
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Towards building data analytics benchmarks for IoT intrusion detection
Rasheed Ahmad, Izzat Alsmadi, Wasim A. Al-Hamdani, et al.
Cluster Computing (2021) Vol. 25, Iss. 3, pp. 2125-2141
Closed Access | Times Cited: 11
Rasheed Ahmad, Izzat Alsmadi, Wasim A. Al-Hamdani, et al.
Cluster Computing (2021) Vol. 25, Iss. 3, pp. 2125-2141
Closed Access | Times Cited: 11
Showing 11 citing articles:
Intrusion detection in cloud computing based on time series anomalies utilizing machine learning
Abdel-Rahman Al-Ghuwairi, Yousef Sharrab, Dimah Al-Fraihat, et al.
Journal of Cloud Computing Advances Systems and Applications (2023) Vol. 12, Iss. 1
Open Access | Times Cited: 37
Abdel-Rahman Al-Ghuwairi, Yousef Sharrab, Dimah Al-Fraihat, et al.
Journal of Cloud Computing Advances Systems and Applications (2023) Vol. 12, Iss. 1
Open Access | Times Cited: 37
Signature-Based Intrusion Detection System in Wireless 6G IoT Networks
Mansoor Farooq, Mubashir Hassan Khan
Journal on internet of things (2022) Vol. 4, Iss. 3, pp. 155-168
Open Access | Times Cited: 9
Mansoor Farooq, Mubashir Hassan Khan
Journal on internet of things (2022) Vol. 4, Iss. 3, pp. 155-168
Open Access | Times Cited: 9
Heterogeneous IoT Intrusion Detection Based on Fusion Word Embedding Deep Transfer Learning
Di Chen, Fengbin Zhang, Xinpeng Zhang
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 8, pp. 9183-9193
Closed Access | Times Cited: 4
Di Chen, Fengbin Zhang, Xinpeng Zhang
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 8, pp. 9183-9193
Closed Access | Times Cited: 4
A method of classifying IoT devices based on attack sensitivity
Huifen Wang, Dong Guo, Jinrui Wei, et al.
Journal of Information Security and Applications (2024) Vol. 82, pp. 103751-103751
Closed Access
Huifen Wang, Dong Guo, Jinrui Wei, et al.
Journal of Information Security and Applications (2024) Vol. 82, pp. 103751-103751
Closed Access
Crime Analysis Mapping with Intrusion Detection System
T. Tamilarasi, Sangeetha Varadhan
International Journal of Research Publication and Reviews (2024) Vol. 5, Iss. 5, pp. 6411-6416
Open Access
T. Tamilarasi, Sangeetha Varadhan
International Journal of Research Publication and Reviews (2024) Vol. 5, Iss. 5, pp. 6411-6416
Open Access
CloudFusion: Multi-Source Intrusion Detection in Cloud Environments
Yang Xu, Kun Zhang, Xia Jun, et al.
(2024), pp. 2656-2661
Closed Access
Yang Xu, Kun Zhang, Xia Jun, et al.
(2024), pp. 2656-2661
Closed Access
Integration of metaverse and AoT into the healthcare system
R. Sujatha, M. Sarlinraj, S. Mohanraj, et al.
Elsevier eBooks (2024), pp. 15-39
Closed Access
R. Sujatha, M. Sarlinraj, S. Mohanraj, et al.
Elsevier eBooks (2024), pp. 15-39
Closed Access
Metaheuristics with Deep Convolutional Neural Network for Class Imbalance Handling with Anomaly Detection in Industrial IoT Environment
Nenavath Chander, M. Upendra Kumar
Research Square (Research Square) (2022)
Closed Access | Times Cited: 2
Nenavath Chander, M. Upendra Kumar
Research Square (Research Square) (2022)
Closed Access | Times Cited: 2
AI/ML driven intrusion detection framework for IoT-enabled cold storage monitoring system
Mahendra Prasad, Pankaj Pal, Sachin Tripathi, et al.
Research Square (Research Square) (2022)
Open Access | Times Cited: 2
Mahendra Prasad, Pankaj Pal, Sachin Tripathi, et al.
Research Square (Research Square) (2022)
Open Access | Times Cited: 2
An Intrusion Detection System using Deep Cellular Learning Automata and Semantic Hierarchy for Enhancing RPL Protocol Security
Mohammad Shirafkan, Ali Shahidinejad, Mostafa GhobaeiâArani
Cluster Computing (2022) Vol. 26, Iss. 4, pp. 2443-2461
Closed Access | Times Cited: 2
Mohammad Shirafkan, Ali Shahidinejad, Mostafa GhobaeiâArani
Cluster Computing (2022) Vol. 26, Iss. 4, pp. 2443-2461
Closed Access | Times Cited: 2
Models versus Datasets: Reducing Bias through Building a Comprehensive IDS Benchmark
Rasheed Ahmad, Izzat Alsmadi, Wasim A. Al-Hamdani, et al.
Future Internet (2021) Vol. 13, Iss. 12, pp. 318-318
Open Access | Times Cited: 2
Rasheed Ahmad, Izzat Alsmadi, Wasim A. Al-Hamdani, et al.
Future Internet (2021) Vol. 13, Iss. 12, pp. 318-318
Open Access | Times Cited: 2