
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
EIDM: deep learning model for IoT intrusion detection systems
Omar Elnakib, Eman Shaaban, Mohamed Mahmoud, et al.
The Journal of Supercomputing (2023) Vol. 79, Iss. 12, pp. 13241-13261
Open Access | Times Cited: 48
Omar Elnakib, Eman Shaaban, Mohamed Mahmoud, et al.
The Journal of Supercomputing (2023) Vol. 79, Iss. 12, pp. 13241-13261
Open Access | Times Cited: 48
Showing 1-25 of 48 citing articles:
A Survey of Deep Learning Technologies for Intrusion Detection in Internet of Things
Han Liao, Mohd Zamri Murah, Mohammad Kamrul Hasan, et al.
IEEE Access (2024) Vol. 12, pp. 4745-4761
Open Access | Times Cited: 17
Han Liao, Mohd Zamri Murah, Mohammad Kamrul Hasan, et al.
IEEE Access (2024) Vol. 12, pp. 4745-4761
Open Access | Times Cited: 17
Metaheuristic-Driven Optimization for Efficient Resource Allocation in Cloud Environments
M. Revathi, K. Manju, B. Chitradevi, et al.
International Journal of Computational and Experimental Science and Engineering (2025) Vol. 11, Iss. 1
Open Access | Times Cited: 2
M. Revathi, K. Manju, B. Chitradevi, et al.
International Journal of Computational and Experimental Science and Engineering (2025) Vol. 11, Iss. 1
Open Access | Times Cited: 2
Signature-based intrusion detection using machine learning and deep learning approaches empowered with fuzzy clustering
Usama Ahmed, Mohammad Nazir, Amna Sarwar, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access | Times Cited: 2
Usama Ahmed, Mohammad Nazir, Amna Sarwar, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access | Times Cited: 2
Enhanced Intrusion Detection with LSTM-Based Model, Feature Selection, and SMOTE for Imbalanced Data
Hussein Ridha Sayegh, Dong Wang, Ali Mansour Al-madani
Applied Sciences (2024) Vol. 14, Iss. 2, pp. 479-479
Open Access | Times Cited: 14
Hussein Ridha Sayegh, Dong Wang, Ali Mansour Al-madani
Applied Sciences (2024) Vol. 14, Iss. 2, pp. 479-479
Open Access | Times Cited: 14
An Efficient Support Vector Machine Algorithm Based Network Outlier Detection System
Omar Alghushairy, Raed Alsini, Zakhriya Alhassan, et al.
IEEE Access (2024) Vol. 12, pp. 24428-24441
Open Access | Times Cited: 8
Omar Alghushairy, Raed Alsini, Zakhriya Alhassan, et al.
IEEE Access (2024) Vol. 12, pp. 24428-24441
Open Access | Times Cited: 8
Advancements in training and deployment strategies for AI-based intrusion detection systems in IoT: a systematic literature review
S Kumar Reddy Mallidi, Rajeswara Rao Ramisetty
Discover Internet of Things (2025) Vol. 5, Iss. 1
Open Access | Times Cited: 1
S Kumar Reddy Mallidi, Rajeswara Rao Ramisetty
Discover Internet of Things (2025) Vol. 5, Iss. 1
Open Access | Times Cited: 1
VBQ-Net: A Novel Vectorization-Based Boost Quantized Network Model for Maximizing the Security Level of IoT System to Prevent Intrusions
Ganeshkumar Perumal, S. Gopalakrishnan, Qaisar Abbas, et al.
Systems (2023) Vol. 11, Iss. 8, pp. 436-436
Open Access | Times Cited: 16
Ganeshkumar Perumal, S. Gopalakrishnan, Qaisar Abbas, et al.
Systems (2023) Vol. 11, Iss. 8, pp. 436-436
Open Access | Times Cited: 16
M2VT-IDS: A multi-task multi-view learning architecture for designing IoT intrusion detection system
Fengyuan Nie, Weiwei Liu, Guangjie Liu, et al.
Internet of Things (2024) Vol. 25, pp. 101102-101102
Closed Access | Times Cited: 5
Fengyuan Nie, Weiwei Liu, Guangjie Liu, et al.
Internet of Things (2024) Vol. 25, pp. 101102-101102
Closed Access | Times Cited: 5
A novel intrusion detection system for internet of things devices and data
Ajay Kaushik, H. S. Al‐Raweshidy
Wireless Networks (2023) Vol. 30, Iss. 1, pp. 285-294
Open Access | Times Cited: 14
Ajay Kaushik, H. S. Al‐Raweshidy
Wireless Networks (2023) Vol. 30, Iss. 1, pp. 285-294
Open Access | Times Cited: 14
CNN Channel Attention Intrusion Detection System Using NSL-KDD Dataset
Fatma S. Alrayes, Mohammed Zakariah, Syed Umar Amin, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 3, pp. 4319-4347
Open Access | Times Cited: 5
Fatma S. Alrayes, Mohammed Zakariah, Syed Umar Amin, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 3, pp. 4319-4347
Open Access | Times Cited: 5
Implementation of Lightweight Machine Learning-Based Intrusion Detection System on IoT Devices of Smart Homes
Abbas Javed, Amna Ehtsham, Muhammad Jawad, et al.
Future Internet (2024) Vol. 16, Iss. 6, pp. 200-200
Open Access | Times Cited: 5
Abbas Javed, Amna Ehtsham, Muhammad Jawad, et al.
Future Internet (2024) Vol. 16, Iss. 6, pp. 200-200
Open Access | Times Cited: 5
BBO-CFAT: Network Intrusion Detection Model Based on BBO Algorithm and Hierarchical Transformer
Tingyao Jiang, Xiaobo Fu, Min Wang
IEEE Access (2024) Vol. 12, pp. 54191-54201
Open Access | Times Cited: 4
Tingyao Jiang, Xiaobo Fu, Min Wang
IEEE Access (2024) Vol. 12, pp. 54191-54201
Open Access | Times Cited: 4
A Robust Framework for Detecting Brute-Force Attacks through Deep Learning Techniques
Nouf Awadh, H Nasralla Zaid, Samah H. Alajmani
International Journal of Recent Technology and Engineering (IJRTE) (2025) Vol. 13, Iss. 5, pp. 27-42
Closed Access
Nouf Awadh, H Nasralla Zaid, Samah H. Alajmani
International Journal of Recent Technology and Engineering (IJRTE) (2025) Vol. 13, Iss. 5, pp. 27-42
Closed Access
Particle swarm optimization-enhanced machine learning and deep learning techniques for Internet of Things intrusion detection
Mourad Benmalek, Abdessamed Seddiki
Data Science and Management (2025)
Open Access
Mourad Benmalek, Abdessamed Seddiki
Data Science and Management (2025)
Open Access
Hybrid-CID: Securing IoT with Mongoose Optimization
S. Merlin Sheeba, R. S. Shaji
International Journal of Computational Intelligence Systems (2025) Vol. 18, Iss. 1
Open Access
S. Merlin Sheeba, R. S. Shaji
International Journal of Computational Intelligence Systems (2025) Vol. 18, Iss. 1
Open Access
A Novel Approach to IoT Device Identification via Anti‐Interference Dynamic Integral Neural Network and Multiobjective Fitness‐Dependent Optimizer Algorithm
E. Anbalagan, M. Kanchana, G. Manikandan, et al.
International Journal of Communication Systems (2025) Vol. 38, Iss. 7
Closed Access
E. Anbalagan, M. Kanchana, G. Manikandan, et al.
International Journal of Communication Systems (2025) Vol. 38, Iss. 7
Closed Access
Deep Learning-Based Intrusion Detection for IoT Networks: A Scalable and Efficient Approach
Md. Alamgir Hossain
Research Square (Research Square) (2025)
Closed Access
Md. Alamgir Hossain
Research Square (Research Square) (2025)
Closed Access
Bridging Innovation and Security: Advancing Cyber-Threat Detection in Sustainable Smart Infrastructure
Duaa Shoukat, Adnan Akhunzada, Muhammad Taimoor Khan, et al.
(2025), pp. 109-117
Closed Access
Duaa Shoukat, Adnan Akhunzada, Muhammad Taimoor Khan, et al.
(2025), pp. 109-117
Closed Access
Optimizing Intrusion Detection for IoT : A Systematic Review of Machine Learning and Deep Learning Approaches With Feature Selection and Data Balancing
S Kumar Reddy Mallidi, Rajeswara Rao Ramisetty
Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery (2025) Vol. 15, Iss. 2
Closed Access
S Kumar Reddy Mallidi, Rajeswara Rao Ramisetty
Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery (2025) Vol. 15, Iss. 2
Closed Access
Hybrid VGG19 and 2D-CNN for intrusion detection in the FOG-cloud environment
Adel Binbusayyis
Expert Systems with Applications (2023) Vol. 238, pp. 121758-121758
Closed Access | Times Cited: 12
Adel Binbusayyis
Expert Systems with Applications (2023) Vol. 238, pp. 121758-121758
Closed Access | Times Cited: 12
An intrusion detection system using ranked feature bagging
M. Azhagiri, A. Rajesh, S. Karthik, et al.
International Journal of Information Technology (2023) Vol. 16, Iss. 2, pp. 1213-1219
Closed Access | Times Cited: 9
M. Azhagiri, A. Rajesh, S. Karthik, et al.
International Journal of Information Technology (2023) Vol. 16, Iss. 2, pp. 1213-1219
Closed Access | Times Cited: 9
5G-SIID: an intelligent hybrid DDoS intrusion detector for 5G IoT networks
Sapna Sadhwani, Aakar Mathur, Raja Muthalagu, et al.
International Journal of Machine Learning and Cybernetics (2024)
Closed Access | Times Cited: 3
Sapna Sadhwani, Aakar Mathur, Raja Muthalagu, et al.
International Journal of Machine Learning and Cybernetics (2024)
Closed Access | Times Cited: 3
A Consistent Augmented Stacking Polynomial Optimized Tool (ASPOT) for Improving Security of Cloud-IoT Systems
Divya Ramachandran, R. Chithambaramani, S. Sankar Ganesh, et al.
Journal of Advanced Research in Applied Sciences and Engineering Technology (2024) Vol. 37, Iss. 1, pp. 16-36
Open Access | Times Cited: 2
Divya Ramachandran, R. Chithambaramani, S. Sankar Ganesh, et al.
Journal of Advanced Research in Applied Sciences and Engineering Technology (2024) Vol. 37, Iss. 1, pp. 16-36
Open Access | Times Cited: 2
A Network Intrusion Detection Method Based on Bagging Ensemble
Zichen Zhang, Shanshan Kong, T. D. Xiao, et al.
Symmetry (2024) Vol. 16, Iss. 7, pp. 850-850
Open Access | Times Cited: 2
Zichen Zhang, Shanshan Kong, T. D. Xiao, et al.
Symmetry (2024) Vol. 16, Iss. 7, pp. 850-850
Open Access | Times Cited: 2
Hybrid Deep Learning framework-based intrusion detection system for the Internet of Things
G. Kirubavathi, Aparna R Nair
(2024), pp. 1-6
Closed Access | Times Cited: 2
G. Kirubavathi, Aparna R Nair
(2024), pp. 1-6
Closed Access | Times Cited: 2