
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
ML-IDS: an efficient ML-enabled intrusion detection system for securing IoT networks and applications
Mohammed Al-Ambusaidi, Yinjun Zhang, Yar Muhammad, et al.
Soft Computing (2023) Vol. 28, Iss. 2, pp. 1765-1784
Closed Access | Times Cited: 12
Mohammed Al-Ambusaidi, Yinjun Zhang, Yar Muhammad, et al.
Soft Computing (2023) Vol. 28, Iss. 2, pp. 1765-1784
Closed Access | Times Cited: 12
Showing 12 citing articles:
WFE-Tab: Overcoming limitations of TabPFN in IIoT-MEC environments with a weighted fusion ensemble-TabPFN model for improved IDS performance
Sergio Ruiz-Villafranca, José Roldán-Gómez, Javier Carrillo-Mondéjar, et al.
Future Generation Computer Systems (2025), pp. 107707-107707
Closed Access
Sergio Ruiz-Villafranca, José Roldán-Gómez, Javier Carrillo-Mondéjar, et al.
Future Generation Computer Systems (2025), pp. 107707-107707
Closed Access
UGL: A comprehensive hybrid model integrating GCN and LSTM for enhanced intrusion detection in UAV controller area networks
Ying Du, Yilong Li, Pu Cheng, et al.
Computer Networks (2025), pp. 111157-111157
Closed Access
Ying Du, Yilong Li, Pu Cheng, et al.
Computer Networks (2025), pp. 111157-111157
Closed Access
Efficient Intrusion Detection: Combining X2 Feature Selection with CNN-BiLSTM on the UNSW-NB15 Dataset
Mohammed Jouhari, Hafsa Benaddi, Khalil Ibrahimi
(2024), pp. 1-6
Closed Access | Times Cited: 4
Mohammed Jouhari, Hafsa Benaddi, Khalil Ibrahimi
(2024), pp. 1-6
Closed Access | Times Cited: 4
STFNIoT:Lightweight IoT Intrusion Detection Based on Explainable Analysis Using Spatiotemporal Fusion Networks
Hanlin Chen, Huan Liu, Wenjun Yang
Research Square (Research Square) (2025)
Closed Access
Hanlin Chen, Huan Liu, Wenjun Yang
Research Square (Research Square) (2025)
Closed Access
A Multiclass Network Intrusion Detection System Using Stacking Ensemble Technique with Hybrid Feature Selection
Veena S Badiger, Gopal K. Shyam
Journal of Advances in Information Technology (2025) Vol. 16, Iss. 3, pp. 342-356
Open Access
Veena S Badiger, Gopal K. Shyam
Journal of Advances in Information Technology (2025) Vol. 16, Iss. 3, pp. 342-356
Open Access
Deep Learning-Based Intrusion Detection for IoT Networks: A Scalable and Efficient Approach
Md. Alamgir Hossain
Research Square (Research Square) (2025)
Closed Access
Md. Alamgir Hossain
Research Square (Research Square) (2025)
Closed Access
Using Machine Learning to Improve IoT Network Security
Asma’a Bassam Alamareen, Malak Hamad Al-mashagbeh, Sara Abuasal, et al.
Studies in computational intelligence (2025), pp. 535-546
Closed Access
Asma’a Bassam Alamareen, Malak Hamad Al-mashagbeh, Sara Abuasal, et al.
Studies in computational intelligence (2025), pp. 535-546
Closed Access
A Novel IDS Based on Jaya Optimizer and Smote-ENN for Cyberattacks Detection
Fawzia Omer Albasheer, Raghavendra Ramesh Haibatti, Mayank Agarwal, et al.
IEEE Access (2024) Vol. 12, pp. 101506-101527
Open Access | Times Cited: 2
Fawzia Omer Albasheer, Raghavendra Ramesh Haibatti, Mayank Agarwal, et al.
IEEE Access (2024) Vol. 12, pp. 101506-101527
Open Access | Times Cited: 2
Next-gen security in IIoT: integrating intrusion detection systems with machine learning for industry 4.0 resilience
Lahcen Idouglid, Said Tkatek, Khalid El Fayq, et al.
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2024) Vol. 14, Iss. 3, pp. 3512-3512
Open Access | Times Cited: 1
Lahcen Idouglid, Said Tkatek, Khalid El Fayq, et al.
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2024) Vol. 14, Iss. 3, pp. 3512-3512
Open Access | Times Cited: 1
MLBFN optimized with Archimedes optimization Algorithm for SRCE
K. Sathish Kumar, Sridevi Sonaimuthu, Navaneetha Rama Krishnan Alangudi Balaji, et al.
Expert Systems with Applications (2024) Vol. 255, pp. 124529-124529
Closed Access
K. Sathish Kumar, Sridevi Sonaimuthu, Navaneetha Rama Krishnan Alangudi Balaji, et al.
Expert Systems with Applications (2024) Vol. 255, pp. 124529-124529
Closed Access
Efficient Dimensionality Reduction in Intrusion Detection Systems via Weighted Power Mean for PCA and LDA
Taha Archi, Mohammed Benattou
(2024) Vol. 18, pp. 1-6
Closed Access
Taha Archi, Mohammed Benattou
(2024) Vol. 18, pp. 1-6
Closed Access
IOT NETWORK INTRUSION DETECTION USING MACHINE LEARNING ON UNSW-NB15 DATASET
Bauyrzһan Omarov, Omirlan Auelbekov, Bakhytzhan Kulambayev, et al.
Herald of Kazakh-British technical university (2024) Vol. 21, Iss. 3, pp. 48-57
Open Access
Bauyrzһan Omarov, Omirlan Auelbekov, Bakhytzhan Kulambayev, et al.
Herald of Kazakh-British technical university (2024) Vol. 21, Iss. 3, pp. 48-57
Open Access
An Effective Deep Learning-Based Intrusion Detection System for the Healthcare Environment
Balaji Karnam, S. Satheesh Kumar, Vivek Duraivelu, et al.
International Journal of Computational Intelligence and Applications (2024)
Closed Access
Balaji Karnam, S. Satheesh Kumar, Vivek Duraivelu, et al.
International Journal of Computational Intelligence and Applications (2024)
Closed Access
Edge Implicit Weighting with Graph Transformers for Robust Intrusion Detection in Internet of Things Network
C. Karpagavalli, M. Kaliappan
Computers & Security (2024), pp. 104299-104299
Closed Access
C. Karpagavalli, M. Kaliappan
Computers & Security (2024), pp. 104299-104299
Closed Access