OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A hybrid machine learning model for intrusion detection in VANET
Hind Bangui, Mouzhi Ge, Barbora Bühnová
Computing (2021) Vol. 104, Iss. 3, pp. 503-531
Closed Access | Times Cited: 77

Showing 1-25 of 77 citing articles:

An Adaptive Real-Time Malicious Node Detection Framework Using Machine Learning in Vehicular Ad-Hoc Networks (VANETs)
Kanwal Rashid, Yousaf Saeed, Abid Ali, et al.
Sensors (2023) Vol. 23, Iss. 5, pp. 2594-2594
Open Access | Times Cited: 45

Double fuzzy clustering-driven context neural network for intrusion detection in cloud computing
S. Anu Velavan, C. Sureshkumar
Wireless Networks (2025)
Closed Access | Times Cited: 1

An Intelligent Intrusion Detection System for VANETs Using Adaptive Fusion Models
M. Shanthalakshmi, R.S. Ponmagal
International Journal of Computational and Experimental Science and Engineering (2025) Vol. 11, Iss. 1
Open Access | Times Cited: 1

Hybrid optimization enabled trust-based secure routing with deep learning-based attack detection in VANET
Gurjot Kaur, Deepti Kakkar
Ad Hoc Networks (2022) Vol. 136, pp. 102961-102961
Closed Access | Times Cited: 60

Intrusion detection system in distributed cloud computing: Hybrid clustering and classification methods
K. Samunnisa, G. Sunil Vijaya Kumar, Karanam Madhavi
Measurement Sensors (2022) Vol. 25, pp. 100612-100612
Open Access | Times Cited: 50

Vehicular Network Intrusion Detection Using a Cascaded Deep Learning Approach with Multi-Variant Metaheuristic
Ankit Manderna, Sushil Kumar, Upasana Dohare, et al.
Sensors (2023) Vol. 23, Iss. 21, pp. 8772-8772
Open Access | Times Cited: 27

Voting-based Ensemble Learning approach for Cyber Attacks Detection in Industrial Internet of Things
Roopa Golchha, Apoorv Joshi, Govind P. Gupta
Procedia Computer Science (2023) Vol. 218, pp. 1752-1759
Open Access | Times Cited: 22

A Blended Deep Learning Intrusion Detection Framework for Consumable Edge-Centric IoMT Industry
Jafar A. Alzubi, Omar A. Alzubi, Issa Qiqieh, et al.
IEEE Transactions on Consumer Electronics (2024) Vol. 70, Iss. 1, pp. 2049-2057
Closed Access | Times Cited: 11

Artificial Intelligence, Internet of things and 6G methodologies in the context of Vehicular Ad-hoc Networks (VANETs): Survey
Bilal Saoud, Ibraheem Shayea, Abdulsamad Ebrahim Yahya, et al.
ICT Express (2024) Vol. 10, Iss. 4, pp. 959-980
Open Access | Times Cited: 11

A novel framework for detection and prevention of denial of service attacks on autonomous vehicles using fuzzy logic
Memoona Sadaf, Zafar Iqbal, Zahid Anwar, et al.
Vehicular Communications (2024) Vol. 46, pp. 100741-100741
Closed Access | Times Cited: 9

An Improved Machine Learning Model with Hybrid Technique in VANET for Robust Communication
Gagan Preet Kour Marwah, Anuj Jain, Praveen Kumar Malik, et al.
Mathematics (2022) Vol. 10, Iss. 21, pp. 4030-4030
Open Access | Times Cited: 34

Intruder Detection in VANET Data Streams Using Federated Learning for Smart City Environments
Monika Arya, Hanumat Sastry G, Bhupesh Kumar Dewangan, et al.
Electronics (2023) Vol. 12, Iss. 4, pp. 894-894
Open Access | Times Cited: 20

Intrusion Detection using hybridized Meta-heuristic techniques with Weighted XGBoost Classifier
Ghulam Mohi-Ud-Din, Lin Zhijun, Jiangbin Zheng, et al.
Expert Systems with Applications (2023) Vol. 232, pp. 120596-120596
Closed Access | Times Cited: 16

Artificial Intelligence-based intrusion detection system for V2V communication in vehicular adhoc networks
Abizar Khalil, Haleem Farman, Moustafa M. Nasralla, et al.
Ain Shams Engineering Journal (2024) Vol. 15, Iss. 4, pp. 102616-102616
Open Access | Times Cited: 6

A Cross-Layered Approach Based Optimization for Secure and Reliable Routing in VANETs
Gurjot Kaur, Deepti Kakkar
Networks and Spatial Economics (2025)
Closed Access

A Systematic Review on Hybrid Intrusion Detection System
Elijah M. Maseno, Zenghui Wang, Hongyan Xing
Security and Communication Networks (2022) Vol. 2022, pp. 1-23
Open Access | Times Cited: 27

Intrusion, anomaly, and attack detection in smart vehicles
Samira Tahajomi Banafshehvaragh, Amir Masoud Rahmani
Microprocessors and Microsystems (2022) Vol. 96, pp. 104726-104726
Closed Access | Times Cited: 26

Intrusion detection system for vehicular ad hoc network attacks based on machine learning techniques
Wasim A. Ali, Michèle Roccotelli, Gennaro Boggia, et al.
Information Security Journal A Global Perspective (2024) Vol. 33, Iss. 6, pp. 659-677
Closed Access | Times Cited: 4

Light spectrum optimization based Adaboost SVM for the secured communication in vehicular Ad Hoc network
M. Vijay, Satish Kumar, R. Sıva Subramanıan, et al.
AIP conference proceedings (2025) Vol. 3262, pp. 020019-020019
Closed Access

A Novel Approach to Driver Negligence Detection: EAXBEVS Algorithm With IoT Integration
S. Bharathi, P. Durgadevi
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 2
Closed Access

Effective Anomaly Intrusion Detection System Based on ML Methods in Vehicular Networks
Roland Nagy, Zsombor Pethő, Árpád Török
Lecture notes in networks and systems (2025), pp. 334-343
Closed Access

Cyber-Physical Artificial Intelligence
Sanghoon Lee, Jiyeong Chae, Haewon Jeon, et al.
ACM Transactions on Cyber-Physical Systems (2025)
Closed Access

Knowledge Mapping with CiteSpace, VOSviewer, and SciMAT on Intelligent Connected Vehicles: Road Safety Issue
Wei Ji, Shengnan Yu, Zefang Shen, et al.
Sustainability (2023) Vol. 15, Iss. 15, pp. 12003-12003
Open Access | Times Cited: 11

Federated learning based IDS approach for the IoV
Amal Hbaieb, Samiha Ayed, Lamia Chaari Fourati
Proceedings of the 17th International Conference on Availability, Reliability and Security (2022), pp. 1-6
Closed Access | Times Cited: 15

An Enhanced Elliptic Curve Cryptography Scheme for Secure Data Transmission to Evade Entailment of Fake Vehicles in VANET
Mayur Jagdish Patil, Krishnakant P. Adhiya
Cybernetics & Systems (2023) Vol. 55, Iss. 8, pp. 2405-2439
Closed Access | Times Cited: 8

Page 1 - Next Page

Scroll to top