OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Fusion-based anomaly detection system using modified isolation forest for internet of things
Orieb AbuAlghanam, Hadeel Alazzam, Esraa Alhenawi, et al.
Journal of Ambient Intelligence and Humanized Computing (2022) Vol. 14, Iss. 1, pp. 131-145
Closed Access | Times Cited: 26

Showing 1-25 of 26 citing articles:

Internet of Things (IoT) security dataset evolution: Challenges and future directions
Barjinder Kaur, Sajjad Dadkhah, Farzaneh Shoeleh, et al.
Internet of Things (2023) Vol. 22, pp. 100780-100780
Closed Access | Times Cited: 95

A Comprehensive Survey for IoT Security Datasets Taxonomy, Classification and Machine Learning Mechanisms
Christin Alex, Giselle Creado, Wesam Almobaideen, et al.
Computers & Security (2023) Vol. 132, pp. 103283-103283
Closed Access | Times Cited: 25

A review of Machine Learning (ML)-based IoT security in healthcare: A dataset perspective
Euclides Carlos Pinto Neto, Sajjad Dadkhah, Somayeh Sadeghi, et al.
Computer Communications (2023) Vol. 213, pp. 61-77
Closed Access | Times Cited: 18

Machine Learning-Based Anomaly Prediction for Proactive Monitoring in Data Centers: A Case Study on INFN-CNAF
Andrea Asperti, Gabriele Raciti, Elisabetta Ronchieri, et al.
Applied Sciences (2025) Vol. 15, Iss. 2, pp. 655-655
Open Access

TLBS-IDS: A New Hybrid Network Intrusion Detection System for Imbalanced Dataset in a Higher Education Setting
Hanane Chliah, Maryem Ait El Hadj, Amal Battou, et al.
SN Computer Science (2025) Vol. 6, Iss. 2
Closed Access

One-class IoT anomaly detection system using an improved interpolated deep SVDD autoencoder with adversarial regularizer
Abdulkarim Katbi, Riadh Ksantini
Digital Signal Processing (2025), pp. 105153-105153
Closed Access

A Comprehensive Survey of Machine Learning Methods for Surveillance Videos Anomaly Detection
Nomica Choudhry, Jemal Abawajy, Shamsul Huda, et al.
IEEE Access (2023) Vol. 11, pp. 114680-114713
Open Access | Times Cited: 13

Intrusion Detection System Using Stacked Ensemble Learning with Light Gradient Boosting Machine and Decision Tree
Anil Kumar Dasari, Saroj Kr. Biswas, Barnana Baruah, et al.
Lecture notes in networks and systems (2025), pp. 291-303
Closed Access

A Novel Hybrid Method Using Grey Wolf Algorithm and Genetic Algorithm for IoT Botnet DDoS Attacks Detection
Mahdieh Maazalahi, Soodeh Hosseini
International Journal of Computational Intelligence Systems (2025) Vol. 18, Iss. 1
Open Access

Real-Time Detection System for Data Exfiltration over DNS Tunneling Using Machine Learning
Orieb Abualghanam, Hadeel Alazzam, Basima Elshqeirat, et al.
Electronics (2023) Vol. 12, Iss. 6, pp. 1467-1467
Open Access | Times Cited: 12

Dynamic behavioral profiling for anomaly detection in software-defined IoT networks: A machine learning approach
P. Senthilraja, Kanmani Palaniappan, Brindha Duraipandi, et al.
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 4, pp. 2450-2469
Closed Access | Times Cited: 2

Android Malware Detection System Based on Ensemble Learning
Orieb AbuAlghanam, Hadeel Alazzam, Mohammad Qatawneh, et al.
Research Square (Research Square) (2023)
Open Access | Times Cited: 5

Anomaly Detection of Consumption in Hotel Units: A Case Study Comparing Isolation Forest and Variational Autoencoder Algorithms
Tomás Mendes, Pedro J. S. Cardoso, Róisín Monteiro, et al.
Applied Sciences (2022) Vol. 13, Iss. 1, pp. 314-314
Open Access | Times Cited: 7

Adversarial Defense: A GAN-IF Based Cyber-security Model for Intrusion Detection in Software Piracy
U Kumaran, T. Radhakrishnan, Telagarapu Prabhakar, et al.
Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications (2023) Vol. 14, Iss. 4, pp. 96-114
Open Access | Times Cited: 2

Cyber-attack Detection and Isolation
Chetanpal Singh, Rahul Thakkar
International Journal of Advanced Engineering and Management Research (2024) Vol. 09, Iss. 01, pp. 109-142
Open Access

Virtual Environmental Art Scene Optimization System Based on Genetic Algorithm
Xiaozhan Ma
Lecture notes on data engineering and communications technologies (2024), pp. 313-323
Closed Access

Anomaly Detection in Streaming Data using Isolation Forest
Mohammed Shaker Kareem, Lamia AbedNoor Muhammed
(2024), pp. 223-228
Closed Access

RoCC framework for anomaly detection in IoT healthcare data
S. Subha, J.G.R. Sathiaseelan
AIP conference proceedings (2024) Vol. 3203, pp. 030042-030042
Closed Access

Deep Learning for Anomaly Detection in Time-Series Data: An Analysis of Techniques, Review of Applications, and Guidelines for Future Research
Usman Ahmad Usmani, Izzatdin Abdul Aziz, Jafreezal Jaafar, et al.
IEEE Access (2024) Vol. 12, pp. 174564-174590
Open Access

A deep neural network-based multi-layer classifier ensembles for intrusion detection in fog-based Internet of Things environments
Hossein khosravifar, Mohammad Ali Jabraeil Jamali, Kambiz Majidzadeh, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 140, pp. 109727-109727
Closed Access

Anomaly Detection in IoT Network Traffic Using Bidirectional 3D Quasi‐Recurrent Neural Network Optimize With Coati Optimization Algorithm
M. Deivakani
Transactions on Emerging Telecommunications Technologies (2024) Vol. 36, Iss. 1
Closed Access

Anomaly detection in IOT edge computing using deep learning and instance-level horizontal reduction
Negar Abbasi, Mohammadreza Soltanaghaei, Farsad Zamani Boroujeni
The Journal of Supercomputing (2023) Vol. 80, Iss. 7, pp. 8988-9018
Closed Access | Times Cited: 1

TTANAD: Test-Time Augmentation for Network Anomaly Detection
Seffi Cohen, Niv Goldshlager, Bracha Shapira, et al.
Entropy (2023) Vol. 25, Iss. 5, pp. 820-820
Open Access

Page 1 - Next Page

Scroll to top