
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Anomaly-based intrusion detection system for IoT networks through deep learning model
Tanzila Saba, Amjad Rehman, Tariq Sadad, et al.
Computers & Electrical Engineering (2022) Vol. 99, pp. 107810-107810
Open Access | Times Cited: 249
Tanzila Saba, Amjad Rehman, Tariq Sadad, et al.
Computers & Electrical Engineering (2022) Vol. 99, pp. 107810-107810
Open Access | Times Cited: 249
Showing 1-25 of 249 citing articles:
Internet of Things (IoT) security dataset evolution: Challenges and future directions
Barjinder Kaur, Sajjad Dadkhah, Farzaneh Shoeleh, et al.
Internet of Things (2023) Vol. 22, pp. 100780-100780
Closed Access | Times Cited: 95
Barjinder Kaur, Sajjad Dadkhah, Farzaneh Shoeleh, et al.
Internet of Things (2023) Vol. 22, pp. 100780-100780
Closed Access | Times Cited: 95
Deep Learning for Intrusion Detection and Security of Internet of Things (IoT): Current Analysis, Challenges, and Possible Solutions
Amjad Rehman, Muhammad Kashif, Rutvij H. Jhaveri, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-13
Open Access | Times Cited: 93
Amjad Rehman, Muhammad Kashif, Rutvij H. Jhaveri, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-13
Open Access | Times Cited: 93
Cyber Threats Detection in Smart Environments Using SDN-Enabled DNN-LSTM Hybrid Framework
Mohammad Al Razib, Danish Javeed, Muhammad Taimoor Khan, et al.
IEEE Access (2022) Vol. 10, pp. 53015-53026
Open Access | Times Cited: 79
Mohammad Al Razib, Danish Javeed, Muhammad Taimoor Khan, et al.
IEEE Access (2022) Vol. 10, pp. 53015-53026
Open Access | Times Cited: 79
An optimized ensemble prediction model using AutoML based on soft voting classifier for network intrusion detection
Murad Khan, Naeem Iqbal, Imran Imran, et al.
Journal of Network and Computer Applications (2022) Vol. 212, pp. 103560-103560
Closed Access | Times Cited: 69
Murad Khan, Naeem Iqbal, Imran Imran, et al.
Journal of Network and Computer Applications (2022) Vol. 212, pp. 103560-103560
Closed Access | Times Cited: 69
Anomaly-based intrusion detection system for IoT application
Mansi Bhavsar, Kaushik Roy, John Kelly, et al.
Discover Internet of Things (2023) Vol. 3, Iss. 1
Open Access | Times Cited: 61
Mansi Bhavsar, Kaushik Roy, John Kelly, et al.
Discover Internet of Things (2023) Vol. 3, Iss. 1
Open Access | Times Cited: 61
Enhancing IoT network security through deep learning-powered Intrusion Detection System
Shahid Allah Bakhsh, Muhammad Almas Khan, Fawad Ahmed, et al.
Internet of Things (2023) Vol. 24, pp. 100936-100936
Open Access | Times Cited: 59
Shahid Allah Bakhsh, Muhammad Almas Khan, Fawad Ahmed, et al.
Internet of Things (2023) Vol. 24, pp. 100936-100936
Open Access | Times Cited: 59
Anomaly-based intrusion detection system in the Internet of Things using a convolutional neural network and multi-objective enhanced Capuchin Search Algorithm
Hossein Asgharzadeh, Ali Ghaffari, Mohammad Masdari, et al.
Journal of Parallel and Distributed Computing (2023) Vol. 175, pp. 1-21
Closed Access | Times Cited: 57
Hossein Asgharzadeh, Ali Ghaffari, Mohammad Masdari, et al.
Journal of Parallel and Distributed Computing (2023) Vol. 175, pp. 1-21
Closed Access | Times Cited: 57
A new two-phase intrusion detection system with Naïve Bayes machine learning for data classification and elliptic envelop method for anomaly detection
Monika Vishwakarma, Nishtha Kesswani
Decision Analytics Journal (2023) Vol. 7, pp. 100233-100233
Open Access | Times Cited: 52
Monika Vishwakarma, Nishtha Kesswani
Decision Analytics Journal (2023) Vol. 7, pp. 100233-100233
Open Access | Times Cited: 52
NIDS-CNNLSTM: Network Intrusion Detection Classification Model Based on Deep Learning
Jiawei Du, Kai Yang, Yanjing Hu, et al.
IEEE Access (2023) Vol. 11, pp. 24808-24821
Open Access | Times Cited: 48
Jiawei Du, Kai Yang, Yanjing Hu, et al.
IEEE Access (2023) Vol. 11, pp. 24808-24821
Open Access | Times Cited: 48
Fog-cloud based intrusion detection system using Recurrent Neural Networks and feature selection for IoT networks
Naeem Firdous Syed, Mengmeng Ge, Zubair Baig
Computer Networks (2023) Vol. 225, pp. 109662-109662
Closed Access | Times Cited: 43
Naeem Firdous Syed, Mengmeng Ge, Zubair Baig
Computer Networks (2023) Vol. 225, pp. 109662-109662
Closed Access | Times Cited: 43
An Ensemble Learning Based Intrusion Detection Model for Industrial IoT Security
Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, et al.
Big Data Mining and Analytics (2023) Vol. 6, Iss. 3, pp. 273-287
Open Access | Times Cited: 43
Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, et al.
Big Data Mining and Analytics (2023) Vol. 6, Iss. 3, pp. 273-287
Open Access | Times Cited: 43
Firefly algorithm based WSN-IoT security enhancement with machine learning for intrusion detection
M. Karthikeyan, D. Manimegalai, Karthikeyan Rajagopal
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 34
M. Karthikeyan, D. Manimegalai, Karthikeyan Rajagopal
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 34
Evaluating deep learning variants for cyber-attacks detection and multi-class classification in IoT networks
Sidra Abbas, Imen Bouazzi, Stephen Ojo, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e1793-e1793
Open Access | Times Cited: 20
Sidra Abbas, Imen Bouazzi, Stephen Ojo, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e1793-e1793
Open Access | Times Cited: 20
DeepLG SecNet: utilizing deep LSTM and GRU with secure network for enhanced intrusion detection in IoT environments
N. Manikandan, K. Pradeep, Gobalakrishnan Natesan, et al.
Cluster Computing (2024) Vol. 27, Iss. 4, pp. 5459-5471
Closed Access | Times Cited: 15
N. Manikandan, K. Pradeep, Gobalakrishnan Natesan, et al.
Cluster Computing (2024) Vol. 27, Iss. 4, pp. 5459-5471
Closed Access | Times Cited: 15
Enhanced Intrusion Detection Systems Performance with UNSW-NB15 Data Analysis
Shweta More, Moad Idrissi, Haitham Mahmoud, et al.
Algorithms (2024) Vol. 17, Iss. 2, pp. 64-64
Open Access | Times Cited: 15
Shweta More, Moad Idrissi, Haitham Mahmoud, et al.
Algorithms (2024) Vol. 17, Iss. 2, pp. 64-64
Open Access | Times Cited: 15
Advances and Vulnerabilities in Modern Cryptographic Techniques: A Comprehensive Survey on Cybersecurity in the Domain of Machine/Deep Learning and Quantum Techniques
Abid Mehmood, Arslan Shafique, Moatsum Alawida, et al.
IEEE Access (2024) Vol. 12, pp. 27530-27555
Open Access | Times Cited: 15
Abid Mehmood, Arslan Shafique, Moatsum Alawida, et al.
IEEE Access (2024) Vol. 12, pp. 27530-27555
Open Access | Times Cited: 15
DIDS: A Deep Neural Network based real-time Intrusion detection system for IoT
Monika Vishwakarma, Nishtha Kesswani
Decision Analytics Journal (2022) Vol. 5, pp. 100142-100142
Closed Access | Times Cited: 55
Monika Vishwakarma, Nishtha Kesswani
Decision Analytics Journal (2022) Vol. 5, pp. 100142-100142
Closed Access | Times Cited: 55
An effective intrusion detection approach based on ensemble learning for IIoT edge computing
Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, et al.
Journal of Computer Virology and Hacking Techniques (2022) Vol. 19, Iss. 4, pp. 469-481
Closed Access | Times Cited: 38
Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, et al.
Journal of Computer Virology and Hacking Techniques (2022) Vol. 19, Iss. 4, pp. 469-481
Closed Access | Times Cited: 38
An Explainable and Resilient Intrusion Detection System for Industry 5.0
Danish Javeed, Tianhan Gao, Prabhat Kumar, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 1, pp. 1342-1350
Open Access | Times Cited: 35
Danish Javeed, Tianhan Gao, Prabhat Kumar, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 1, pp. 1342-1350
Open Access | Times Cited: 35
An Intrusion Detection System Using BoT-IoT
Shema Alosaimi, Saad Almutairi
Applied Sciences (2023) Vol. 13, Iss. 9, pp. 5427-5427
Open Access | Times Cited: 31
Shema Alosaimi, Saad Almutairi
Applied Sciences (2023) Vol. 13, Iss. 9, pp. 5427-5427
Open Access | Times Cited: 31
A Multi-level Random Forest Model-Based Intrusion Detection Using Fuzzy Inference System for Internet of Things Networks
Joseph Bamidele Awotunde, Femi Emmanuel Ayo, Ranjit Panigrahi, et al.
International Journal of Computational Intelligence Systems (2023) Vol. 16, Iss. 1
Open Access | Times Cited: 23
Joseph Bamidele Awotunde, Femi Emmanuel Ayo, Ranjit Panigrahi, et al.
International Journal of Computational Intelligence Systems (2023) Vol. 16, Iss. 1
Open Access | Times Cited: 23
FOG-Empowered Augmented-Intelligence-Based Proactive Defensive Mechanism for IoT-Enabled Smart Industries
Danish Javeed, Tianhan Gao, Muhammad Shahid Saeed, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 21, pp. 18599-18608
Closed Access | Times Cited: 23
Danish Javeed, Tianhan Gao, Muhammad Shahid Saeed, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 21, pp. 18599-18608
Closed Access | Times Cited: 23
Metaverse-IDS: Deep learning-based intrusion detection system for Metaverse-IoT networks
Tarek Gaber, Joseph Bamidele Awotunde, Mohamed Torky, et al.
Internet of Things (2023) Vol. 24, pp. 100977-100977
Open Access | Times Cited: 22
Tarek Gaber, Joseph Bamidele Awotunde, Mohamed Torky, et al.
Internet of Things (2023) Vol. 24, pp. 100977-100977
Open Access | Times Cited: 22
Detecting and Mitigating Botnet Attacks in Software-Defined Networks Using Deep Learning Techniques
Muhammad Waqas Nadeem, Hock Guan Goh, Yichiet Aun, et al.
IEEE Access (2023) Vol. 11, pp. 49153-49171
Open Access | Times Cited: 21
Muhammad Waqas Nadeem, Hock Guan Goh, Yichiet Aun, et al.
IEEE Access (2023) Vol. 11, pp. 49153-49171
Open Access | Times Cited: 21
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Osama Rabie, Shitharth Selvarajan, Tawfiq Hasanin, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 11
Osama Rabie, Shitharth Selvarajan, Tawfiq Hasanin, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 11