OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Extreme learning machine and bayesian optimization-driven intelligent framework for IoMT cyber-attack detection
Janmenjoy Nayak, Saroj K. Meher, Alireza Souri, et al.
The Journal of Supercomputing (2022) Vol. 78, Iss. 13, pp. 14866-14891
Open Access | Times Cited: 56

Showing 1-25 of 56 citing articles:

A Novel Deep Learning-Based Intrusion Detection System for IoT Networks
Albara Awajan
Computers (2023) Vol. 12, Iss. 2, pp. 34-34
Open Access | Times Cited: 118

A comprehensive and systematic literature review on intrusion detection systems in the internet of medical things: current status, challenges, and opportunities
Arezou Naghib, Farhad Soleimanian Gharehchopogh, Azadeh Zamanifar
Artificial Intelligence Review (2025) Vol. 58, Iss. 4
Open Access | Times Cited: 1

A comprehensive survey on DDoS defense systems: New trends and challenges
Qing Li, He Huang, Ruoyu Li, et al.
Computer Networks (2023) Vol. 233, pp. 109895-109895
Closed Access | Times Cited: 21

A blockchain-enabled internet of medical things system for breast cancer detection in healthcare
Sushovan Chaudhury, Kartik Sau
Healthcare Analytics (2023) Vol. 4, pp. 100221-100221
Open Access | Times Cited: 19

A Novel Collaborative SRU Network With Dynamic Behaviour Aggregation, Reduced Communication Overhead and Explainable Features
Izhar Ahmed Khan, Imran Razzak, Dechang Pi, et al.
IEEE Journal of Biomedical and Health Informatics (2024) Vol. 28, Iss. 6, pp. 3228-3235
Closed Access | Times Cited: 6

Attack Detection for Medical Cyber-Physical Systems–A Systematic Literature Review
Simon Weber, Stefan Stein, Michael Pilgermann, et al.
IEEE Access (2023) Vol. 11, pp. 41796-41815
Open Access | Times Cited: 15

DDoSMiner: An Automated Framework for DDoS Attack Characterization and Vulnerability Mining
Xi Ling, Jiongchi Yu, Ziming Zhao, et al.
Lecture notes in computer science (2024), pp. 283-309
Closed Access | Times Cited: 4

Network security framework for Internet of medical things applications: A survey
Hiba A. Tarish, Rosilah Hassan, Khairul Akram Zainol Ariffin, et al.
Journal of Intelligent Systems (2024) Vol. 33, Iss. 1
Open Access | Times Cited: 4

A Systematic Review Paper on Attack Detection Systems in Internet of Things Environment
Umang Kant, Vinod Kumar
Lecture notes in networks and systems (2025), pp. 427-443
Closed Access

A heuristic assisted cyber attack detection system using multi-scale and attention-based adaptive hybrid network
R. Lakshman Naik, Sourabh Jain, Manjula Bairam
Journal of Information Security and Applications (2025) Vol. 89, pp. 103970-103970
Closed Access

A secure and efficient framework for internet of medical things through blockchain driven customized federated learning
Abdul Mazid, Sheeraz Kirmani, Manaullah Abid, et al.
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access

Intelligent Ensemble Learning Approach for Intrusion Detection System in IoMT Environment
Pooja Puspita Priyadarshani, Pandit Byomakesha Dash
Lecture notes in networks and systems (2025), pp. 453-465
Closed Access

Dimensions of artificial intelligence techniques, blockchain, and cyber security in the Internet of medical things: Opportunities, challenges, and future directions
Aya Hamid Ameen, Mazin Abed Mohammed, Ahmed N. Rashid
Journal of Intelligent Systems (2023) Vol. 32, Iss. 1
Open Access | Times Cited: 12

Harris-Hawk-Optimization-Based Deep Recurrent Neural Network for Securing the Internet of Medical Things
Sidra Abbas, Gabriel Avelino Sampedro, Mideth Abisado, et al.
Electronics (2023) Vol. 12, Iss. 12, pp. 2612-2612
Open Access | Times Cited: 12

Hybrid VGG19 and 2D-CNN for intrusion detection in the FOG-cloud environment
Adel Binbusayyis
Expert Systems with Applications (2023) Vol. 238, pp. 121758-121758
Closed Access | Times Cited: 12

Framework for a Secure and Sustainable Internet of Medical Things, Requirements, Design Challenges, and Future Trends
William Villegas-Ch, Joselin García-Ortiz, Isabel Urbina-Camacho
Applied Sciences (2023) Vol. 13, Iss. 11, pp. 6634-6634
Open Access | Times Cited: 11

A Hybrid Genetic Algorithm-Based Random Forest Model for Intrusion Detection Approach in Internet of Medical Things
Monire Norouzi, Zeynep Aydın, Özgür Can Turna, et al.
Applied Sciences (2023) Vol. 13, Iss. 20, pp. 11145-11145
Open Access | Times Cited: 10

Toward high-performance energy and power battery cells with machine learning-based optimization of electrode manufacturing
Marc Duquesnoy, Chaoyue Liu, Vishank Kumar, et al.
Journal of Power Sources (2023) Vol. 590, pp. 233674-233674
Open Access | Times Cited: 9

Navigating the Cyber Threat Landscape: An In-Depth Analysis of Attack Detection within IoT Ecosystems
Samar AboulEla, Nourhan M. Ibrahim, Sarama Shehmir, et al.
AI (2024) Vol. 5, Iss. 2, pp. 704-732
Open Access | Times Cited: 3

Deep learning-empowered intrusion detection framework for the Internet of Medical Things environment
Prashant Giridhar Shambharkar, Nikhil Sharma
Knowledge and Information Systems (2024) Vol. 66, Iss. 10, pp. 6001-6050
Closed Access | Times Cited: 3

Feature Selection for Detecting ICMPv6-Based DDoS Attacks Using Binary Flower Pollination Algorithm
Adnan Hasan Bdair AIghuraibawi, Selvakumar Manickam, Rosni Abdullah, et al.
Computer Systems Science and Engineering (2023) Vol. 47, Iss. 1, pp. 553-574
Open Access | Times Cited: 8

Cyberattacks Detection in IoMT using Machine Learning Techniques
Haseeb Tauqeer, Muhammad Munwar Iqbal, Aatka Ali, et al.
Journal of Computing & Biomedical Informatics (2022) Vol. 4, Iss. 01, pp. 13-20
Open Access | Times Cited: 13

A novel method to detect cyber-attacks in IoT/IIoT devices on the modbus protocol using deep learning
Thierno Gueye, Yanen Wang, Mudassar Rehman, et al.
Cluster Computing (2023) Vol. 26, Iss. 5, pp. 2947-2973
Closed Access | Times Cited: 7

A comprehensive survey on low-rate and high-rate DDoS defense approaches in SDN: taxonomy, research challenges, and opportunities
Suruchi Karnani, Neha Agrawal, Rohit Kumar
Multimedia Tools and Applications (2023) Vol. 83, Iss. 12, pp. 35253-35306
Closed Access | Times Cited: 7

Page 1 - Next Page

Scroll to top