OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Multi-level Random Forest Model-Based Intrusion Detection Using Fuzzy Inference System for Internet of Things Networks
Joseph Bamidele Awotunde, Femi Emmanuel Ayo, Ranjit Panigrahi, et al.
International Journal of Computational Intelligence Systems (2023) Vol. 16, Iss. 1
Open Access | Times Cited: 23

Showing 23 citing articles:

Deep learning enabled intrusion detection system for Industrial IOT environment
Himanshu Nandanwar, Rahul Katarya
Expert Systems with Applications (2024) Vol. 249, pp. 123808-123808
Closed Access | Times Cited: 27

Energy Efficient Load-Balancing Mechanism in Integrated IoT–Fog–Cloud Environment
Meenu Vijarania, Swati Gupta, Akshat Agrawal, et al.
Electronics (2023) Vol. 12, Iss. 11, pp. 2543-2543
Open Access | Times Cited: 24

Ontology-Based Layered Rule-Based Network Intrusion Detection System for Cybercrimes Detection
Femi Emmanuel Ayo, Joseph Bamidele Awotunde, Lukman Adebayo Ogundele, et al.
Knowledge and Information Systems (2024) Vol. 66, Iss. 6, pp. 3355-3392
Closed Access | Times Cited: 5

Network intrusion detection: An optimized deep learning approach using big data analytics
D. Suja Mary, L. Jaya Singh Dhas, A. Deepa, et al.
Expert Systems with Applications (2024) Vol. 251, pp. 123919-123919
Closed Access | Times Cited: 5

An enhanced BiGAN architecture for network intrusion detection
Mohammad Arafah, Iain Phillips, Asma Adnane, et al.
Knowledge-Based Systems (2025), pp. 113178-113178
Closed Access

Fortifying IoT against crimpling cyber-attacks: a systematic review
Usman Tariq, Irfan Ahmed, Muhammad Attique Khan, et al.
Karbala International Journal of Modern Science (2023) Vol. 9, Iss. 4
Open Access | Times Cited: 9

A hybrid correlation-based deep learning model for email spam classification using fuzzy inference system
Femi Emmanuel Ayo, Lukman Adebayo Ogundele, Solanke Olakunle, et al.
Decision Analytics Journal (2023) Vol. 10, pp. 100390-100390
Open Access | Times Cited: 9

An improved federated transfer learning model for intrusion detection in edge computing empowered wireless sensor networks
L. Raja, G. Sakthi, S. Vimalnath, et al.
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 24
Closed Access | Times Cited: 1

Separating Prediction and Explanation: An Approach Based on Explainable Artificial Intelligence for Analyzing Network Intrusion
Xinhao Wan, Gang Xue, Yiming Zhong, et al.
Journal of Network and Systems Management (2024) Vol. 33, Iss. 1
Closed Access | Times Cited: 1

Intrusion detection using KK-RF and balanced Gini - Entropy approach
Karthik Ramani, N. Chandrakala
Multimedia Tools and Applications (2024) Vol. 83, Iss. 32, pp. 77219-77246
Closed Access | Times Cited: 1

Fuzzy Logic-Based Software Systems
Konstantina Chrysafiadi
Learning and analytics in intelligent systems (2023), pp. 31-129
Closed Access | Times Cited: 2

Enhancing Security in Social Networks: A Hybrid Anomaly Detection Approach Using Rf-Svmnb
Manikanda Prabu Nallasivam, Vinu Kumar S M
(2024)
Closed Access

Optimization-Based Fuzzy System Application on Deformation of Geogrid-Reinforced Soil Structures
Huiru Dou
International Journal of Computational Intelligence Systems (2024) Vol. 17, Iss. 1
Open Access

Intrusion Detection System Trends: An Overview of Current Advances in IoV & Communication Networks
S. Sreenivasa Chakravarthi, Rishabh Rajput, S. Sountharrajan, et al.
IFIP advances in information and communication technology (2024), pp. 36-50
Closed Access

Fuzzy based Mamdani Inference System for Botnet Detection
Priya Priya, Neha Gupta
(2024), pp. 1-7
Closed Access

Intrusion Detection in IoT using Gaussian Fuzzy Mutual Information-based Feature Selection
Abdullah Hussain Abu Saq, Anazida Zainal, Bander Ali Saleh Al‐rimy, et al.
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 6, pp. 17564-17571
Open Access

Enhancing IoT Security: Hybrid Machine Learning Approach for IoT Attack Detection
Alavikunhu Panthakkan, S. M Anzar, Dina Shehada, et al.
Lecture notes in computer science (2024), pp. 193-207
Closed Access

A Temporal Convolutional Network-Based Approach for Network Intrusion Detection
Rukmini Nazre, Rujuta Budke, Omkar Oak, et al.
(2024), pp. 1-6
Open Access

Research on grade identification of Chinese strong-flavor raw liquors based on machine learning under feature selection
Wei Zhang, Xianguo Tuo, Guiyu Zhang, et al.
2021 CAA Symposium on Fault Detection, Supervision, and Safety for Technical Processes (SAFEPROCESS) (2023), pp. 1-6
Closed Access

Multi-Method Stacked Feature Selection Approach based IDS for IoT Networks
Jai Prakash Kushwaha, Saumya Bhadauria, Shashikala Tapaswi
Procedia Computer Science (2023) Vol. 230, pp. 564-573
Open Access

Page 1

Scroll to top