
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Anomaly Detection Using Deep Neural Network for IoT Architecture
Zeeshan Ahmad, Adnan Shahid Khan, Kashif Nisar, et al.
Applied Sciences (2021) Vol. 11, Iss. 15, pp. 7050-7050
Open Access | Times Cited: 93
Zeeshan Ahmad, Adnan Shahid Khan, Kashif Nisar, et al.
Applied Sciences (2021) Vol. 11, Iss. 15, pp. 7050-7050
Open Access | Times Cited: 93
Showing 26-50 of 93 citing articles:
TPAAD: Two‐phase authentication system for denial of service attack detection and mitigation using machine learning in software‐defined network
Najmun Nisa, Adnan Shahid Khan, Zeeshan Ahmad, et al.
International Journal of Network Management (2024) Vol. 34, Iss. 3
Open Access | Times Cited: 4
Najmun Nisa, Adnan Shahid Khan, Zeeshan Ahmad, et al.
International Journal of Network Management (2024) Vol. 34, Iss. 3
Open Access | Times Cited: 4
Network security framework for Internet of medical things applications: A survey
Hiba A. Tarish, Rosilah Hassan, Khairul Akram Zainol Ariffin, et al.
Journal of Intelligent Systems (2024) Vol. 33, Iss. 1
Open Access | Times Cited: 4
Hiba A. Tarish, Rosilah Hassan, Khairul Akram Zainol Ariffin, et al.
Journal of Intelligent Systems (2024) Vol. 33, Iss. 1
Open Access | Times Cited: 4
Machine Learning-Based Intrusion Detection Methods in IoT Systems: A Comprehensive Review
Brunel Rolack Kikissagbe, Meddi Adda
Electronics (2024) Vol. 13, Iss. 18, pp. 3601-3601
Open Access | Times Cited: 4
Brunel Rolack Kikissagbe, Meddi Adda
Electronics (2024) Vol. 13, Iss. 18, pp. 3601-3601
Open Access | Times Cited: 4
Optimization of Clustering in Wireless Sensor Networks: Techniques and Protocols
Ahmed Mahdi Jubair, Rosilah Hassan, Azana Hafizah Mohd Aman, et al.
Applied Sciences (2021) Vol. 11, Iss. 23, pp. 11448-11448
Open Access | Times Cited: 30
Ahmed Mahdi Jubair, Rosilah Hassan, Azana Hafizah Mohd Aman, et al.
Applied Sciences (2021) Vol. 11, Iss. 23, pp. 11448-11448
Open Access | Times Cited: 30
Blockchain-based Multifactor Authentication for Future 6G Cellular Networks: A Systematic Review
Jamil Asim, Adnan Shahid Khan, Rashad Mahmood Saqib, et al.
Applied Sciences (2022) Vol. 12, Iss. 7, pp. 3551-3551
Open Access | Times Cited: 18
Jamil Asim, Adnan Shahid Khan, Rashad Mahmood Saqib, et al.
Applied Sciences (2022) Vol. 12, Iss. 7, pp. 3551-3551
Open Access | Times Cited: 18
Lightweight Multifactor Authentication Scheme for NextGen Cellular Networks
Adnan Shahid Khan, Yasir Javed, Rashad Mahmood Saqib, et al.
IEEE Access (2022) Vol. 10, pp. 31273-31288
Open Access | Times Cited: 18
Adnan Shahid Khan, Yasir Javed, Rashad Mahmood Saqib, et al.
IEEE Access (2022) Vol. 10, pp. 31273-31288
Open Access | Times Cited: 18
Unsupervised novelty detection for time series using a deep learning approach
Md. Jakir Hossen, Jesmeen Mohd Zebaral Hoque, Nor Azlina binti Abdul Aziz, et al.
Heliyon (2024) Vol. 10, Iss. 3, pp. e25394-e25394
Open Access | Times Cited: 3
Md. Jakir Hossen, Jesmeen Mohd Zebaral Hoque, Nor Azlina binti Abdul Aziz, et al.
Heliyon (2024) Vol. 10, Iss. 3, pp. e25394-e25394
Open Access | Times Cited: 3
A Comprehensive Review of Machine Learning Approaches for Anomaly Detection in Smart Homes: Experimental Analysis and Future Directions
Md. Motiur Rahman, Deepti Gupta, Smriti Bhatt, et al.
Future Internet (2024) Vol. 16, Iss. 4, pp. 139-139
Open Access | Times Cited: 3
Md. Motiur Rahman, Deepti Gupta, Smriti Bhatt, et al.
Future Internet (2024) Vol. 16, Iss. 4, pp. 139-139
Open Access | Times Cited: 3
A Survey on 6G Enabled Light Weight Authentication Protocol for UAVs, Security, Open Research Issues and Future Directions
Adnan Shahid Khan, Muhammad Ali Sattar, Kashif Nisar, et al.
Applied Sciences (2022) Vol. 13, Iss. 1, pp. 277-277
Open Access | Times Cited: 15
Adnan Shahid Khan, Muhammad Ali Sattar, Kashif Nisar, et al.
Applied Sciences (2022) Vol. 13, Iss. 1, pp. 277-277
Open Access | Times Cited: 15
Identification and prediction of attacks to industrial control systems using temporal point processes
Giancarlo Fortino, Claudia Greco, Antonella Guzzo, et al.
Journal of Ambient Intelligence and Humanized Computing (2022) Vol. 14, Iss. 5, pp. 4771-4783
Open Access | Times Cited: 14
Giancarlo Fortino, Claudia Greco, Antonella Guzzo, et al.
Journal of Ambient Intelligence and Humanized Computing (2022) Vol. 14, Iss. 5, pp. 4771-4783
Open Access | Times Cited: 14
Anomaly detection using deep convolutional generative adversarial networks in the internet of things
Amit Kumar Mishra, Shweta Paliwal, Gautam Srivastava
ISA Transactions (2023)
Closed Access | Times Cited: 8
Amit Kumar Mishra, Shweta Paliwal, Gautam Srivastava
ISA Transactions (2023)
Closed Access | Times Cited: 8
Analysis and Intellectual Structure of the Multi-Factor Authentication in Information Security
Rashad Mahmood Saqib, Adnan Shahid Khan, Yasir Javed, et al.
Intelligent Automation & Soft Computing (2021) Vol. 32, Iss. 3, pp. 1633-1647
Open Access | Times Cited: 19
Rashad Mahmood Saqib, Adnan Shahid Khan, Yasir Javed, et al.
Intelligent Automation & Soft Computing (2021) Vol. 32, Iss. 3, pp. 1633-1647
Open Access | Times Cited: 19
TL-BILSTM IoT: transfer learning model for prediction of intrusion detection system in IoT environment
Himanshu Nandanwar, Rahul Katarya
International Journal of Information Security (2023) Vol. 23, Iss. 2, pp. 1251-1277
Closed Access | Times Cited: 7
Himanshu Nandanwar, Rahul Katarya
International Journal of Information Security (2023) Vol. 23, Iss. 2, pp. 1251-1277
Closed Access | Times Cited: 7
Leveraging feature subset selection with deer hunting optimizer based deep learning for anomaly detection in secure cloud environment
V. Sujatha Bai, M. Punithavalli
Multimedia Tools and Applications (2024) Vol. 83, Iss. 25, pp. 65949-65966
Closed Access | Times Cited: 2
V. Sujatha Bai, M. Punithavalli
Multimedia Tools and Applications (2024) Vol. 83, Iss. 25, pp. 65949-65966
Closed Access | Times Cited: 2
CYBER SECURITY ATTACK DETECTION MODEL USING SEMI-SUPERVISED LEARNING
Samson Isaac, Damilola Kolawole Ayodeji, Yusuf Luqman, et al.
FUDMA Journal of Sciences (2024) Vol. 8, Iss. 2, pp. 92-100
Open Access | Times Cited: 2
Samson Isaac, Damilola Kolawole Ayodeji, Yusuf Luqman, et al.
FUDMA Journal of Sciences (2024) Vol. 8, Iss. 2, pp. 92-100
Open Access | Times Cited: 2
Deep Learning-based DDoS Detection in Network Traffic Data
Teeb Hussein Hadi
International journal of electrical and computer engineering systems (2024) Vol. 15, Iss. 5, pp. 407-414
Open Access | Times Cited: 2
Teeb Hussein Hadi
International journal of electrical and computer engineering systems (2024) Vol. 15, Iss. 5, pp. 407-414
Open Access | Times Cited: 2
Zeeshan Ahmad, Adnan Shahid Khan, Kartinah Zen, et al.
Transactions on Emerging Telecommunications Technologies (2023) Vol. 34, Iss. 8
Open Access | Times Cited: 6
A Survey on Blockchain Technology Supported Approaches for Healthcare System, Open Issues and Challenges
Sumit Kumar Rana, Sanjeev Rana, Arun Kumar Rana, et al.
2022 14th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS) (2022)
Closed Access | Times Cited: 10
Sumit Kumar Rana, Sanjeev Rana, Arun Kumar Rana, et al.
2022 14th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS) (2022)
Closed Access | Times Cited: 10
Artificial Intelligence and the Internet of Things Forensics in a National Security Context
Reza Montasari
Advances in information security (2023), pp. 57-80
Closed Access | Times Cited: 5
Reza Montasari
Advances in information security (2023), pp. 57-80
Closed Access | Times Cited: 5
Sparse Long Short-Term Memory Approach for Energy-Efficient Adaptive Cluster Fuzzy-based Controller in Wireless Sensor Network
Kavita Ramanan, S. P. Ramesh, C. Sahaya Kingsly, et al.
2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT) (2023), pp. 211-219
Closed Access | Times Cited: 5
Kavita Ramanan, S. P. Ramesh, C. Sahaya Kingsly, et al.
2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT) (2023), pp. 211-219
Closed Access | Times Cited: 5
Meta-Learner-Based Approach for Detecting Attacks on Internet of Things Networks
Shaza Dawood Ahmed Rihan, Mohammed Anbar, Basim Ahmad Alabsi
Sensors (2023) Vol. 23, Iss. 19, pp. 8191-8191
Open Access | Times Cited: 5
Shaza Dawood Ahmed Rihan, Mohammed Anbar, Basim Ahmad Alabsi
Sensors (2023) Vol. 23, Iss. 19, pp. 8191-8191
Open Access | Times Cited: 5
Self-Healing of Semantically Interoperable Smart and Prescriptive Edge Devices in IoT
Asimina Dimara, Vasileios G. Vasilopoulos, Alexios Papaioannou, et al.
Applied Sciences (2022) Vol. 12, Iss. 22, pp. 11650-11650
Open Access | Times Cited: 9
Asimina Dimara, Vasileios G. Vasilopoulos, Alexios Papaioannou, et al.
Applied Sciences (2022) Vol. 12, Iss. 22, pp. 11650-11650
Open Access | Times Cited: 9
Deep Convolutional Neural Network for Active Intrusion Detection and Protect data from Passive Intrusion by Pascal Triangle
Abdulrahman Saad Alqahtani
Wireless Personal Communications (2024)
Closed Access | Times Cited: 1
Abdulrahman Saad Alqahtani
Wireless Personal Communications (2024)
Closed Access | Times Cited: 1
Intrusion Detection Techniques in Internet of Things: A Bird’s Eye View
Mayank Gautam, Sachin Ahuja, Abhishek Kumar
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) (2024), pp. 622-628
Closed Access | Times Cited: 1
Mayank Gautam, Sachin Ahuja, Abhishek Kumar
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) (2024), pp. 622-628
Closed Access | Times Cited: 1
Machine Learning for DoS Attack Detection in IoT Systems
Brunel Rolack Kikissagbe, Mehdi Adda, Paul Célicourt, et al.
Procedia Computer Science (2024) Vol. 241, pp. 195-202
Open Access | Times Cited: 1
Brunel Rolack Kikissagbe, Mehdi Adda, Paul Célicourt, et al.
Procedia Computer Science (2024) Vol. 241, pp. 195-202
Open Access | Times Cited: 1