OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Toward an intrusion detection model for IoT-based smart environments
Chaimae Hazman, Azidine Guezzaz, Said Benkirane, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 22, pp. 62159-62180
Closed Access | Times Cited: 20

Showing 20 citing articles:

Intrusion detection based on ensemble learning for big data classification
Farah Jemili, Rahma Meddeb, Ouajdi Korbaa
Cluster Computing (2023) Vol. 27, Iss. 3, pp. 3771-3798
Closed Access | Times Cited: 13

Intrusion Detection Framework for Internet of Things with Rule Induction for Model Explanation
Kayode S. Adewole, Andreas Jacobsson, Paul Davidsson
Sensors (2025) Vol. 25, Iss. 6, pp. 1845-1845
Open Access

AI and Impact Assessment of Public Policy
Mohamed Abdedaime, Chaimaa Hazman, Ahlam Qafas, et al.
Advances in computational intelligence and robotics book series (2025), pp. 275-286
Closed Access

Improved smart city security using a deep maxout network-based intrusion detection system with walrus optimization
Wahid Rajeh, Majed Aborokbah, S. Manimurugan, et al.
PeerJ Computer Science (2025) Vol. 11, pp. e2743-e2743
Open Access

A Survey of Machine and Deep Learning Applications in the Assessment of Water Quality
Mourade Azrour, Souhayla Dargaoui, Jamal Mabrouki, et al.
World sustainability series (2024), pp. 471-483
Closed Access | Times Cited: 3

Using the ToN-IoT dataset to develop a new intrusion detection system for industrial IoT devices
Zhong Cao, Zhicai Zhao, Wenli Shang, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 3

A Whale Optimization Algorithm Feature Selection Model for IoT Detecting Intrusion in Environments
Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, et al.
Lecture notes in networks and systems (2024), pp. 413-419
Closed Access | Times Cited: 1

A Collaborative Anomaly Detection Model Using En-Semble Learning and Blockchain
Chaimae Hazman, Azidine Guezzaz, Said Benkirane, et al.
Lecture notes in networks and systems (2024), pp. 254-260
Closed Access | Times Cited: 1

Effect of IoT Integration in Agricultural Greenhouses
Najlaa Ben-Lhachemi, Mohammed Benchrifa, Souad Nasrdine, et al.
World sustainability series (2024), pp. 435-445
Closed Access | Times Cited: 1

Energy, Food, and Water Nexus, Green Options
Tawaf Ali Shah, Zhihe Li, Zhiyu Li, et al.
World sustainability series (2024), pp. 379-394
Closed Access | Times Cited: 1

Use of Biological Parameters of Mytilus Galloprovincialis and Modelling Investigation Tools for Installing Potential Future Zones of Mussel Farming After Improvement of Anza-Taghazout Seawater Quality
Youssef El Mourabit, Aicha Ait Alla, Mustapha Agnaou, et al.
World sustainability series (2024), pp. 13-33
Closed Access | Times Cited: 1

A smart model integrating LSTM and XGBoost for improving IoT-enabled smart cities security
Chaimae Hazman, Azidine Guezzaz, Said Benkirane, et al.
Cluster Computing (2024) Vol. 28, Iss. 1
Closed Access | Times Cited: 1

Optimized deep autoencoder and BiLSTM for intrusion detection in IoTs-Fog computing
Abdullah Alqahtani
Multimedia Tools and Applications (2024)
Closed Access

Dynamically Stabilized Recurrent Neural Network Optimized with Intensified Sand Cat Swarm Optimization for Intrusion Detection in Wireless Sensor Network
A. Punitha, P. Ramani, P. Ezhilarasi, et al.
Computers & Security (2024) Vol. 148, pp. 104094-104094
Closed Access

Edge Implicit Weighting with Graph Transformers for Robust Intrusion Detection in Internet of Things Network
C. Karpagavalli, M. Kaliappan
Computers & Security (2024), pp. 104299-104299
Closed Access

Blockchain Technology and Customs Clearance Procedures: Facilitating and Smoothing Products Importation in Morocco’s Customs and Excises Administration
Mohamed Elkoutour, Hajar Raji, Mohcine Bakhat
World sustainability series (2024), pp. 53-69
Closed Access

Intelligent Real-Time Monitoring System for Wastewater Management Using Artificial Neural Network
Fouad Essahlaoui, Nourddine Elhajrat, Mohammed Halimi, et al.
World sustainability series (2024), pp. 15-24
Closed Access

An efficient intrusion detection system for IoT security using CNN decision forest
Kamal Bella, Azidine Guezzaz, Said Benkirane, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2290-e2290
Open Access

Page 1

Scroll to top