
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets
Eric Gyamfi, Anca Delia Jurcut
Sensors (2022) Vol. 22, Iss. 10, pp. 3744-3744
Open Access | Times Cited: 88
Eric Gyamfi, Anca Delia Jurcut
Sensors (2022) Vol. 22, Iss. 10, pp. 3744-3744
Open Access | Times Cited: 88
Showing 26-50 of 88 citing articles:
Cyberpsychology: A Longitudinal Analysis of Cyber Adversarial Tactics and Techniques
Marshall S. Rich
Analytics (2023) Vol. 2, Iss. 3, pp. 618-655
Open Access | Times Cited: 5
Marshall S. Rich
Analytics (2023) Vol. 2, Iss. 3, pp. 618-655
Open Access | Times Cited: 5
Enhancing IoT Network Security: Unveiling the Power of Self-Supervised Learning against DDoS Attacks
Josue Genaro Almaraz-Rivera, José Antonio Cantoral-Ceballos, Juan Felipe Botero
Sensors (2023) Vol. 23, Iss. 21, pp. 8701-8701
Open Access | Times Cited: 5
Josue Genaro Almaraz-Rivera, José Antonio Cantoral-Ceballos, Juan Felipe Botero
Sensors (2023) Vol. 23, Iss. 21, pp. 8701-8701
Open Access | Times Cited: 5
ENSEMBLE MACHINE LEARNING APPROACH FOR IOT INTRUSION DETECTION SYSTEMS
Baseem A. kadheem Hammood, Ahmed T. Sadiq
Iraqi Journal for Computers and Informatics (2023) Vol. 49, Iss. 2, pp. 93-99
Open Access | Times Cited: 4
Baseem A. kadheem Hammood, Ahmed T. Sadiq
Iraqi Journal for Computers and Informatics (2023) Vol. 49, Iss. 2, pp. 93-99
Open Access | Times Cited: 4
Unlocking the potential: A comprehensive meta-synthesis of Internet of Things in the sports industry
Sadegh Fatahi Milasi, Nooshin Benar, Ali Nazarian, et al.
Proceedings of the Institution of Mechanical Engineers Part P Journal of Sports Engineering and Technology (2024)
Closed Access | Times Cited: 1
Sadegh Fatahi Milasi, Nooshin Benar, Ali Nazarian, et al.
Proceedings of the Institution of Mechanical Engineers Part P Journal of Sports Engineering and Technology (2024)
Closed Access | Times Cited: 1
Improving the security of Internet of Things (IoT) using Intrusion Detection System(IDS)
Rahila Rahim, Mohammad Ahsan Chishti, Mohamed Mahees Raheem
(2024), pp. 290-295
Closed Access | Times Cited: 1
Rahila Rahim, Mohammad Ahsan Chishti, Mohamed Mahees Raheem
(2024), pp. 290-295
Closed Access | Times Cited: 1
IoT-FKGDL-SL: Anomaly Detection Framework Integrating Knowledge Distillation and a Swarm Learning for 5G IoT
Lun Tang, Enqiao Kou, Weijia Zhang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 23, pp. 38601-38614
Closed Access | Times Cited: 1
Lun Tang, Enqiao Kou, Weijia Zhang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 23, pp. 38601-38614
Closed Access | Times Cited: 1
Impact Evaluation of Feature Selection Algorithms on Machine Learning-Based Intrusion Detection
Youssef Regragui, Abdellah Mazighi, Lahoucine Ballihi, et al.
(2024) Vol. 64, pp. 1-6
Closed Access | Times Cited: 1
Youssef Regragui, Abdellah Mazighi, Lahoucine Ballihi, et al.
(2024) Vol. 64, pp. 1-6
Closed Access | Times Cited: 1
An innovative framework to securely transfer data through the Internet of Things using advanced generative adversarial networks
Akram Bennour, Mohamed Elhoseny, Bala Dhandayuthapani Veerasamy, et al.
Journal of High Speed Networks (2024)
Closed Access | Times Cited: 1
Akram Bennour, Mohamed Elhoseny, Bala Dhandayuthapani Veerasamy, et al.
Journal of High Speed Networks (2024)
Closed Access | Times Cited: 1
A Comprehensive Survey on Generative AI Solutions in IoT Security
Juan Luis López Delgado, Juan Antonio López Ramos
Electronics (2024) Vol. 13, Iss. 24, pp. 4965-4965
Open Access | Times Cited: 1
Juan Luis López Delgado, Juan Antonio López Ramos
Electronics (2024) Vol. 13, Iss. 24, pp. 4965-4965
Open Access | Times Cited: 1
Evaluation of soft computing in intrusion detection for secure social Internet of Things based on collaborative edge computing
Bishwajeet Kumar Pandey, Ashendra Kumar Saxena, Amit Barve, et al.
Soft Computing (2023)
Closed Access | Times Cited: 4
Bishwajeet Kumar Pandey, Ashendra Kumar Saxena, Amit Barve, et al.
Soft Computing (2023)
Closed Access | Times Cited: 4
Optimization algorithms in security and privacy-preserving data disturbance for collaborative edge computing social IoT deep learning architectures
Mythili Boopathi, Sachin Kumar Gupta, Mohammed Zabeeulla A N, et al.
Research Square (Research Square) (2023)
Closed Access | Times Cited: 3
Mythili Boopathi, Sachin Kumar Gupta, Mohammed Zabeeulla A N, et al.
Research Square (Research Square) (2023)
Closed Access | Times Cited: 3
Exploring edge TPU for network intrusion detection in IoT
Seyedehfaezeh Hosseininoorbin, Siamak Layeghy, Mohanad Sarhan, et al.
Journal of Parallel and Distributed Computing (2023) Vol. 179, pp. 104712-104712
Open Access | Times Cited: 3
Seyedehfaezeh Hosseininoorbin, Siamak Layeghy, Mohanad Sarhan, et al.
Journal of Parallel and Distributed Computing (2023) Vol. 179, pp. 104712-104712
Open Access | Times Cited: 3
Machine Learning Based Classification of IoT Traffic
Bojana Velichkovska, Ана Чолакоска, Vladimir Atanasovski
Radioengineering (2023) Vol. 32, Iss. 2, pp. 256-263
Open Access | Times Cited: 3
Bojana Velichkovska, Ана Чолакоска, Vladimir Atanasovski
Radioengineering (2023) Vol. 32, Iss. 2, pp. 256-263
Open Access | Times Cited: 3
A parallel game model‐based intrusion response system for cross‐layer security in industrial internet of things
Siyang Yu, Fan Wu, Baoding Chen, et al.
Concurrency and Computation Practice and Experience (2023) Vol. 35, Iss. 28
Closed Access | Times Cited: 3
Siyang Yu, Fan Wu, Baoding Chen, et al.
Concurrency and Computation Practice and Experience (2023) Vol. 35, Iss. 28
Closed Access | Times Cited: 3
Intrusion Detection in IoT leveraged by Multi-Access Edge Computing using Machine Learning
Dongjin Li, Nahid Ebrahimi Majd
(2023), pp. 441-446
Closed Access | Times Cited: 3
Dongjin Li, Nahid Ebrahimi Majd
(2023), pp. 441-446
Closed Access | Times Cited: 3
Animation Rendering Optimization Based on Ray Tracing and Distributed Algorithm
Yiran Tao, Rongjuan Wang
Computer-Aided Design and Applications (2023), pp. 32-47
Open Access | Times Cited: 3
Yiran Tao, Rongjuan Wang
Computer-Aided Design and Applications (2023), pp. 32-47
Open Access | Times Cited: 3
Fourier and Chirp-Z Transforms in the Estimation Values Process of Horizontal and Vertical Synchronization Frequencies of Graphic Displays
Ireneusz Kubiak, Artur Przybysz
Applied Sciences (2022) Vol. 12, Iss. 10, pp. 5281-5281
Open Access | Times Cited: 5
Ireneusz Kubiak, Artur Przybysz
Applied Sciences (2022) Vol. 12, Iss. 10, pp. 5281-5281
Open Access | Times Cited: 5
Optimal Wavelet Neural Network-Based Intrusion Detection in Internet of Things Environment
Heba G. Mohamed, Fadwa Alrowais, Mohammed Abdullah Al-Hagery, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 75, Iss. 2, pp. 4467-4483
Open Access | Times Cited: 2
Heba G. Mohamed, Fadwa Alrowais, Mohammed Abdullah Al-Hagery, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 75, Iss. 2, pp. 4467-4483
Open Access | Times Cited: 2
TransIDS: A Transformer-based approach for intrusion detection in Internet of Things using Label Smoothing
Peng Wang, Xiaodan Wang, Yafei Song, et al.
(2023), pp. 216-222
Closed Access | Times Cited: 2
Peng Wang, Xiaodan Wang, Yafei Song, et al.
(2023), pp. 216-222
Closed Access | Times Cited: 2
The Analysis of Communication Strategy of Disabled Sports Information Based on Deep Learning and the Internet of Things
Wanglong Wang, Qingwen Liu, Chuan Shu
IEEE Access (2024) Vol. 12, pp. 45976-45985
Closed Access
Wanglong Wang, Qingwen Liu, Chuan Shu
IEEE Access (2024) Vol. 12, pp. 45976-45985
Closed Access
A Hybrid Particle Swarm Optimization and C4.5 for Network Intrusion Detection and Prevention System
K.Nandha Kumar, D. Udaya Suriya Rajkumar, G. Viswanath, et al.
International Journal of Computing (2024), pp. 109-115
Open Access
K.Nandha Kumar, D. Udaya Suriya Rajkumar, G. Viswanath, et al.
International Journal of Computing (2024), pp. 109-115
Open Access
A Novel Autoencoder based Federated Deep Transfer Learning and Weighted k-Subspace Network clustering for Intelligent Intrusion Detection for the Internet of Things
V. Lavanya, R. Anushiya
Salud Ciencia y Tecnología - Serie de Conferencias (2024) Vol. 3, pp. 648-648
Open Access
V. Lavanya, R. Anushiya
Salud Ciencia y Tecnología - Serie de Conferencias (2024) Vol. 3, pp. 648-648
Open Access
Uncovering botnets in IoT sensor networks: a hybrid self-organizing maps approach
Mwaffaq Abu AlHija, Hamza Jehad Alqudah, Hiba Dar-Othman
Indonesian Journal of Electrical Engineering and Computer Science (2024) Vol. 34, Iss. 3, pp. 1840-1840
Open Access
Mwaffaq Abu AlHija, Hamza Jehad Alqudah, Hiba Dar-Othman
Indonesian Journal of Electrical Engineering and Computer Science (2024) Vol. 34, Iss. 3, pp. 1840-1840
Open Access
A Novel Approach for Anomaly Detection using Snort Integrated with Machine Learning
T. Preethi, Ponnuru Rakshitha Reddy, Lekkala Likhitha, et al.
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) (2024)
Closed Access
T. Preethi, Ponnuru Rakshitha Reddy, Lekkala Likhitha, et al.
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) (2024)
Closed Access
Dynamic hierarchical intrusion detection task offloading in IoT edge networks
Mansi Sahi, Nitin Auluck, Akramul Azim, et al.
Software Practice and Experience (2024) Vol. 54, Iss. 11, pp. 2249-2271
Closed Access
Mansi Sahi, Nitin Auluck, Akramul Azim, et al.
Software Practice and Experience (2024) Vol. 54, Iss. 11, pp. 2249-2271
Closed Access