
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
RETRACTED ARTICLE: Intrusion detection based on machine learning in the internet of things, attacks and counter measures
Eid Rehman, Muhammad Haseeb-ud-Din, Arif Jamal Malik, et al.
The Journal of Supercomputing (2022) Vol. 78, Iss. 6, pp. 8890-8924
Closed Access | Times Cited: 25
Eid Rehman, Muhammad Haseeb-ud-Din, Arif Jamal Malik, et al.
The Journal of Supercomputing (2022) Vol. 78, Iss. 6, pp. 8890-8924
Closed Access | Times Cited: 25
Showing 25 citing articles:
Towards the Development of a Realistic Multidimensional IoT Profiling Dataset
Sajjad Dadkhah, Hassan Mahdikhani, Priscilla Kyei Danso, et al.
(2022)
Closed Access | Times Cited: 69
Sajjad Dadkhah, Hassan Mahdikhani, Priscilla Kyei Danso, et al.
(2022)
Closed Access | Times Cited: 69
Machine Learning-Based Boosted Regression Ensemble Combined with Hyperparameter Tuning for Optimal Adaptive Learning
Joseph Isabona, Agbotiname Lucky Imoize, Yongsung Kim
Sensors (2022) Vol. 22, Iss. 10, pp. 3776-3776
Open Access | Times Cited: 67
Joseph Isabona, Agbotiname Lucky Imoize, Yongsung Kim
Sensors (2022) Vol. 22, Iss. 10, pp. 3776-3776
Open Access | Times Cited: 67
A lightweight intrusion detection method for IoT based on deep learning and dynamic quantization
Zhendong Wang, Hui Chen, Shuxin Yang, et al.
PeerJ Computer Science (2023) Vol. 9, pp. e1569-e1569
Open Access | Times Cited: 27
Zhendong Wang, Hui Chen, Shuxin Yang, et al.
PeerJ Computer Science (2023) Vol. 9, pp. e1569-e1569
Open Access | Times Cited: 27
A Real-Time Data Monitoring Framework for Predictive Maintenance Based on the Internet of Things
Mudita Uppal, Deepali Gupta, Nitin Goyal, et al.
Complexity (2023) Vol. 2023, pp. 1-14
Open Access | Times Cited: 19
Mudita Uppal, Deepali Gupta, Nitin Goyal, et al.
Complexity (2023) Vol. 2023, pp. 1-14
Open Access | Times Cited: 19
Design of an Intrusion Detection Model for IoT-Enabled Smart Home
Deepti Rani, Nasib Singh Gill, Preeti Gulia, et al.
IEEE Access (2023), pp. 1-1
Open Access | Times Cited: 18
Deepti Rani, Nasib Singh Gill, Preeti Gulia, et al.
IEEE Access (2023), pp. 1-1
Open Access | Times Cited: 18
Intrusion detection in internet of things using improved binary golden jackal optimization algorithm and LSTM
Amir Vafid Hanafi, Ali Ghaffari, Hesam Rezaei, et al.
Cluster Computing (2023) Vol. 27, Iss. 3, pp. 2673-2690
Closed Access | Times Cited: 16
Amir Vafid Hanafi, Ali Ghaffari, Hesam Rezaei, et al.
Cluster Computing (2023) Vol. 27, Iss. 3, pp. 2673-2690
Closed Access | Times Cited: 16
An innovative GPT-based open-source intelligence using historical cyber incident reports
Fahim Sufi
Natural Language Processing Journal (2024) Vol. 7, pp. 100074-100074
Open Access | Times Cited: 6
Fahim Sufi
Natural Language Processing Journal (2024) Vol. 7, pp. 100074-100074
Open Access | Times Cited: 6
A Novel Time‐to‐Response Based Attack Mitigation Technique for Internet of Things‐Integrated Wireless Sensor Networks
M. Jagadeeswari, Babji Prasad Chapa, Arun Sekar Rajasekaran
International Journal of Communication Systems (2025) Vol. 38, Iss. 7
Closed Access
M. Jagadeeswari, Babji Prasad Chapa, Arun Sekar Rajasekaran
International Journal of Communication Systems (2025) Vol. 38, Iss. 7
Closed Access
A Comprehensive Survey of Cybersecurity Threats, Attacks, and Effective Countermeasures in Industrial Internet of Things
Abdullah Alnajim, Shabana Habib, Muhammad Islam, et al.
Technologies (2023) Vol. 11, Iss. 6, pp. 161-161
Open Access | Times Cited: 15
Abdullah Alnajim, Shabana Habib, Muhammad Islam, et al.
Technologies (2023) Vol. 11, Iss. 6, pp. 161-161
Open Access | Times Cited: 15
Security behavior analysis in web of things smart environments using deep belief networks
M. Premkumar, S. R. Ashokkumar, G. Mohanbabu, et al.
International Journal of Intelligent Networks (2022) Vol. 3, pp. 181-187
Open Access | Times Cited: 21
M. Premkumar, S. R. Ashokkumar, G. Mohanbabu, et al.
International Journal of Intelligent Networks (2022) Vol. 3, pp. 181-187
Open Access | Times Cited: 21
Blockchain and Smart Contracts to Secure Property Transactions in Smart Cities
Uchani Gutierrez Omar Cliff, Guangxia Xu
Applied Sciences (2022) Vol. 13, Iss. 1, pp. 66-66
Open Access | Times Cited: 17
Uchani Gutierrez Omar Cliff, Guangxia Xu
Applied Sciences (2022) Vol. 13, Iss. 1, pp. 66-66
Open Access | Times Cited: 17
ROAST-IoT: A Novel Range-Optimized Attention Convolutional Scattered Technique for Intrusion Detection in IoT Networks
Anandaraj Mahalingam, Ganeshkumar Perumal, S. Gopalakrishnan, et al.
Sensors (2023) Vol. 23, Iss. 19, pp. 8044-8044
Open Access | Times Cited: 6
Anandaraj Mahalingam, Ganeshkumar Perumal, S. Gopalakrishnan, et al.
Sensors (2023) Vol. 23, Iss. 19, pp. 8044-8044
Open Access | Times Cited: 6
Scientific Elegance in NIDS: Unveiling Cardinality Reduction, Box-Cox Transformation, and ADASYN for Enhanced Intrusion Detection
Amerah Alabrah
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 3, pp. 3897-3912
Open Access | Times Cited: 1
Amerah Alabrah
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 3, pp. 3897-3912
Open Access | Times Cited: 1
Fog-Assisted Deep-Learning-Empowered Intrusion Detection System for RPL-Based Resource-Constrained Smart Industries
Danish Attique, Hao Wang, Ping Wang
Sensors (2022) Vol. 22, Iss. 23, pp. 9416-9416
Open Access | Times Cited: 7
Danish Attique, Hao Wang, Ping Wang
Sensors (2022) Vol. 22, Iss. 23, pp. 9416-9416
Open Access | Times Cited: 7
Optimal Wavelet Neural Network-Based Intrusion Detection in Internet of Things Environment
Heba G. Mohamed, Fadwa Alrowais, Mohammed Abdullah Al-Hagery, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 75, Iss. 2, pp. 4467-4483
Open Access | Times Cited: 2
Heba G. Mohamed, Fadwa Alrowais, Mohammed Abdullah Al-Hagery, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 75, Iss. 2, pp. 4467-4483
Open Access | Times Cited: 2
An Effective Network Intrusion Detection System Using Recursive Feature Elimination Technique
Narendra Singh Yadav, Vijay Prakash Sharma, D. Sikha Datta Reddy, et al.
(2023), pp. 99-99
Open Access | Times Cited: 2
Narendra Singh Yadav, Vijay Prakash Sharma, D. Sikha Datta Reddy, et al.
(2023), pp. 99-99
Open Access | Times Cited: 2
Intrusion Detection and Prevention Systems for Wireless IoT Networks: Machine Learning Approaches
Rajeshwarrao Arabelli, Eswararao Boddepalli, R. B. S. Yadav, et al.
(2024), pp. 452-456
Closed Access
Rajeshwarrao Arabelli, Eswararao Boddepalli, R. B. S. Yadav, et al.
(2024), pp. 452-456
Closed Access
Anomaly Based Intrusion Detection Using Large Language Models
Zineb Maasaoui, Mheni Merzouki, Abdella Battou, et al.
(2024), pp. 1-8
Closed Access
Zineb Maasaoui, Mheni Merzouki, Abdella Battou, et al.
(2024), pp. 1-8
Closed Access
Type classification and identification of IoT devices by using traffic characteristics
Ruizhong Du, Shuai Li
Wireless Networks (2024)
Closed Access
Ruizhong Du, Shuai Li
Wireless Networks (2024)
Closed Access
Spotted hyena optimizer with ensemble deep learning based intrusion detection in internet of things environment
Manohar Srinivasan, N. Senthilkumar
Journal of Intelligent & Fuzzy Systems (2024), pp. 1-11
Closed Access
Manohar Srinivasan, N. Senthilkumar
Journal of Intelligent & Fuzzy Systems (2024), pp. 1-11
Closed Access
Enhancing SIoT Security Through Advanced Machine Learning Techniques for Intrusion Detection
S. Divya, R Tanuja
Lecture notes in networks and systems (2024), pp. 105-116
Closed Access
S. Divya, R Tanuja
Lecture notes in networks and systems (2024), pp. 105-116
Closed Access
A Novel Method for Enhancing the Identification of Attacks in Wireless Sensor Networks via Improved Naive Bayes
N. Nithiyananda, M. Rajesh, Joel J. P. C. Rodrigues
Research Square (Research Square) (2024)
Open Access
N. Nithiyananda, M. Rajesh, Joel J. P. C. Rodrigues
Research Square (Research Square) (2024)
Open Access
Identification of Botnets and Nodes Attacking Smart Cities by Majority Voting Mechanism and Feature Selection
Maliheh Araghchi, Nazbanoo Farzaneh
(2023)
Closed Access
Maliheh Araghchi, Nazbanoo Farzaneh
(2023)
Closed Access
Blockchain Enabled Real Estate Property Transactions using NFT: An Approach
K Vivekrabinson, Bharath Singh Jebaraj, Rajesh Kumar S, et al.
(2023), pp. 1-6
Closed Access
K Vivekrabinson, Bharath Singh Jebaraj, Rajesh Kumar S, et al.
(2023), pp. 1-6
Closed Access
Optimization Model for Intrusion Detection System in IoT Applications
Abeer. Y.A. Salawi, Mohammed Alghamdi
International Journal of Cryptocurrency Research (2022) Vol. 2, Iss. 1, pp. 41-51
Open Access
Abeer. Y.A. Salawi, Mohammed Alghamdi
International Journal of Cryptocurrency Research (2022) Vol. 2, Iss. 1, pp. 41-51
Open Access