
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Internet of Drones Intrusion Detection Using Deep Learning
Rabie Α. Ramadan, Abdel-Hamid M. Emara, Mohammed Al-Sarem, et al.
Electronics (2021) Vol. 10, Iss. 21, pp. 2633-2633
Open Access | Times Cited: 52
Rabie Α. Ramadan, Abdel-Hamid M. Emara, Mohammed Al-Sarem, et al.
Electronics (2021) Vol. 10, Iss. 21, pp. 2633-2633
Open Access | Times Cited: 52
Showing 26-50 of 52 citing articles:
A Network Intrusion Detection Method Based on Bagging Ensemble
Zichen Zhang, Shanshan Kong, T. D. Xiao, et al.
Symmetry (2024) Vol. 16, Iss. 7, pp. 850-850
Open Access | Times Cited: 1
Zichen Zhang, Shanshan Kong, T. D. Xiao, et al.
Symmetry (2024) Vol. 16, Iss. 7, pp. 850-850
Open Access | Times Cited: 1
Improving intrusion detection using LSTM-RNN to protect drones’ networks
Mohamed Gamal, Mohamed Elhamahmy, Sanaa Taha, et al.
Egyptian Informatics Journal (2024) Vol. 27, pp. 100501-100501
Open Access | Times Cited: 1
Mohamed Gamal, Mohamed Elhamahmy, Sanaa Taha, et al.
Egyptian Informatics Journal (2024) Vol. 27, pp. 100501-100501
Open Access | Times Cited: 1
Leveraging Human-In-The-Loop Machine Learning and GAN-Synthesized Data for Intrusion Detection in Unmanned Aerial Vehicle Networks
Qingli Zeng, Farid Naït‐Abdesselam
ICC 2022 - IEEE International Conference on Communications (2024), pp. 1557-1562
Closed Access | Times Cited: 1
Qingli Zeng, Farid Naït‐Abdesselam
ICC 2022 - IEEE International Conference on Communications (2024), pp. 1557-1562
Closed Access | Times Cited: 1
A New Hybrid Adaptive Deep Learning-Based Framework for UAVs Faults and Attacks Detection
Fadhila Tlili, Samiha Ayed, Lamia Chaari Fourati
IEEE Transactions on Services Computing (2023) Vol. 16, Iss. 6, pp. 4128-4139
Closed Access | Times Cited: 4
Fadhila Tlili, Samiha Ayed, Lamia Chaari Fourati
IEEE Transactions on Services Computing (2023) Vol. 16, Iss. 6, pp. 4128-4139
Closed Access | Times Cited: 4
SDN-driven Dynamic Deployment of IDS with Load Balancing for Drones in Emergency Scenarios
Mauro Tropea, Mattia Giovanni Spina, Floriano De Rango
(2023)
Closed Access | Times Cited: 4
Mauro Tropea, Mattia Giovanni Spina, Floriano De Rango
(2023)
Closed Access | Times Cited: 4
RAGMCL: A Correlation-Feature-Incorporated Multichannel Network for Signal Modulation Recognition
Yangyang Wang, Fei Cao, Xiaolong Wang, et al.
Research Square (Research Square) (2024)
Open Access | Times Cited: 1
Yangyang Wang, Fei Cao, Xiaolong Wang, et al.
Research Square (Research Square) (2024)
Open Access | Times Cited: 1
Hybrid arithmetic optimization algorithm with deep learning model for secure Unmanned Aerial Vehicle networks
Sultanah M. Alshammari, Nofe Alganmi, Mohammed Ba-Aoum, et al.
AIMS Mathematics (2024) Vol. 9, Iss. 3, pp. 7131-7151
Open Access | Times Cited: 1
Sultanah M. Alshammari, Nofe Alganmi, Mohammed Ba-Aoum, et al.
AIMS Mathematics (2024) Vol. 9, Iss. 3, pp. 7131-7151
Open Access | Times Cited: 1
UAV networks DoS attacks detection using artificial intelligence based on weighted machine learning
Orkhan Valikhanli
Results in Control and Optimization (2024) Vol. 16, pp. 100457-100457
Open Access | Times Cited: 1
Orkhan Valikhanli
Results in Control and Optimization (2024) Vol. 16, pp. 100457-100457
Open Access | Times Cited: 1
A Survey on the Use of Deep Learning Techniques for UAV Jamming and Deception
Ondřej Šimon, Tomáš Götthans
Electronics (2022) Vol. 11, Iss. 19, pp. 3025-3025
Open Access | Times Cited: 7
Ondřej Šimon, Tomáš Götthans
Electronics (2022) Vol. 11, Iss. 19, pp. 3025-3025
Open Access | Times Cited: 7
Improving Intrusion Detection in UAV Communication Using an LSTM-SMOTE Classification Method
Abdulrahman M. Abdulghani, Mokhles M. Abdulghani, Wilbur L. Walters, et al.
Journal of Cyber Security (2022) Vol. 4, Iss. 4, pp. 287-298
Open Access | Times Cited: 5
Abdulrahman M. Abdulghani, Mokhles M. Abdulghani, Wilbur L. Walters, et al.
Journal of Cyber Security (2022) Vol. 4, Iss. 4, pp. 287-298
Open Access | Times Cited: 5
A Systematic Mapping Study in Intrusion Detection System for Unmanned Aerial Vehicles Security
Leandro Marcos da Silva, Isadora Garcia Ferrão, Kalinka R. L. J. C. Branco
(2022), pp. 43-48
Closed Access | Times Cited: 4
Leandro Marcos da Silva, Isadora Garcia Ferrão, Kalinka R. L. J. C. Branco
(2022), pp. 43-48
Closed Access | Times Cited: 4
Drone detection using YOLO
Saraswati Patil, Sangita M. Jaybhaye, Mohammed Mansoor Khalifa, et al.
AIP conference proceedings (2023) Vol. 2977, pp. 020002-020002
Closed Access | Times Cited: 2
Saraswati Patil, Sangita M. Jaybhaye, Mohammed Mansoor Khalifa, et al.
AIP conference proceedings (2023) Vol. 2977, pp. 020002-020002
Closed Access | Times Cited: 2
Mattia Giovanni Spina, Mauro Tropea, Floriano De Rango
Computer Communications (2024) Vol. 223, pp. 101-114
Open Access
Real-time drone detection framework based on advanced texture feature extraction and pattern recognition model using GUI
Noha Hussen, Mofreh Salem, Ali I. Eldesouky, et al.
Neural Computing and Applications (2024) Vol. 37, Iss. 5, pp. 3435-3454
Closed Access
Noha Hussen, Mofreh Salem, Ali I. Eldesouky, et al.
Neural Computing and Applications (2024) Vol. 37, Iss. 5, pp. 3435-3454
Closed Access
CatBoost-based Intrusion Detection Method for the Physical Layer of Smart Agriculture
Zizhong Wei, Fanggang Ning, Kai Jiang, et al.
ITM Web of Conferences (2024) Vol. 60, pp. 00009-00009
Open Access
Zizhong Wei, Fanggang Ning, Kai Jiang, et al.
ITM Web of Conferences (2024) Vol. 60, pp. 00009-00009
Open Access
An Intrusion Detection System Using Machine Learning to Secure the Internet of Drones
Md. Afroz, Emmanuel Nyakwende, Birendra Goswami
Algorithms for intelligent systems (2024), pp. 59-75
Closed Access
Md. Afroz, Emmanuel Nyakwende, Birendra Goswami
Algorithms for intelligent systems (2024), pp. 59-75
Closed Access
A Machine Vision Approach to Real-Time Drone Detection Using Gray Level Co-occurrence Matrix and Interactive GUI
Noha Hussen, Mofreh Salem, Ali I. El-Desouky, et al.
2022 International Telecommunications Conference (ITC-Egypt) (2024), pp. 554-560
Closed Access
Noha Hussen, Mofreh Salem, Ali I. El-Desouky, et al.
2022 International Telecommunications Conference (ITC-Egypt) (2024), pp. 554-560
Closed Access
Security situation assessment in UAV swarm networks using TransReSE: A Transformer-ResNeXt-SE based approach
Dongmei Zhao, Pengcheng Shen, Xunzhen Han, et al.
Vehicular Communications (2024) Vol. 50, pp. 100842-100842
Closed Access
Dongmei Zhao, Pengcheng Shen, Xunzhen Han, et al.
Vehicular Communications (2024) Vol. 50, pp. 100842-100842
Closed Access
Drone Detection Performance Evaluation via Real Experiments with Additional Synthetic Darkness
Furkan Oruç, H. Birkan Yilmaz
Gazi University Journal of Science Part A Engineering and Innovation (2024) Vol. 11, Iss. 3, pp. 546-562
Open Access
Furkan Oruç, H. Birkan Yilmaz
Gazi University Journal of Science Part A Engineering and Innovation (2024) Vol. 11, Iss. 3, pp. 546-562
Open Access
READS: Resource efficient attack detection system for drones
A. Ajay Vishnu, Sumedha Arora
Multimedia Tools and Applications (2024)
Closed Access
A. Ajay Vishnu, Sumedha Arora
Multimedia Tools and Applications (2024)
Closed Access
Facets of security and safety problems and paradigms for smart aerial mobility and intelligent logistics
Simeon Okechukwu Ajakwe, Vivian Ukamaka Ihekoronye
IET Intelligent Transport Systems (2024)
Open Access
Simeon Okechukwu Ajakwe, Vivian Ukamaka Ihekoronye
IET Intelligent Transport Systems (2024)
Open Access
Mathematical modelling-based blockchain with attention deep learning model for cybersecurity in IoT-consumer electronics
Hayam Alamro, Mohammed Maray, Jawhara Aljabri, et al.
Alexandria Engineering Journal (2024) Vol. 113, pp. 366-377
Open Access
Hayam Alamro, Mohammed Maray, Jawhara Aljabri, et al.
Alexandria Engineering Journal (2024) Vol. 113, pp. 366-377
Open Access
Blockchain-based Secure UAV-assisted Battlefield Operation underlying 5G
Dhruvi Pancholi, Nilesh Kumar Jadav, Sudeep Tanwar, et al.
(2023), pp. 30-35
Closed Access | Times Cited: 1
Dhruvi Pancholi, Nilesh Kumar Jadav, Sudeep Tanwar, et al.
(2023), pp. 30-35
Closed Access | Times Cited: 1
Feature Selection with Stacked Autoencoder Based Intrusion Detection in Drones Environment
Heba G. Mohamed, Saud S. Alotaibi, Majdy M. Eltahir, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 73, Iss. 3, pp. 5441-5458
Open Access | Times Cited: 1
Heba G. Mohamed, Saud S. Alotaibi, Majdy M. Eltahir, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 73, Iss. 3, pp. 5441-5458
Open Access | Times Cited: 1
Hybrid Deep-Generative Adversarial Network Based Intrusion Detection Model for Internet of Things Using Binary Particle Swarm Optimization
S. Balaji, S. Sankaranarayanan
International Journal of Electrical and Electronics Research (2022) Vol. 10, Iss. 4, pp. 948-953
Open Access | Times Cited: 1
S. Balaji, S. Sankaranarayanan
International Journal of Electrical and Electronics Research (2022) Vol. 10, Iss. 4, pp. 948-953
Open Access | Times Cited: 1