
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models
Fatima Alwahedi, Alyazia Aldhaheri, Mohamed Amine Ferrag, et al.
Internet of Things and Cyber-Physical Systems (2024) Vol. 4, pp. 167-185
Open Access | Times Cited: 62
Fatima Alwahedi, Alyazia Aldhaheri, Mohamed Amine Ferrag, et al.
Internet of Things and Cyber-Physical Systems (2024) Vol. 4, pp. 167-185
Open Access | Times Cited: 62
Showing 26-50 of 62 citing articles:
Harnessing Generative AI for Enhanced Web Application Security
Muhammad Usman Tariq
Advances in web technologies and engineering book series (2024), pp. 161-192
Closed Access | Times Cited: 2
Muhammad Usman Tariq
Advances in web technologies and engineering book series (2024), pp. 161-192
Closed Access | Times Cited: 2
SmartGuardML: ML-based MQTT Data Analysis Approach for Threat Prediction in Smart Homes
Hrishita Patni, Jeenal Darji, Krisha Darji, et al.
(2024), pp. 76-81
Closed Access | Times Cited: 1
Hrishita Patni, Jeenal Darji, Krisha Darji, et al.
(2024), pp. 76-81
Closed Access | Times Cited: 1
Federated Deep Learning Models for Intrusion Detection in IoT
El Mahfoud Ennaji, Salah El Hajla, Yassine Maleh, et al.
(2024), pp. 1-5
Closed Access | Times Cited: 1
El Mahfoud Ennaji, Salah El Hajla, Yassine Maleh, et al.
(2024), pp. 1-5
Closed Access | Times Cited: 1
Challenges of Using Generative AI Tools in Developing Multimedia-Based Learning Environments: Experts' Perspectives
Ahmed Qaran, Ahmed Abdullah Alqarni, Ahmed Al-Sohimy, et al.
International Journal of Educational Sciences and Arts (2024) Vol. 3, Iss. 12, pp. 289-326
Open Access | Times Cited: 1
Ahmed Qaran, Ahmed Abdullah Alqarni, Ahmed Al-Sohimy, et al.
International Journal of Educational Sciences and Arts (2024) Vol. 3, Iss. 12, pp. 289-326
Open Access | Times Cited: 1
A Comprehensive Survey on Generative AI Solutions in IoT Security
Juan Luis López Delgado, Juan Antonio López Ramos
Electronics (2024) Vol. 13, Iss. 24, pp. 4965-4965
Open Access | Times Cited: 1
Juan Luis López Delgado, Juan Antonio López Ramos
Electronics (2024) Vol. 13, Iss. 24, pp. 4965-4965
Open Access | Times Cited: 1
Analysis of Machine Learning Classifiers for Speaker Identification: A Study on SVM, Random Forest, KNN, and Decision Tree
Gregorius Airlangga
Journal Of Computer Networks Architecture and High Performance Computing (2024) Vol. 6, Iss. 1, pp. 430-438
Open Access | Times Cited: 1
Gregorius Airlangga
Journal Of Computer Networks Architecture and High Performance Computing (2024) Vol. 6, Iss. 1, pp. 430-438
Open Access | Times Cited: 1
Pemanfaatan Artificial intelligence dalam Pembuatan Presentasi bagi Guru-Guru Brainfor Islamic School Kisaran
Dewi Maharani, Dewi Anggraeni, Rika Nofitri
Journal Of Indonesian Social Society (JISS) (2024) Vol. 2, Iss. 1, pp. 45-51
Open Access | Times Cited: 1
Dewi Maharani, Dewi Anggraeni, Rika Nofitri
Journal Of Indonesian Social Society (JISS) (2024) Vol. 2, Iss. 1, pp. 45-51
Open Access | Times Cited: 1
Financial Frontiers
Gopinath Rajenthran
Advances in logistics, operations, and management science book series (2024), pp. 161-192
Closed Access | Times Cited: 1
Gopinath Rajenthran
Advances in logistics, operations, and management science book series (2024), pp. 161-192
Closed Access | Times Cited: 1
EMPOWERING RED TEAMS WITH GENERATIVE AI: TRANSFORMING PENETRATION TESTING THROUGH ADAPTIVE INTELLIGENCE
Mounia Zaydi, Yassine Maleh
EDPACS (2024), pp. 1-26
Closed Access | Times Cited: 1
Mounia Zaydi, Yassine Maleh
EDPACS (2024), pp. 1-26
Closed Access | Times Cited: 1
Accurate and Efficient Security Authentication of IoT Devices using Machine Learning Algorithms
Ilham Alghamdi, Mohammad Eid Alzahrani
(2024), pp. 79-90
Open Access
Ilham Alghamdi, Mohammad Eid Alzahrani
(2024), pp. 79-90
Open Access
Encoder Decoder-Based Virtual Physically Unclonable Function for Internet of Things Device Authentication Using Split-Learning
Hani Saleh, Raviha Khan, Sami Muhaidat, et al.
(2024)
Closed Access
Hani Saleh, Raviha Khan, Sami Muhaidat, et al.
(2024)
Closed Access
Bridging Data-Driven Learning and Generative AI
R. K. Verma, Manish Dadhich, Arvind Sharma
Advances in educational technologies and instructional design book series (2024), pp. 459-466
Closed Access
R. K. Verma, Manish Dadhich, Arvind Sharma
Advances in educational technologies and instructional design book series (2024), pp. 459-466
Closed Access
Securing Social Media: Analyzing User Behaviors for Threat Detection Using Ensemble Random Forest Algorithm
T S Sanjai, D. Vanathi, P. Thirumoorthi, et al.
(2024), pp. 1-4
Closed Access
T S Sanjai, D. Vanathi, P. Thirumoorthi, et al.
(2024), pp. 1-4
Closed Access
Security Threat Exploration on Smart Living Style based on Twitter Data
Tahani Alsaedi, Misbah Mehmood, Asad Mahmood, et al.
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 4, pp. 15522-15532
Open Access
Tahani Alsaedi, Misbah Mehmood, Asad Mahmood, et al.
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 4, pp. 15522-15532
Open Access
A Machine-Learning Based IoT Smart Home System to Detect and Reduce Urban Insecurity in Uganda: A Case of Kampala Metropolitan Area
Edward Miiro, Ismael Kato
(2024), pp. 1-6
Closed Access
Edward Miiro, Ismael Kato
(2024), pp. 1-6
Closed Access
A Preliminary Study on an Intrusion Detection Method using Large Language Models in Industrial Control Systems
Smith Ann, Seong‐Je Cho, H. J. Kim
(2024), pp. 600-602
Closed Access
Smith Ann, Seong‐Je Cho, H. J. Kim
(2024), pp. 600-602
Closed Access
Case Studies and Applications of Generative AI in Real-World Cybersecurity Scenarios
Azeem Khan, N. Z. Jhanjhi, Ghassan Ahmed Alı, et al.
Advances in human and social aspects of technology book series (2024), pp. 61-100
Closed Access
Azeem Khan, N. Z. Jhanjhi, Ghassan Ahmed Alı, et al.
Advances in human and social aspects of technology book series (2024), pp. 61-100
Closed Access
The Dawn of the Algorithmic Researcher
Advances in knowledge acquisition, transfer, and management book series/Advances in knowledge acquisition, transfer and management book series (2024), pp. 1-40
Closed Access
Advances in knowledge acquisition, transfer, and management book series/Advances in knowledge acquisition, transfer and management book series (2024), pp. 1-40
Closed Access
Ideation and Refocusing Research
Advances in knowledge acquisition, transfer, and management book series/Advances in knowledge acquisition, transfer and management book series (2024), pp. 41-74
Closed Access
Advances in knowledge acquisition, transfer, and management book series/Advances in knowledge acquisition, transfer and management book series (2024), pp. 41-74
Closed Access
Exploring the Role of Artificial Intelligence in Internet of Things Systems: A Systematic Mapping Study
Umair Khadam, Paul Davidsson, Romina Spalazzese
Sensors (2024) Vol. 24, Iss. 20, pp. 6511-6511
Open Access
Umair Khadam, Paul Davidsson, Romina Spalazzese
Sensors (2024) Vol. 24, Iss. 20, pp. 6511-6511
Open Access
The role of mobile edge computing in advancing federated learning algorithms and techniques: A systematic review of applications, challenges, and future directions
Amir Masoud Rahmani, Shtwai Alsubai, Abed Alanazi, et al.
Computers & Electrical Engineering (2024) Vol. 120, pp. 109812-109812
Closed Access
Amir Masoud Rahmani, Shtwai Alsubai, Abed Alanazi, et al.
Computers & Electrical Engineering (2024) Vol. 120, pp. 109812-109812
Closed Access
An IoT-enabled Smartphone as Digital Doctor (SPADD) Empowered Machine Learning
Zahid Hasan, Kashif Iqbal, Muhammad Zubair, et al.
(2024), pp. 1-10
Closed Access
Zahid Hasan, Kashif Iqbal, Muhammad Zubair, et al.
(2024), pp. 1-10
Closed Access
Deep Learning for IoT Security
Aized Amin Soofi, Haseeb Ahmad
Advances in information security, privacy, and ethics book series (2024), pp. 69-99
Closed Access
Aized Amin Soofi, Haseeb Ahmad
Advances in information security, privacy, and ethics book series (2024), pp. 69-99
Closed Access
Deep Learning-Based Approach for Optimizing Urban Commercial Space Expansion Using Artificial Neural Networks
Dawei Yang, Jiahui Zhao, Ping Xu
Applied Sciences (2024) Vol. 14, Iss. 9, pp. 3845-3845
Open Access
Dawei Yang, Jiahui Zhao, Ping Xu
Applied Sciences (2024) Vol. 14, Iss. 9, pp. 3845-3845
Open Access
Data Mining Best Practices and Efficiency in the Large-Scale Data Mining Using Artificial Intelligence and Generative AI
Chandra Sekhar Veluru
Journal of Artificial Intelligence & Cloud Computing (2024) Vol. 3, Iss. 2, pp. 1-4
Open Access
Chandra Sekhar Veluru
Journal of Artificial Intelligence & Cloud Computing (2024) Vol. 3, Iss. 2, pp. 1-4
Open Access