OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Internet of Drones Intrusion Detection Using Deep Learning
Rabie Α. Ramadan, Abdel-Hamid M. Emara, Mohammed Al-Sarem, et al.
Electronics (2021) Vol. 10, Iss. 21, pp. 2633-2633
Open Access | Times Cited: 52

Showing 26-50 of 52 citing articles:

A Network Intrusion Detection Method Based on Bagging Ensemble
Zichen Zhang, Shanshan Kong, T. D. Xiao, et al.
Symmetry (2024) Vol. 16, Iss. 7, pp. 850-850
Open Access | Times Cited: 1

Improving intrusion detection using LSTM-RNN to protect drones’ networks
Mohamed Gamal, Mohamed Elhamahmy, Sanaa Taha, et al.
Egyptian Informatics Journal (2024) Vol. 27, pp. 100501-100501
Open Access | Times Cited: 1

Leveraging Human-In-The-Loop Machine Learning and GAN-Synthesized Data for Intrusion Detection in Unmanned Aerial Vehicle Networks
Qingli Zeng, Farid Naït‐Abdesselam
ICC 2022 - IEEE International Conference on Communications (2024), pp. 1557-1562
Closed Access | Times Cited: 1

A New Hybrid Adaptive Deep Learning-Based Framework for UAVs Faults and Attacks Detection
Fadhila Tlili, Samiha Ayed, Lamia Chaari Fourati
IEEE Transactions on Services Computing (2023) Vol. 16, Iss. 6, pp. 4128-4139
Closed Access | Times Cited: 4

SDN-driven Dynamic Deployment of IDS with Load Balancing for Drones in Emergency Scenarios
Mauro Tropea, Mattia Giovanni Spina, Floriano De Rango
(2023)
Closed Access | Times Cited: 4

RAGMCL: A Correlation-Feature-Incorporated Multichannel Network for Signal Modulation Recognition
Yangyang Wang, Fei Cao, Xiaolong Wang, et al.
Research Square (Research Square) (2024)
Open Access | Times Cited: 1

Hybrid arithmetic optimization algorithm with deep learning model for secure Unmanned Aerial Vehicle networks
Sultanah M. Alshammari, Nofe Alganmi, Mohammed Ba-Aoum, et al.
AIMS Mathematics (2024) Vol. 9, Iss. 3, pp. 7131-7151
Open Access | Times Cited: 1

UAV networks DoS attacks detection using artificial intelligence based on weighted machine learning
Orkhan Valikhanli
Results in Control and Optimization (2024) Vol. 16, pp. 100457-100457
Open Access | Times Cited: 1

A Survey on the Use of Deep Learning Techniques for UAV Jamming and Deception
Ondřej Šimon, Tomáš Götthans
Electronics (2022) Vol. 11, Iss. 19, pp. 3025-3025
Open Access | Times Cited: 7

Improving Intrusion Detection in UAV Communication Using an LSTM-SMOTE Classification Method
Abdulrahman M. Abdulghani, Mokhles M. Abdulghani, Wilbur L. Walters, et al.
Journal of Cyber Security (2022) Vol. 4, Iss. 4, pp. 287-298
Open Access | Times Cited: 5

A Systematic Mapping Study in Intrusion Detection System for Unmanned Aerial Vehicles Security
Leandro Marcos da Silva, Isadora Garcia Ferrão, Kalinka R. L. J. C. Branco
(2022), pp. 43-48
Closed Access | Times Cited: 4

Drone detection using YOLO
Saraswati Patil, Sangita M. Jaybhaye, Mohammed Mansoor Khalifa, et al.
AIP conference proceedings (2023) Vol. 2977, pp. 020002-020002
Closed Access | Times Cited: 2

SURA-LB: Software-defined IDS with UAV Resource Aware Load-Balancing in FANET disaster scenarios
Mattia Giovanni Spina, Mauro Tropea, Floriano De Rango
Computer Communications (2024) Vol. 223, pp. 101-114
Open Access

Real-time drone detection framework based on advanced texture feature extraction and pattern recognition model using GUI
Noha Hussen, Mofreh Salem, Ali I. Eldesouky, et al.
Neural Computing and Applications (2024) Vol. 37, Iss. 5, pp. 3435-3454
Closed Access

CatBoost-based Intrusion Detection Method for the Physical Layer of Smart Agriculture
Zizhong Wei, Fanggang Ning, Kai Jiang, et al.
ITM Web of Conferences (2024) Vol. 60, pp. 00009-00009
Open Access

An Intrusion Detection System Using Machine Learning to Secure the Internet of Drones
Md. Afroz, Emmanuel Nyakwende, Birendra Goswami
Algorithms for intelligent systems (2024), pp. 59-75
Closed Access

A Machine Vision Approach to Real-Time Drone Detection Using Gray Level Co-occurrence Matrix and Interactive GUI
Noha Hussen, Mofreh Salem, Ali I. El-Desouky, et al.
2022 International Telecommunications Conference (ITC-Egypt) (2024), pp. 554-560
Closed Access

Security situation assessment in UAV swarm networks using TransReSE: A Transformer-ResNeXt-SE based approach
Dongmei Zhao, Pengcheng Shen, Xunzhen Han, et al.
Vehicular Communications (2024) Vol. 50, pp. 100842-100842
Closed Access

Drone Detection Performance Evaluation via Real Experiments with Additional Synthetic Darkness
Furkan Oruç, H. Birkan Yilmaz
Gazi University Journal of Science Part A Engineering and Innovation (2024) Vol. 11, Iss. 3, pp. 546-562
Open Access

READS: Resource efficient attack detection system for drones
A. Ajay Vishnu, Sumedha Arora
Multimedia Tools and Applications (2024)
Closed Access

Facets of security and safety problems and paradigms for smart aerial mobility and intelligent logistics
Simeon Okechukwu Ajakwe, Vivian Ukamaka Ihekoronye
IET Intelligent Transport Systems (2024)
Open Access

Mathematical modelling-based blockchain with attention deep learning model for cybersecurity in IoT-consumer electronics
Hayam Alamro, Mohammed Maray, Jawhara Aljabri, et al.
Alexandria Engineering Journal (2024) Vol. 113, pp. 366-377
Open Access

Blockchain-based Secure UAV-assisted Battlefield Operation underlying 5G
Dhruvi Pancholi, Nilesh Kumar Jadav, Sudeep Tanwar, et al.
(2023), pp. 30-35
Closed Access | Times Cited: 1

Feature Selection with Stacked Autoencoder Based Intrusion Detection in Drones Environment
Heba G. Mohamed, Saud S. Alotaibi, Majdy M. Eltahir, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 73, Iss. 3, pp. 5441-5458
Open Access | Times Cited: 1

Hybrid Deep-Generative Adversarial Network Based Intrusion Detection Model for Internet of Things Using Binary Particle Swarm Optimization
S. Balaji, S. Sankaranarayanan
International Journal of Electrical and Electronics Research (2022) Vol. 10, Iss. 4, pp. 948-953
Open Access | Times Cited: 1

Scroll to top