
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Blockchain and federated learning-based intrusion detection approaches for edge-enabled industrial IoT networks: a survey
Saqib Ali, Qianmu Li, Abdullah Yousafzai
Ad Hoc Networks (2023) Vol. 152, pp. 103320-103320
Closed Access | Times Cited: 58
Saqib Ali, Qianmu Li, Abdullah Yousafzai
Ad Hoc Networks (2023) Vol. 152, pp. 103320-103320
Closed Access | Times Cited: 58
Showing 1-25 of 58 citing articles:
Internet of Things and Wireless Sensor Networks for Smart Agriculture Applications: A Survey
Md. Najmul Mowla, Neazmul Mowla, A. F. M. Shahen Shah, et al.
IEEE Access (2023) Vol. 11, pp. 145813-145852
Open Access | Times Cited: 54
Md. Najmul Mowla, Neazmul Mowla, A. F. M. Shahen Shah, et al.
IEEE Access (2023) Vol. 11, pp. 145813-145852
Open Access | Times Cited: 54
Securing internet of things using machine and deep learning methods: a survey
Ali Ghaffari, Nasim Jelodari, Samira pouralish, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 9065-9089
Open Access | Times Cited: 8
Ali Ghaffari, Nasim Jelodari, Samira pouralish, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 9065-9089
Open Access | Times Cited: 8
Tides of Blockchain in IoT Cybersecurity
Love Allen Chijioke Ahakonye, Cosmas Ifeanyi Nwakanma, Dong‐Seong Kim
Sensors (2024) Vol. 24, Iss. 10, pp. 3111-3111
Open Access | Times Cited: 7
Love Allen Chijioke Ahakonye, Cosmas Ifeanyi Nwakanma, Dong‐Seong Kim
Sensors (2024) Vol. 24, Iss. 10, pp. 3111-3111
Open Access | Times Cited: 7
Blockchain Applications for Internet of Things — A Survey
Imran Khan, Yasar Majib, Rehmat Ullah, et al.
Internet of Things (2024) Vol. 27, pp. 101254-101254
Closed Access | Times Cited: 7
Imran Khan, Yasar Majib, Rehmat Ullah, et al.
Internet of Things (2024) Vol. 27, pp. 101254-101254
Closed Access | Times Cited: 7
Detecting Cyber Threats With a Graph-Based NIDPS
Brendan Ooi Tze Wen, Najihah Syahriza, Nicholas Chan Wei Xian, et al.
Advances in logistics, operations, and management science book series (2023), pp. 36-74
Closed Access | Times Cited: 16
Brendan Ooi Tze Wen, Najihah Syahriza, Nicholas Chan Wei Xian, et al.
Advances in logistics, operations, and management science book series (2023), pp. 36-74
Closed Access | Times Cited: 16
Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, Threats, and Future Directions
Tamara Zhukabayeva, Lazzat Zholshiyeva, Nurdaulet Karabayev, et al.
Sensors (2025) Vol. 25, Iss. 1, pp. 213-213
Open Access
Tamara Zhukabayeva, Lazzat Zholshiyeva, Nurdaulet Karabayev, et al.
Sensors (2025) Vol. 25, Iss. 1, pp. 213-213
Open Access
Securing Fog-enabled IoT: federated learning and generative adversarial networks for intrusion detection
Ting Lei
Telecommunication Systems (2025) Vol. 88, Iss. 1
Closed Access
Ting Lei
Telecommunication Systems (2025) Vol. 88, Iss. 1
Closed Access
AWE-DPFL: Adaptive weighting and dynamic privacy budget federated learning for heterogeneous data in IoT
Guiping Zheng, Bei Gong, Chong Guo, et al.
Computers & Electrical Engineering (2025) Vol. 123, pp. 110070-110070
Closed Access
Guiping Zheng, Bei Gong, Chong Guo, et al.
Computers & Electrical Engineering (2025) Vol. 123, pp. 110070-110070
Closed Access
Optimized detection of cyber-attacks on IoT networks via hybrid deep learning models
Ahmed Bensaoud, Jugal Kalita
Ad Hoc Networks (2025) Vol. 170, pp. 103770-103770
Open Access
Ahmed Bensaoud, Jugal Kalita
Ad Hoc Networks (2025) Vol. 170, pp. 103770-103770
Open Access
Securing internet of vehicles: a blockchain-based federated learning approach for enhanced intrusion detection
Irshad Ullah, Xiaoheng Deng, Xinjun Pei, et al.
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access
Irshad Ullah, Xiaoheng Deng, Xinjun Pei, et al.
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access
AI-driven dynamic trust management and blockchain-based security in industrial IoT
Rajesh Kumar, Rewa Sharma
Computers & Electrical Engineering (2025) Vol. 123, pp. 110213-110213
Closed Access
Rajesh Kumar, Rewa Sharma
Computers & Electrical Engineering (2025) Vol. 123, pp. 110213-110213
Closed Access
Decentralized Defences from Federated Learning for Ethereum Phishing Detection
Pranab Kumar Ghosh, Aditya Bhushan, Dharmendra Kumar, et al.
Communications in computer and information science (2025), pp. 243-257
Closed Access
Pranab Kumar Ghosh, Aditya Bhushan, Dharmendra Kumar, et al.
Communications in computer and information science (2025), pp. 243-257
Closed Access
NSGTO‐LSTM: Niche‐strategy‐based gorilla troops optimization and long short‐term memory network intrusion detection model
Saritha Anchuri, Arvind Ganesh, Prathusha Perugu
ETRI Journal (2025)
Open Access
Saritha Anchuri, Arvind Ganesh, Prathusha Perugu
ETRI Journal (2025)
Open Access
Two-Stage Aggregation based Federated Learning (TSA-FL) for Industrial Internet of Things
Atallo Kassaw Takele, Balázs Villányi
Journal of Engineering Research (2025)
Open Access
Atallo Kassaw Takele, Balázs Villányi
Journal of Engineering Research (2025)
Open Access
Deep Learning based Network based Intrusion Detection System in Industrial Internet of Things
J. Alwina Beauty Angelin, C. Priyadharsini
(2024), pp. 426-432
Closed Access | Times Cited: 3
J. Alwina Beauty Angelin, C. Priyadharsini
(2024), pp. 426-432
Closed Access | Times Cited: 3
A contemporary survey of recent advances in federated learning: Taxonomies, applications, and challenges
Mohammed H. Alsharif, Raju Kannadasan, Wei Wei, et al.
Internet of Things (2024) Vol. 27, pp. 101251-101251
Closed Access | Times Cited: 3
Mohammed H. Alsharif, Raju Kannadasan, Wei Wei, et al.
Internet of Things (2024) Vol. 27, pp. 101251-101251
Closed Access | Times Cited: 3
The Threat of Disruptive Jamming to Blockchain-Based Decentralized Federated Learning in Wireless Networks
Gyungmin Kim, Yonggang Kim
Sensors (2024) Vol. 24, Iss. 2, pp. 535-535
Open Access | Times Cited: 2
Gyungmin Kim, Yonggang Kim
Sensors (2024) Vol. 24, Iss. 2, pp. 535-535
Open Access | Times Cited: 2
TICPS: A trustworthy collaborative intrusion detection framework for industrial cyber–physical systems
Lingzi Zhu, Bo Zhao, Weidong Li, et al.
Ad Hoc Networks (2024) Vol. 160, pp. 103517-103517
Closed Access | Times Cited: 2
Lingzi Zhu, Bo Zhao, Weidong Li, et al.
Ad Hoc Networks (2024) Vol. 160, pp. 103517-103517
Closed Access | Times Cited: 2
Enhancing Network Reliability: Exploring Effective Strategies for Coverage-Hole Analysis and Patching in Wireless Sensor Networks
Rajib Chowdhuri, Mrinal Kanti Deb Barma
Wireless Personal Communications (2024) Vol. 134, Iss. 1, pp. 487-517
Closed Access | Times Cited: 2
Rajib Chowdhuri, Mrinal Kanti Deb Barma
Wireless Personal Communications (2024) Vol. 134, Iss. 1, pp. 487-517
Closed Access | Times Cited: 2
Machine Learning for Anomaly Detection in Electric Transportation Networks
Kseniia Iurevna Usanova, Gongada Sandhya Rani, Neeti Mishra, et al.
E3S Web of Conferences (2024) Vol. 511, pp. 01039-01039
Open Access | Times Cited: 2
Kseniia Iurevna Usanova, Gongada Sandhya Rani, Neeti Mishra, et al.
E3S Web of Conferences (2024) Vol. 511, pp. 01039-01039
Open Access | Times Cited: 2
Intrusion Detection Systems in VANET: A Review on Implementation Techniques and Datasets
Komala Soares, Arundhati A. Shinde
(2024), pp. 897-905
Closed Access | Times Cited: 2
Komala Soares, Arundhati A. Shinde
(2024), pp. 897-905
Closed Access | Times Cited: 2
Decentralized medical image classification system using dual-input CNN enhanced by spatial attention and heuristic support
Dawid Połap, Antoni Jaszcz
Expert Systems with Applications (2024) Vol. 253, pp. 124343-124343
Closed Access | Times Cited: 2
Dawid Połap, Antoni Jaszcz
Expert Systems with Applications (2024) Vol. 253, pp. 124343-124343
Closed Access | Times Cited: 2
Blockchain-enabled collaborative anomaly detection for IoT security
Ananda Ravuri, M. Sadish Sendil, Moshe Rani, et al.
MATEC Web of Conferences (2024) Vol. 392, pp. 01141-01141
Open Access | Times Cited: 1
Ananda Ravuri, M. Sadish Sendil, Moshe Rani, et al.
MATEC Web of Conferences (2024) Vol. 392, pp. 01141-01141
Open Access | Times Cited: 1
Elliptic Crypt With Secured Blockchain Assisted Federated Q-Learning Framework for Smart Healthcare
Sudhakaran Gajendran, M. Revathi, Krithiga Ravi, et al.
IEEE Access (2024) Vol. 12, pp. 45923-45935
Open Access | Times Cited: 1
Sudhakaran Gajendran, M. Revathi, Krithiga Ravi, et al.
IEEE Access (2024) Vol. 12, pp. 45923-45935
Open Access | Times Cited: 1
A Comprehensive Systematic Review of Blockchain-based Intrusion Detection Systems
Gideon Adele, Abinash Borah, Anirudh Paranjothi, et al.
2022 IEEE World AI IoT Congress (AIIoT) (2024), pp. 605-611
Closed Access | Times Cited: 1
Gideon Adele, Abinash Borah, Anirudh Paranjothi, et al.
2022 IEEE World AI IoT Congress (AIIoT) (2024), pp. 605-611
Closed Access | Times Cited: 1