
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Toward an intrusion detection model for IoT-based smart environments
Chaimae Hazman, Azidine Guezzaz, Said Benkirane, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 22, pp. 62159-62180
Closed Access | Times Cited: 20
Chaimae Hazman, Azidine Guezzaz, Said Benkirane, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 22, pp. 62159-62180
Closed Access | Times Cited: 20
Showing 20 citing articles:
Intrusion detection based on ensemble learning for big data classification
Farah Jemili, Rahma Meddeb, Ouajdi Korbaa
Cluster Computing (2023) Vol. 27, Iss. 3, pp. 3771-3798
Closed Access | Times Cited: 13
Farah Jemili, Rahma Meddeb, Ouajdi Korbaa
Cluster Computing (2023) Vol. 27, Iss. 3, pp. 3771-3798
Closed Access | Times Cited: 13
Privacy-preserving approach for IoT networks using statistical learning with optimization algorithm on high-dimensional big data environment
Fatma S. Alrayes, Mohammed Maray, Asma Alshuhail, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Fatma S. Alrayes, Mohammed Maray, Asma Alshuhail, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Intrusion Detection Framework for Internet of Things with Rule Induction for Model Explanation
Kayode S. Adewole, Andreas Jacobsson, Paul Davidsson
Sensors (2025) Vol. 25, Iss. 6, pp. 1845-1845
Open Access
Kayode S. Adewole, Andreas Jacobsson, Paul Davidsson
Sensors (2025) Vol. 25, Iss. 6, pp. 1845-1845
Open Access
AI and Impact Assessment of Public Policy
Mohamed Abdedaime, Chaimaa Hazman, Ahlam Qafas, et al.
Advances in computational intelligence and robotics book series (2025), pp. 275-286
Closed Access
Mohamed Abdedaime, Chaimaa Hazman, Ahlam Qafas, et al.
Advances in computational intelligence and robotics book series (2025), pp. 275-286
Closed Access
Improved smart city security using a deep maxout network-based intrusion detection system with walrus optimization
Wahid Rajeh, Majed Aborokbah, S. Manimurugan, et al.
PeerJ Computer Science (2025) Vol. 11, pp. e2743-e2743
Open Access
Wahid Rajeh, Majed Aborokbah, S. Manimurugan, et al.
PeerJ Computer Science (2025) Vol. 11, pp. e2743-e2743
Open Access
A Survey of Machine and Deep Learning Applications in the Assessment of Water Quality
Mourade Azrour, Souhayla Dargaoui, Jamal Mabrouki, et al.
World sustainability series (2024), pp. 471-483
Closed Access | Times Cited: 3
Mourade Azrour, Souhayla Dargaoui, Jamal Mabrouki, et al.
World sustainability series (2024), pp. 471-483
Closed Access | Times Cited: 3
Using the ToN-IoT dataset to develop a new intrusion detection system for industrial IoT devices
Zhong Cao, Zhicai Zhao, Wenli Shang, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 3
Zhong Cao, Zhicai Zhao, Wenli Shang, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 3
A Whale Optimization Algorithm Feature Selection Model for IoT Detecting Intrusion in Environments
Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, et al.
Lecture notes in networks and systems (2024), pp. 413-419
Closed Access | Times Cited: 1
Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, et al.
Lecture notes in networks and systems (2024), pp. 413-419
Closed Access | Times Cited: 1
A Collaborative Anomaly Detection Model Using En-Semble Learning and Blockchain
Chaimae Hazman, Azidine Guezzaz, Said Benkirane, et al.
Lecture notes in networks and systems (2024), pp. 254-260
Closed Access | Times Cited: 1
Chaimae Hazman, Azidine Guezzaz, Said Benkirane, et al.
Lecture notes in networks and systems (2024), pp. 254-260
Closed Access | Times Cited: 1
Effect of IoT Integration in Agricultural Greenhouses
Najlaa Ben-Lhachemi, Mohammed Benchrifa, Souad Nasrdine, et al.
World sustainability series (2024), pp. 435-445
Closed Access | Times Cited: 1
Najlaa Ben-Lhachemi, Mohammed Benchrifa, Souad Nasrdine, et al.
World sustainability series (2024), pp. 435-445
Closed Access | Times Cited: 1
Energy, Food, and Water Nexus, Green Options
Tawaf Ali Shah, Zhihe Li, Zhiyu Li, et al.
World sustainability series (2024), pp. 379-394
Closed Access | Times Cited: 1
Tawaf Ali Shah, Zhihe Li, Zhiyu Li, et al.
World sustainability series (2024), pp. 379-394
Closed Access | Times Cited: 1
Use of Biological Parameters of Mytilus Galloprovincialis and Modelling Investigation Tools for Installing Potential Future Zones of Mussel Farming After Improvement of Anza-Taghazout Seawater Quality
Youssef El Mourabit, Aicha Ait Alla, Mustapha Agnaou, et al.
World sustainability series (2024), pp. 13-33
Closed Access | Times Cited: 1
Youssef El Mourabit, Aicha Ait Alla, Mustapha Agnaou, et al.
World sustainability series (2024), pp. 13-33
Closed Access | Times Cited: 1
A smart model integrating LSTM and XGBoost for improving IoT-enabled smart cities security
Chaimae Hazman, Azidine Guezzaz, Said Benkirane, et al.
Cluster Computing (2024) Vol. 28, Iss. 1
Closed Access | Times Cited: 1
Chaimae Hazman, Azidine Guezzaz, Said Benkirane, et al.
Cluster Computing (2024) Vol. 28, Iss. 1
Closed Access | Times Cited: 1
Optimized deep autoencoder and BiLSTM for intrusion detection in IoTs-Fog computing
Abdullah Alqahtani
Multimedia Tools and Applications (2024)
Closed Access
Abdullah Alqahtani
Multimedia Tools and Applications (2024)
Closed Access
Dynamically Stabilized Recurrent Neural Network Optimized with Intensified Sand Cat Swarm Optimization for Intrusion Detection in Wireless Sensor Network
A. Punitha, P. Ramani, P. Ezhilarasi, et al.
Computers & Security (2024) Vol. 148, pp. 104094-104094
Closed Access
A. Punitha, P. Ramani, P. Ezhilarasi, et al.
Computers & Security (2024) Vol. 148, pp. 104094-104094
Closed Access
Edge Implicit Weighting with Graph Transformers for Robust Intrusion Detection in Internet of Things Network
C. Karpagavalli, M. Kaliappan
Computers & Security (2024), pp. 104299-104299
Closed Access
C. Karpagavalli, M. Kaliappan
Computers & Security (2024), pp. 104299-104299
Closed Access
A Novel Autoencoder based Federated Deep Transfer Learning and Weighted k-Subspace Network clustering for Intelligent Intrusion Detection for the Internet of Things
V. Lavanya, R. Anushiya
Salud Ciencia y Tecnología - Serie de Conferencias (2024) Vol. 3, pp. 648-648
Open Access
V. Lavanya, R. Anushiya
Salud Ciencia y Tecnología - Serie de Conferencias (2024) Vol. 3, pp. 648-648
Open Access
Blockchain Technology and Customs Clearance Procedures: Facilitating and Smoothing Products Importation in Morocco’s Customs and Excises Administration
Mohamed Elkoutour, Hajar Raji, Mohcine Bakhat
World sustainability series (2024), pp. 53-69
Closed Access
Mohamed Elkoutour, Hajar Raji, Mohcine Bakhat
World sustainability series (2024), pp. 53-69
Closed Access
Intelligent Real-Time Monitoring System for Wastewater Management Using Artificial Neural Network
Fouad Essahlaoui, Nourddine Elhajrat, Mohammed Halimi, et al.
World sustainability series (2024), pp. 15-24
Closed Access
Fouad Essahlaoui, Nourddine Elhajrat, Mohammed Halimi, et al.
World sustainability series (2024), pp. 15-24
Closed Access
A Machine-Learning Based IoT Smart Home System to Detect and Reduce Urban Insecurity in Uganda: A Case of Kampala Metropolitan Area
Edward Miiro, Ismael Kato
(2024), pp. 1-6
Closed Access
Edward Miiro, Ismael Kato
(2024), pp. 1-6
Closed Access
An efficient intrusion detection system for IoT security using CNN decision forest
Kamal Bella, Azidine Guezzaz, Said Benkirane, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2290-e2290
Open Access
Kamal Bella, Azidine Guezzaz, Said Benkirane, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2290-e2290
Open Access