
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A novel method to detect cyber-attacks in IoT/IIoT devices on the modbus protocol using deep learning
Thierno Gueye, Yanen Wang, Mudassar Rehman, et al.
Cluster Computing (2023) Vol. 26, Iss. 5, pp. 2947-2973
Closed Access | Times Cited: 7
Thierno Gueye, Yanen Wang, Mudassar Rehman, et al.
Cluster Computing (2023) Vol. 26, Iss. 5, pp. 2947-2973
Closed Access | Times Cited: 7
Showing 7 citing articles:
Enhancing cybersecurity in Edge IIoT networks: An asynchronous federated learning approach with a deep hybrid detection model
Syed Muhammad Salman Bukhari, Muhammad Hamza Zafar, Mohamad Abou Houran, et al.
Internet of Things (2024) Vol. 27, pp. 101252-101252
Open Access | Times Cited: 5
Syed Muhammad Salman Bukhari, Muhammad Hamza Zafar, Mohamad Abou Houran, et al.
Internet of Things (2024) Vol. 27, pp. 101252-101252
Open Access | Times Cited: 5
Bridging the Cybersecurity Gap: A Comprehensive Analysis of Threats to Power Systems, Water Storage, and Gas Network Industrial Control and Automation Systems
Thierno Gueye, Asif Iqbal, Yanen Wang, et al.
Electronics (2024) Vol. 13, Iss. 5, pp. 837-837
Open Access | Times Cited: 4
Thierno Gueye, Asif Iqbal, Yanen Wang, et al.
Electronics (2024) Vol. 13, Iss. 5, pp. 837-837
Open Access | Times Cited: 4
WFE-Tab: Overcoming limitations of TabPFN in IIoT-MEC environments with a weighted fusion ensemble-TabPFN model for improved IDS performance
Sergio Ruiz-Villafranca, José Roldán-Gómez, Javier Carrillo-Mondéjar, et al.
Future Generation Computer Systems (2025), pp. 107707-107707
Closed Access
Sergio Ruiz-Villafranca, José Roldán-Gómez, Javier Carrillo-Mondéjar, et al.
Future Generation Computer Systems (2025), pp. 107707-107707
Closed Access
Timely detection of DDoS attacks in IoT with dimensionality reduction
Pooja Kumari, Ankit Kumar Jain
Cluster Computing (2024) Vol. 27, Iss. 6, pp. 7869-7887
Closed Access | Times Cited: 3
Pooja Kumari, Ankit Kumar Jain
Cluster Computing (2024) Vol. 27, Iss. 6, pp. 7869-7887
Closed Access | Times Cited: 3
A novel approach detection for IIoT attacks via artificial intelligence
Gökçe KARACAYILMAZ, Harun Artuner
Cluster Computing (2024) Vol. 27, Iss. 8, pp. 10467-10485
Open Access | Times Cited: 2
Gökçe KARACAYILMAZ, Harun Artuner
Cluster Computing (2024) Vol. 27, Iss. 8, pp. 10467-10485
Open Access | Times Cited: 2
Neuro-Robotic Synergy: Crafting the Secure Future of Industries in the Post Pandemic Era
Thierno Gueye, Asif Iqbal, Yanen Wang, et al.
Electronics (2023) Vol. 12, Iss. 19, pp. 4137-4137
Open Access | Times Cited: 2
Thierno Gueye, Asif Iqbal, Yanen Wang, et al.
Electronics (2023) Vol. 12, Iss. 19, pp. 4137-4137
Open Access | Times Cited: 2
An Entropy-based Field Segmentation Method for Unknown Protocols in Industrial IoT
Zheyi Sha, Chunfeng Liu, Xiaobo Zhou, et al.
(2024), pp. 3257-3262
Closed Access
Zheyi Sha, Chunfeng Liu, Xiaobo Zhou, et al.
(2024), pp. 3257-3262
Closed Access