OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Deep-Learning Based Detection for Cyber-Attacks in IoT Networks: A Distributed Attack Detection Framework
Olivia Jullian, Beatriz Otero, Eva Rodríguez, et al.
Journal of Network and Systems Management (2023) Vol. 31, Iss. 2
Open Access | Times Cited: 33

Showing 1-25 of 33 citing articles:

Enhancing IoT network security through deep learning-powered Intrusion Detection System
Shahid Allah Bakhsh, Muhammad Almas Khan, Fawad Ahmed, et al.
Internet of Things (2023) Vol. 24, pp. 100936-100936
Open Access | Times Cited: 60

Advancing cybersecurity: a comprehensive review of AI-driven detection techniques
A Salem, Safaa M. Azzam, O. E. Emam, et al.
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 23

Multilevel Deep Neural Network Approach for Enhanced Distributed Denial-of-Service Attack Detection and Classification in Software-Defined Internet of Things Networks
Yawar Abbas Abid, Jinsong Wu, Guangquan Xu, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 14, pp. 24715-24725
Closed Access | Times Cited: 9

Advancements in training and deployment strategies for AI-based intrusion detection systems in IoT: a systematic literature review
S Kumar Reddy Mallidi, Rajeswara Rao Ramisetty
Discover Internet of Things (2025) Vol. 5, Iss. 1
Open Access | Times Cited: 1

Attack-data independent defence mechanism against adversarial attacks on ECG signal
Saifur Rahman, Shantanu Pal, Ahsan Habib, et al.
Computer Networks (2025), pp. 111027-111027
Closed Access

A Novel Time‐to‐Response Based Attack Mitigation Technique for Internet of Things‐Integrated Wireless Sensor Networks
M. Jagadeeswari, Babji Prasad Chapa, Arun Sekar Rajasekaran
International Journal of Communication Systems (2025) Vol. 38, Iss. 7
Closed Access

A Framework for Detecting Multiple Cyberattacks in IoT Environments
Yonas Mekonnen, Mesfin Kifle
Journal of Ubiquitous Computing and Communication Technologies (2025) Vol. 7, Iss. 1, pp. 36-60
Open Access

A New Model to Evaluate Signature and Anomaly Based Intrusion Detection in Medical IoT System Using Ensemble Approach
A. Sheik Abdullah, H. Sunil, Mohamed Saleem Haja Nazmudeen
SN Computer Science (2025) Vol. 6, Iss. 4
Closed Access

Maximizing healthcare security outcomes through AI/ML multi-label classification approach on IoHT devices
Emmanuel Song Shombot, Gilles Dusserre, Robert Bešťák, et al.
Health and Technology (2025)
Closed Access

DDos prevention in IoT networks by analyzing source-side inter-bot traffic using deep learning techniques
Saba Malekzadeh, Saleh Yousefi, Mir Saman Tajbakhsh
The Journal of Supercomputing (2025) Vol. 81, Iss. 5
Closed Access

Hierarchical multistep approach for intrusion detection and identification in IoT and Fog computing-based environments
Cristiano Antonio de Souza, Carlos Becker Westphall, Jean Douglas Gomes Valencio, et al.
Ad Hoc Networks (2024) Vol. 161, pp. 103541-103541
Closed Access | Times Cited: 3

Energy-based approach for attack detection in IoT devices: A survey
Valentino Merlino, Dario Allegra
Internet of Things (2024) Vol. 27, pp. 101306-101306
Open Access | Times Cited: 3

Modified Equilibrium Optimization Algorithm With Deep Learning-Based DDoS Attack Classification in 5G Networks
Mohammed Aljebreen, Fatma S. Alrayes, Mohammed Maray, et al.
IEEE Access (2023) Vol. 11, pp. 108561-108570
Closed Access | Times Cited: 8

Online Banking User Authentication Methods: A Systematic Literature Review
Nader Abdel Karim, Osama A. Khashan, Hasan Kanaker, et al.
IEEE Access (2023) Vol. 12, pp. 741-757
Open Access | Times Cited: 7

CL2ES-KDBC: A Novel Covariance Embedded Selection Based on Kernel Distributed Bayes Classifier for Detection of Cyber-Attacks in IoT Systems
Talal Albalawi, P. Ganeshkumar
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 3, pp. 3511-3528
Open Access | Times Cited: 1

Exploring Lightweight Deep Learning Techniques for Intrusion Detection Systems in IoT Networks: A Survey
Hind Ali abdul Hassan
Deleted Journal (2024) Vol. 20, Iss. 4s, pp. 1944-1958
Open Access | Times Cited: 1

VINCENT: Cyber-threat detection through vision transformers and knowledge distillation
Luca Rose, Giuseppina Andresini, Annalisa Appice, et al.
Computers & Security (2024) Vol. 144, pp. 103926-103926
Open Access | Times Cited: 1

Exploring Deception Techniques in Safeguarding IoT Networks from Intruders
R. K. Chaturvedi, Neha Tyagi, Jalaj Pateria, et al.
(2024), pp. 348-353
Closed Access | Times Cited: 1

A Survey on the Optimization of Security Components Placement in Internet of Things
Sana Said, Jalel Eddine Hajlaoui, Mohamed Nazih Omri
Journal of Network and Systems Management (2024) Vol. 32, Iss. 4
Closed Access | Times Cited: 1

A Comprehensive Security Framework for Asymmetrical IoT Network Environments to Monitor and Classify Cyberattack via Machine Learning
Ali Alqahtani, Abdulaziz A. Alsulami, Nayef Alqahtani, et al.
Symmetry (2024) Vol. 16, Iss. 9, pp. 1121-1121
Open Access | Times Cited: 1

A comprehensive survey on deep learning‐based intrusion detection systems in Internet of Things (IoT)
Qasem Abu Al‐Haija, Ayat Droos
Expert Systems (2024)
Closed Access | Times Cited: 1

Towards a Deep Learning Approach for IoT Attack Detection Based on a New Generative Adversarial Network Architecture and Gated Recurrent Unit
Mohammed Chemmakha, Omar Habibi, Mohamed Lazaar
Journal of Network and Systems Management (2024) Vol. 32, Iss. 4
Closed Access | Times Cited: 1

Enhancing IoT Botnet Detection through Machine Learning-based Feature Selection and Ensemble Models
Ravi Sharma, Saika Mohi ud din, Nonita Sharma, et al.
ICST Transactions on Scalable Information Systems (2023)
Open Access | Times Cited: 2

An Efficient Deep Learningbased Intrusion Detection System for Internet of Things Networks with Hybrid Feature Reduction and Data Balancing Techniques
Hamdullah Karamollaoğlu, İbrahim Alper Doğru, İbrahim Yücedağ
Information Technology And Control (2024) Vol. 53, Iss. 1, pp. 243-261
Open Access

Page 1 - Next Page

Scroll to top