OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Visualized Botnet Detection System Based Deep Learning for the Internet of Things Networks of Smart Cities
R. Vinayakumar, Mamoun Alazab, Sriram Srinivasan, et al.
IEEE Transactions on Industry Applications (2020) Vol. 56, Iss. 4, pp. 4436-4456
Closed Access | Times Cited: 288

Showing 26-50 of 288 citing articles:

A review on deep learning for future smart cities
Sweta Bhattacharya, Siva Rama Krishnan Somayaji, Thippa Reddy Gadekallu, et al.
Internet Technology Letters (2020) Vol. 5, Iss. 1
Open Access | Times Cited: 110

IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges
Pooja Anand, Yashwant Singh, Arvind Selwal, et al.
IEEE Access (2020) Vol. 8, pp. 168825-168853
Open Access | Times Cited: 105

GAN augmentation to deal with imbalance in imaging-based intrusion detection
Giuseppina Andresini, Annalisa Appice, Luca Rose, et al.
Future Generation Computer Systems (2021) Vol. 123, pp. 108-127
Closed Access | Times Cited: 99

Artificial intelligence for securing industrial-based cyber–physical systems
Zhihan Lv, Dongliang Chen, Ranran Lou, et al.
Future Generation Computer Systems (2020) Vol. 117, pp. 291-298
Closed Access | Times Cited: 97

A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense
Amrita Dahiya, Brij B. Gupta
Future Generation Computer Systems (2020) Vol. 117, pp. 193-204
Closed Access | Times Cited: 89

SDN orchestration to combat evolving cyber threats in Internet of Medical Things (IoMT)
Shahzana Liaqat, Adnan Akhunzada, Fatema Shaikh, et al.
Computer Communications (2020) Vol. 160, pp. 697-705
Open Access | Times Cited: 77

Senti‐eSystem: A sentiment‐based eSystem‐using hybridized fuzzy and deep neural network for measuring customer satisfaction
Muhammad Zubair Asghar, Fazli Subhan, Hussain Ahmad, et al.
Software Practice and Experience (2020) Vol. 51, Iss. 3, pp. 571-594
Closed Access | Times Cited: 75

A Multi-Stage Classification Approach for IoT Intrusion Detection Based on Clustering with Oversampling
Raneem Qaddoura, Ala’ M. Al-Zoubi, Iman Almomani, et al.
Applied Sciences (2021) Vol. 11, Iss. 7, pp. 3022-3022
Open Access | Times Cited: 74

DNNBoT: Deep Neural Network-Based Botnet Detection and Classification
Shobhit Verma, Nonita Sharma, Aman Singh, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2021) Vol. 71, Iss. 1, pp. 1729-1750
Open Access | Times Cited: 70

Classification model for accuracy and intrusion detection using machine learning approach
Arushi Agarwal, Purushottam Sharma, Mohammed Alshehri, et al.
PeerJ Computer Science (2021) Vol. 7, pp. e437-e437
Open Access | Times Cited: 66

New Opportunities, Challenges, and Applications of Edge-AI for Connected Healthcare in Internet of Medical Things for Smart Cities
M. M. Kamruzzaman, Ibrahim Alrashdi, Ali Alqazzaz
Journal of Healthcare Engineering (2022) Vol. 2022, pp. 1-14
Open Access | Times Cited: 59

Network Intrusion Detection and Comparative Analysis Using Ensemble Machine Learning and Feature Selection
Saikat Das, Sajal Saha, Annita Tahsin Priyoti, et al.
IEEE Transactions on Network and Service Management (2021) Vol. 19, Iss. 4, pp. 4821-4833
Closed Access | Times Cited: 56

BotStop : Packet-based efficient and explainable IoT botnet detection using machine learning
Mohammed M. Alani
Computer Communications (2022) Vol. 193, pp. 53-62
Closed Access | Times Cited: 56

Breast cancer diagnosis in an early stage using novel deep learning with hybrid optimization technique
Kranti Kumar Dewangan, Deepak Kumar Dewangan, Satya Prakash Sahu, et al.
Multimedia Tools and Applications (2022) Vol. 81, Iss. 10, pp. 13935-13960
Open Access | Times Cited: 44

Real-time botnet detection on large network bandwidths using machine learning
Javier Velasco-Mata, Víctor González‐Castro, Eduardo Fidalgo, et al.
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 25

A Phishing-Attack-Detection Model Using Natural Language Processing and Deep Learning
Eduardo Benavides-Astudillo, Walter Fuertes, Sandra Sánchez-Gordón, et al.
Applied Sciences (2023) Vol. 13, Iss. 9, pp. 5275-5275
Open Access | Times Cited: 22

Class overlap handling methods in imbalanced domain: A comprehensive survey
A. Kumar, Dinesh Singh, Rama Shankar Yadav
Multimedia Tools and Applications (2024) Vol. 83, Iss. 23, pp. 63243-63290
Closed Access | Times Cited: 11

Intelligent Machine Learning Solutions for Cybersecurity
Bhupinder Singh, Christian Kaunert
Advances in computational intelligence and robotics book series (2024), pp. 359-386
Closed Access | Times Cited: 11

Intelligent detection framework for IoT-botnet detection: DBN-RNN with improved feature set
Sandip Bobade, Ravindra Apare, Ravindra H. Borhade, et al.
Journal of Information Security and Applications (2025) Vol. 89, pp. 103961-103961
Closed Access | Times Cited: 1

Machine learning and metaheuristic optimization algorithms for feature selection and botnet attack detection
Mahdieh Maazalahi, Soodeh Hosseini
Knowledge and Information Systems (2025)
Closed Access | Times Cited: 1

Stackelberg Game for Service Deployment of IoT-Enabled Applications in 6G-Aware Fog Networks
Abhishek Hazra, Mainak Adhikari, Tarachand Amgoth, et al.
IEEE Internet of Things Journal (2020) Vol. 8, Iss. 7, pp. 5185-5193
Closed Access | Times Cited: 63

Deep Multiagent Reinforcement-Learning-Based Resource Allocation for Internet of Controllable Things
Bo Gu, Xu Zhang, Ziqi Lin, et al.
IEEE Internet of Things Journal (2020) Vol. 8, Iss. 5, pp. 3066-3074
Closed Access | Times Cited: 62

Survey on Botnet Detection Techniques: Classification, Methods, and Evaluation
Ying Xing, Hui Shu, Hao Zhao, et al.
Mathematical Problems in Engineering (2021) Vol. 2021, pp. 1-24
Open Access | Times Cited: 54

Botnet Detection Approach Using Graph-Based Machine Learning
Afnan Alharbi, Khalid Alsubhi
IEEE Access (2021) Vol. 9, pp. 99166-99180
Open Access | Times Cited: 51

A secure and lightweight authentication scheme for next generation IoT infrastructure
Minahil Rana, Akasha Shafiq, Izwa Altaf, et al.
Computer Communications (2020) Vol. 165, pp. 85-96
Closed Access | Times Cited: 50

Scroll to top