
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Feature engineering based performance analysis of ML and DL algorithms for Botnet attack detection in IoMT
Sohail Saif, Nahal Yasmin, Suparna Biswas
International Journal of Systems Assurance Engineering and Management (2023) Vol. 14, Iss. S1, pp. 512-522
Closed Access | Times Cited: 17
Sohail Saif, Nahal Yasmin, Suparna Biswas
International Journal of Systems Assurance Engineering and Management (2023) Vol. 14, Iss. S1, pp. 512-522
Closed Access | Times Cited: 17
Showing 17 citing articles:
SafetyMed: A Novel IoMT Intrusion Detection System Using CNN-LSTM Hybridization
Nuruzzaman Faruqui, Mohammad Abu Yousuf, Md Whaiduzzaman, et al.
Electronics (2023) Vol. 12, Iss. 17, pp. 3541-3541
Open Access | Times Cited: 42
Nuruzzaman Faruqui, Mohammad Abu Yousuf, Md Whaiduzzaman, et al.
Electronics (2023) Vol. 12, Iss. 17, pp. 3541-3541
Open Access | Times Cited: 42
Empowering Healthcare With IoMT: Evolution, Machine Learning Integration, Security, and Interoperability Challenges
G. R. Pradyumna, Roopa B. Hegde, K. B. Bommegowda, et al.
IEEE Access (2024) Vol. 12, pp. 20603-20623
Open Access | Times Cited: 21
G. R. Pradyumna, Roopa B. Hegde, K. B. Bommegowda, et al.
IEEE Access (2024) Vol. 12, pp. 20603-20623
Open Access | Times Cited: 21
An RFE/Ridge-ML/DL based anomaly intrusion detection approach for securing IoMT system
Ghita Lazrek, Kaouthar Chetioui, Younes Balboul, et al.
Results in Engineering (2024) Vol. 23, pp. 102659-102659
Open Access | Times Cited: 8
Ghita Lazrek, Kaouthar Chetioui, Younes Balboul, et al.
Results in Engineering (2024) Vol. 23, pp. 102659-102659
Open Access | Times Cited: 8
A comprehensive and systematic literature review on intrusion detection systems in the internet of medical things: current status, challenges, and opportunities
Arezou Naghib, Farhad Soleimanian Gharehchopogh, Azadeh Zamanifar
Artificial Intelligence Review (2025) Vol. 58, Iss. 4
Open Access | Times Cited: 1
Arezou Naghib, Farhad Soleimanian Gharehchopogh, Azadeh Zamanifar
Artificial Intelligence Review (2025) Vol. 58, Iss. 4
Open Access | Times Cited: 1
Reshaping the healthcare world by AI-integrated wearable sensors following COVID-19
Bangul Khan, Rana Talha Khalid, Khair Ul Wara, et al.
Chemical Engineering Journal (2025) Vol. 505, pp. 159478-159478
Closed Access
Bangul Khan, Rana Talha Khalid, Khair Ul Wara, et al.
Chemical Engineering Journal (2025) Vol. 505, pp. 159478-159478
Closed Access
Mitigating cyberphysical risks in IoT-enabled smart transport infrastructure
Hanadi Alkhudhayr, Hanin Ardah
The Journal of Supercomputing (2025) Vol. 81, Iss. 2
Closed Access
Hanadi Alkhudhayr, Hanin Ardah
The Journal of Supercomputing (2025) Vol. 81, Iss. 2
Closed Access
Ensemble Feature Engineering and Deep Learning for Botnet Attacks Detection in the Internet of Things
Mir Aman Sheheryar, Sparsh Sharma
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 3
Closed Access
Mir Aman Sheheryar, Sparsh Sharma
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 3
Closed Access
Deep learning-empowered intrusion detection framework for the Internet of Medical Things environment
Prashant Giridhar Shambharkar, Nikhil Sharma
Knowledge and Information Systems (2024) Vol. 66, Iss. 10, pp. 6001-6050
Closed Access | Times Cited: 3
Prashant Giridhar Shambharkar, Nikhil Sharma
Knowledge and Information Systems (2024) Vol. 66, Iss. 10, pp. 6001-6050
Closed Access | Times Cited: 3
Deep learning-based network intrusion detection in smart healthcare enterprise systems
Vinayakumar Ravi
Multimedia Tools and Applications (2023)
Closed Access | Times Cited: 5
Vinayakumar Ravi
Multimedia Tools and Applications (2023)
Closed Access | Times Cited: 5
Botnet detection in the internet-of-things networks using convolutional neural network with pelican optimization algorithm
Swapna Thota, D. Menaka
Automatika (2023) Vol. 65, Iss. 1, pp. 250-260
Open Access | Times Cited: 5
Swapna Thota, D. Menaka
Automatika (2023) Vol. 65, Iss. 1, pp. 250-260
Open Access | Times Cited: 5
Ensuring patient safety in IoMT: A systematic literature review of behavior-based intrusion detection systems
Jordi Doménech, Isabel V. Martin-Faus, Saber Mhiri, et al.
Internet of Things (2024) Vol. 28, pp. 101420-101420
Open Access
Jordi Doménech, Isabel V. Martin-Faus, Saber Mhiri, et al.
Internet of Things (2024) Vol. 28, pp. 101420-101420
Open Access
Ensemble-Guard IoT: A Lightweight Ensemble Model for Real-Time Attack Detection on Imbalanced Dataset
Muhammad Usama Tanveer, Kashif Munir, Madiha Amjad, et al.
IEEE Access (2024) Vol. 12, pp. 168938-168952
Open Access
Muhammad Usama Tanveer, Kashif Munir, Madiha Amjad, et al.
IEEE Access (2024) Vol. 12, pp. 168938-168952
Open Access
Enhancing security of internet of medical things in fog-edge environment: a study on attack detection performance
Ravi Sharma, Nonita Sharma
Sadhana (2024) Vol. 49, Iss. 4
Closed Access
Ravi Sharma, Nonita Sharma
Sadhana (2024) Vol. 49, Iss. 4
Closed Access
Enhanced IoMT security framework using group teaching optimized auto-encoder for intrusion detection
Archana Manoharan, T. Manigandan
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
Archana Manoharan, T. Manigandan
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
Dual-path feature extraction based hybrid intrusion detection in IoT networks
Arun Kumar Silivery, K. Ram Mohan Rao, Ramana Solleti
Computers & Electrical Engineering (2024) Vol. 122, pp. 109949-109949
Closed Access
Arun Kumar Silivery, K. Ram Mohan Rao, Ramana Solleti
Computers & Electrical Engineering (2024) Vol. 122, pp. 109949-109949
Closed Access
A comprehensive analysis of machine learning-based intrusion detection systems: evaluating datasets and algorithms for internet of things
Sohail Saif, Amir H. Ansari, Suparna Biswas, et al.
Journal of Cyber Security Technology (2024), pp. 1-27
Closed Access
Sohail Saif, Amir H. Ansari, Suparna Biswas, et al.
Journal of Cyber Security Technology (2024), pp. 1-27
Closed Access
A RFE/Ridge-ML/DL Based Anomaly Intrusion Detection Approach for a Securing IoMTSystem
Ghita Lazrek, Kaouthar Chetioui, Younes Balboul, et al.
(2023)
Closed Access
Ghita Lazrek, Kaouthar Chetioui, Younes Balboul, et al.
(2023)
Closed Access