OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Anomaly Detection Using Deep Neural Network for IoT Architecture
Zeeshan Ahmad, Adnan Shahid Khan, Kashif Nisar, et al.
Applied Sciences (2021) Vol. 11, Iss. 15, pp. 7050-7050
Open Access | Times Cited: 93

Showing 51-75 of 93 citing articles:

Crack growth degradation-based diagnosis and design of high pressure liquefied natural gas pipe via designable data-augmented anomaly detection
Dabin Yang, Sanghoon Lee, Jongsoo Lee
Journal of Computational Design and Engineering (2023) Vol. 10, Iss. 4, pp. 1531-1546
Open Access | Times Cited: 4

Pattern Augmented Lightweight Convolutional Neural Network for Intrusion Detection System
Yonatan Embiza Tadesse, Young‐June Choi
Electronics (2024) Vol. 13, Iss. 5, pp. 932-932
Open Access | Times Cited: 1

A Framework for Driver Drowsiness Monitoring Using a Convolutional Neural Network and the Internet of Things
Muhamad Irsan, Rosilah Hassan, Anwar Hassan Ibrahim, et al.
Intelligent Automation & Soft Computing (2024) Vol. 39, Iss. 2, pp. 157-174
Open Access | Times Cited: 1

DeepRoughNetID: A Robust Framework for Network Anomaly Intrusion Detection with High Detection Rates
M. Nalini, B. Yamini, P. Sinthia, et al.
IETE Journal of Research (2024) Vol. 70, Iss. 9, pp. 7137-7148
Closed Access | Times Cited: 1

Review on deep learning classifiers for faults diagnosis of rotating industrial machinery
Ameer Ali Shaalan, Wafa Mefteh, Ali Frihida
Service Oriented Computing and Applications (2024) Vol. 18, Iss. 4, pp. 361-379
Closed Access | Times Cited: 1

A comprehensive survey on deep learning‐based intrusion detection systems in Internet of Things (IoT)
Qasem Abu Al‐Haija, Ayat Droos
Expert Systems (2024)
Closed Access | Times Cited: 1

A review of time-series analysis for cyber security analytics: from intrusion detection to attack prediction
Max Landauer, Florian Skopik, Branka Stojanović, et al.
International Journal of Information Security (2024) Vol. 24, Iss. 1
Open Access | Times Cited: 1

Cyber Security Risk management with attack detection frameworks using multi connect variational auto-encoder with probabilistic Bayesian networks
Samar Mouti, Surendra Kumar Shukla, Sara A. Althubiti, et al.
Computers & Electrical Engineering (2022) Vol. 103, pp. 108308-108308
Closed Access | Times Cited: 7

Neural Network based Temporal Point Processes for Attack Detection in Industrial Control Systems
Giancarlo Fortino, Claudia Greco, Antonella Guzzo, et al.
(2022), pp. 221-226
Closed Access | Times Cited: 7

S-ADS: Spectrogram Image-based Anomaly Detection System for IoT networks
Zeeshan Ahmad, Adnan Shahid Khan, Sehrish Aqeel, et al.
(2022), pp. 105-110
Closed Access | Times Cited: 6

Energy aware routing with optimal deep learning based anomaly detection in 6G-IoT networks
Hussain Alshahrani, Mohammed Maray, Mohammed Aljebreen, et al.
Sustainable Energy Technologies and Assessments (2023) Vol. 60, pp. 103494-103494
Closed Access | Times Cited: 3

Using Deep Learning Technique to Protect Internet Network from Intrusion in IoT Environment
Ashwaq Fahhad Almutairi, Asma A. Al-Shargabi
(2022), pp. 1-6
Closed Access | Times Cited: 5

Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure
Nayeem Ahmad Khan, Adnan Shahid Khan, Hushmat Amin Kar, et al.
(2022), pp. 126-130
Closed Access | Times Cited: 5

Attack Detection in IoT Using Machine Learning—A Survey
Saeed Ali Haifa Ali, J. Vakula Rani
Springer eBooks (2023), pp. 211-228
Closed Access | Times Cited: 2

Ultra-Lightweight Fast Anomaly Detectors for Industrial Applications
Michał Kocon, Marcin Malesa, Jerzy Rapcewicz
Sensors (2023) Vol. 24, Iss. 1, pp. 161-161
Open Access | Times Cited: 2

A Hybrid PCA-MAO Based LSTM Model for Intrusion Detection in IoT Environments
Hamdullah Karamollaoğlu, İbrahim Yücedağ, İbrahim Alper Doğru
Research Square (Research Square) (2022)
Closed Access | Times Cited: 4

Machine Learning with Data Balancing Technique for IoT Attack and Anomalies Detection
Muhammad Asad Arshed, Abdul Jabbar, Farrukh Liaquat, et al.
International Journal of Innovations in Science and Technology (2022) Vol. 4, Iss. 2, pp. 490-498
Open Access | Times Cited: 4

The Detection of Abnormal Behavior in Healthcare IoT Using IDS, CNN, and SVM
Oluwaseun Priscilla Olawale, Sahar Ebadinezhad
Lecture notes on data engineering and communications technologies (2023), pp. 375-394
Closed Access | Times Cited: 2

RoCC framework for anomaly detection in IoT healthcare data
S. Subha, J.G.R. Sathiaseelan
AIP conference proceedings (2024) Vol. 3203, pp. 030042-030042
Closed Access

Rekayasa Fitur Berbasis Machine Learning untuk Mendeteksi Serangan DDoS
Muhammad Nur Faiz, Oman Somantri, Arif Wirawan Muhammad
Jurnal Nasional Teknik Elektro dan Teknologi Informasi (JNTETI) (2022) Vol. 11, Iss. 3, pp. 176-182
Open Access | Times Cited: 3

Intrusion Detection System based on Chaotic Opposition for IoT Network
Richa Singh, R. L. Ujjwal
International journal of electrical and computer engineering systems (2024) Vol. 15, Iss. 2, pp. 121-136
Open Access

Enhancement of cyber security in IoT based on ant colony optimized artificial neural adaptive Tensor flow
Vijaya Bhaskar Sadu, Abhishek Kumar, Omaia Mohammed Al-Omari, et al.
Network Computation in Neural Systems (2024), pp. 1-17
Closed Access

Scroll to top