closed Access | Times Cited: 1

Challenges of Using Generative AI Tools in Developing Multimedia-Based Learning Environments: Experts' Perspectives
Ahmed Qaran, Ahmed Abdullah Alqarni, Ahmed Al-Sohimy, et al.
International Journal of Educational Sciences and Arts (2024) Vol. 3, Iss. 12, pp. 289-326
Open Access | Times Cited: 1

A Comprehensive Survey on Generative AI Solutions in IoT Security
Juan Luis López Delgado, Juan Antonio López Ramos
Electronics (2024) Vol. 13, Iss. 24, pp. 4965-4965
Open Access | Times Cited: 1

Analysis of Machine Learning Classifiers for Speaker Identification: A Study on SVM, Random Forest, KNN, and Decision Tree
Gregorius Airlangga
Journal Of Computer Networks Architecture and High Performance Computing (2024) Vol. 6, Iss. 1, pp. 430-438
Open Access | Times Cited: 1

Pemanfaatan Artificial intelligence dalam Pembuatan Presentasi bagi Guru-Guru Brainfor Islamic School Kisaran
Dewi Maharani, Dewi Anggraeni, Rika Nofitri
Journal Of Indonesian Social Society (JISS) (2024) Vol. 2, Iss. 1, pp. 45-51
Open Access | Times Cited: 1

Financial Frontiers
Gopinath Rajenthran
Advances in logistics, operations, and management science book series (2024), pp. 161-192
Closed Access | Times Cited: 1

EMPOWERING RED TEAMS WITH GENERATIVE AI: TRANSFORMING PENETRATION TESTING THROUGH ADAPTIVE INTELLIGENCE
Mounia Zaydi, Yassine Maleh
EDPACS (2024), pp. 1-26
Closed Access | Times Cited: 1

Bridging Data-Driven Learning and Generative AI
R. K. Verma, Manish Dadhich, Arvind Sharma
Advances in educational technologies and instructional design book series (2024), pp. 459-466
Closed Access

Securing Social Media: Analyzing User Behaviors for Threat Detection Using Ensemble Random Forest Algorithm
T S Sanjai, D. Vanathi, P. Thirumoorthi, et al.
(2024), pp. 1-4
Closed Access

Security Threat Exploration on Smart Living Style based on Twitter Data
Tahani Alsaedi, Misbah Mehmood, Asad Mahmood, et al.
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 4, pp. 15522-15532
Open Access

Case Studies and Applications of Generative AI in Real-World Cybersecurity Scenarios
Azeem Khan, N. Z. Jhanjhi, Ghassan Ahmed Alı, et al.
Advances in human and social aspects of technology book series (2024), pp. 61-100
Closed Access

The Dawn of the Algorithmic Researcher

Advances in knowledge acquisition, transfer, and management book series/Advances in knowledge acquisition, transfer and management book series (2024), pp. 1-40
Closed Access

Ideation and Refocusing Research

Advances in knowledge acquisition, transfer, and management book series/Advances in knowledge acquisition, transfer and management book series (2024), pp. 41-74
Closed Access

Exploring the Role of Artificial Intelligence in Internet of Things Systems: A Systematic Mapping Study
Umair Khadam, Paul Davidsson, Romina Spalazzese
Sensors (2024) Vol. 24, Iss. 20, pp. 6511-6511
Open Access

The role of mobile edge computing in advancing federated learning algorithms and techniques: A systematic review of applications, challenges, and future directions
Amir Masoud Rahmani, Shtwai Alsubai, Abed Alanazi, et al.
Computers & Electrical Engineering (2024) Vol. 120, pp. 109812-109812
Closed Access

An IoT-enabled Smartphone as Digital Doctor (SPADD) Empowered Machine Learning
Zahid Hasan, Kashif Iqbal, Muhammad Zubair, et al.
(2024), pp. 1-10
Closed Access

Deep Learning for IoT Security
Aized Amin Soofi, Haseeb Ahmad
Advances in information security, privacy, and ethics book series (2024), pp. 69-99
Closed Access

Deep Learning-Based Approach for Optimizing Urban Commercial Space Expansion Using Artificial Neural Networks
Dawei Yang, Jiahui Zhao, Ping Xu
Applied Sciences (2024) Vol. 14, Iss. 9, pp. 3845-3845
Open Access

Data Mining Best Practices and Efficiency in the Large-Scale Data Mining Using Artificial Intelligence and Generative AI
Chandra Sekhar Veluru
Journal of Artificial Intelligence & Cloud Computing (2024) Vol. 3, Iss. 2, pp. 1-4
Open Access

Scroll to top