
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
DL-SkLSTM approach for cyber security threats detection in 5G enabled IIoT
Anjali Rajak, Rakesh Tripathi
International Journal of Information Technology (2023) Vol. 16, Iss. 1, pp. 13-20
Closed Access | Times Cited: 12
Anjali Rajak, Rakesh Tripathi
International Journal of Information Technology (2023) Vol. 16, Iss. 1, pp. 13-20
Closed Access | Times Cited: 12
Showing 12 citing articles:
Enhancing cybersecurity in Edge IIoT networks: An asynchronous federated learning approach with a deep hybrid detection model
Syed Muhammad Salman Bukhari, Muhammad Hamza Zafar, Mohamad Abou Houran, et al.
Internet of Things (2024) Vol. 27, pp. 101252-101252
Open Access | Times Cited: 7
Syed Muhammad Salman Bukhari, Muhammad Hamza Zafar, Mohamad Abou Houran, et al.
Internet of Things (2024) Vol. 27, pp. 101252-101252
Open Access | Times Cited: 7
OSEN-IoT: An optimized stack ensemble network with genetic algorithm for robust intrusion detection in heterogeneous IoT networks
Sohaib Asif
Expert Systems with Applications (2025), pp. 127183-127183
Closed Access
Sohaib Asif
Expert Systems with Applications (2025), pp. 127183-127183
Closed Access
Security Enhancement in 5G Networks by Identifying Attacks Using Optimized Cosine Convolutional Neural Network
Premalatha Santhanamari, K. Vijayakumar, L. Subramanian, et al.
Internet Technology Letters (2025) Vol. 8, Iss. 2
Closed Access
Premalatha Santhanamari, K. Vijayakumar, L. Subramanian, et al.
Internet Technology Letters (2025) Vol. 8, Iss. 2
Closed Access
Explainable AI for Zero-Day Attack Detection in IoT Networks Using Attention Fusion Model
Deepa Krishnan, Swapnil Singh, Vijayan Sugumaran
Research Square (Research Square) (2025)
Closed Access
Deepa Krishnan, Swapnil Singh, Vijayan Sugumaran
Research Square (Research Square) (2025)
Closed Access
An energy efficient encryption technique for the Internet of Things sensor nodes
Ishfaq Sultan, M. Tariq Banday
International Journal of Information Technology (2024) Vol. 16, Iss. 4, pp. 2517-2533
Closed Access | Times Cited: 2
Ishfaq Sultan, M. Tariq Banday
International Journal of Information Technology (2024) Vol. 16, Iss. 4, pp. 2517-2533
Closed Access | Times Cited: 2
Secure aware disaster recovery in cloud using an adaptive coati optimization algorithm
S. Vinothkumar, J. Amutharaj
International Journal of Information Technology (2024) Vol. 16, Iss. 5, pp. 2783-2793
Closed Access | Times Cited: 2
S. Vinothkumar, J. Amutharaj
International Journal of Information Technology (2024) Vol. 16, Iss. 5, pp. 2783-2793
Closed Access | Times Cited: 2
ZeroMedChain: Layer 2 Security and Zero-knowledge Proof Integration for Decentralized Identity and Access Management in Healthcare
Poonam Verma, Vikas Tripathi, Bhaskar Pant
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) (2024), pp. 1023-1027
Closed Access | Times Cited: 2
Poonam Verma, Vikas Tripathi, Bhaskar Pant
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) (2024), pp. 1023-1027
Closed Access | Times Cited: 2
A robust method for malware analysis using stacking classifiers and dendrogram visualization
N. Naveen Kumar, S. Balamurugan, R. Maruthamuthu, et al.
International Journal of Information Technology (2024)
Closed Access | Times Cited: 1
N. Naveen Kumar, S. Balamurugan, R. Maruthamuthu, et al.
International Journal of Information Technology (2024)
Closed Access | Times Cited: 1
Deep Learning based Energy-Efficient Task Scheduling in Cloud Computing
K. Anuradha, T. Sampath Kumar
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) (2024), pp. 1761-1766
Closed Access
K. Anuradha, T. Sampath Kumar
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) (2024), pp. 1761-1766
Closed Access
A Systematic Approach to Detect Insider Attacks and Exploitation in Cyber Physical System
Atul B. Vitekar, Vijaya R. Pawar
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) (2024), pp. 883-888
Closed Access
Atul B. Vitekar, Vijaya R. Pawar
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) (2024), pp. 883-888
Closed Access
GSAAN with War Strategy Optimization Algorithm for Cyber Security in a 5G Wireless Communication Network
D. Shobana, Bhanu Priya, V. Samuthira Pandi
IETE Journal of Research (2024) Vol. 70, Iss. 11, pp. 8056-8063
Closed Access
D. Shobana, Bhanu Priya, V. Samuthira Pandi
IETE Journal of Research (2024) Vol. 70, Iss. 11, pp. 8056-8063
Closed Access
Leveraging Deep Learning for Intrusion Detection in Industrial IoT Landscapes
Computer Science Engineering and Technology (2024) Vol. 2, Iss. 3, pp. 1-8
Closed Access
Computer Science Engineering and Technology (2024) Vol. 2, Iss. 3, pp. 1-8
Closed Access