
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Sea turtle foraging algorithm with hybrid deep learning-based intrusion detection for the internet of drones environment
José Escorcia‐Gutierrez, Margarita Gamarra, Esmeide Leal, et al.
Computers & Electrical Engineering (2023) Vol. 108, pp. 108704-108704
Open Access | Times Cited: 22
José Escorcia‐Gutierrez, Margarita Gamarra, Esmeide Leal, et al.
Computers & Electrical Engineering (2023) Vol. 108, pp. 108704-108704
Open Access | Times Cited: 22
Showing 22 citing articles:
Machine learning for enhancing transportation security: A comprehensive analysis of electric and flying vehicle systems
Hamed Alqahtani, Gulshan Kumar
Engineering Applications of Artificial Intelligence (2023) Vol. 129, pp. 107667-107667
Closed Access | Times Cited: 53
Hamed Alqahtani, Gulshan Kumar
Engineering Applications of Artificial Intelligence (2023) Vol. 129, pp. 107667-107667
Closed Access | Times Cited: 53
DDoS Attack and Detection Methods in Internet-Enabled Networks: Concept, Research Perspectives, and Challenges
Kazeem B. Adedeji, Adnan M. Abu‐Mahfouz, Anish Kurien
Journal of Sensor and Actuator Networks (2023) Vol. 12, Iss. 4, pp. 51-51
Open Access | Times Cited: 30
Kazeem B. Adedeji, Adnan M. Abu‐Mahfouz, Anish Kurien
Journal of Sensor and Actuator Networks (2023) Vol. 12, Iss. 4, pp. 51-51
Open Access | Times Cited: 30
A lightweight IoT intrusion detection model based on improved BERT-of-Theseus
Zhendong Wang, Jingfei Li, Shuxin Yang, et al.
Expert Systems with Applications (2023) Vol. 238, pp. 122045-122045
Closed Access | Times Cited: 29
Zhendong Wang, Jingfei Li, Shuxin Yang, et al.
Expert Systems with Applications (2023) Vol. 238, pp. 122045-122045
Closed Access | Times Cited: 29
A Novel Intrusion Detection System Based on Artificial Neural Network and Genetic Algorithm With a New Dimensionality Reduction Technique for UAV Communication
Korhan Cengiz, Swati Lipsa, Ranjan Kumar Dash, et al.
IEEE Access (2024) Vol. 12, pp. 4925-4937
Open Access | Times Cited: 10
Korhan Cengiz, Swati Lipsa, Ranjan Kumar Dash, et al.
IEEE Access (2024) Vol. 12, pp. 4925-4937
Open Access | Times Cited: 10
DeepSpoofNet: a framework for securing UAVs against GPS spoofing attacks
Aziz Ur Rehman Badar, Danish Mahmood, Adeel Iqbal, et al.
PeerJ Computer Science (2025) Vol. 11, pp. e2714-e2714
Open Access
Aziz Ur Rehman Badar, Danish Mahmood, Adeel Iqbal, et al.
PeerJ Computer Science (2025) Vol. 11, pp. e2714-e2714
Open Access
Enhanced Dwarf Mongoose optimization algorithm with deep learning-based attack detection for drones
Yazan A. Alsariera, Waleed F. Awwad, Abeer D. Algarni, et al.
Alexandria Engineering Journal (2024) Vol. 93, pp. 59-66
Open Access | Times Cited: 4
Yazan A. Alsariera, Waleed F. Awwad, Abeer D. Algarni, et al.
Alexandria Engineering Journal (2024) Vol. 93, pp. 59-66
Open Access | Times Cited: 4
Artificial intelligence (AI) advancements for transportation security: in-depth insights into electric and aerial vehicle systems
Gulshan Kumar, Ali Altalbe
Environment Development and Sustainability (2024)
Closed Access | Times Cited: 4
Gulshan Kumar, Ali Altalbe
Environment Development and Sustainability (2024)
Closed Access | Times Cited: 4
Harnessing Machine Learning Intelligence Against Cyber Threats
Bhupinder Singh, Christian Kaunert, Ritu Gautam
Advances in business strategy and competitive advantage book series (2024), pp. 319-352
Closed Access | Times Cited: 4
Bhupinder Singh, Christian Kaunert, Ritu Gautam
Advances in business strategy and competitive advantage book series (2024), pp. 319-352
Closed Access | Times Cited: 4
Addressing security challenges in industry 4.0: AVA-MA approach for strengthening SDN-IoT network security
R. Uma Mageswari, Zafar Ali Khan N, Gowthul Alam M M, et al.
Computers & Security (2024) Vol. 144, pp. 103907-103907
Closed Access | Times Cited: 3
R. Uma Mageswari, Zafar Ali Khan N, Gowthul Alam M M, et al.
Computers & Security (2024) Vol. 144, pp. 103907-103907
Closed Access | Times Cited: 3
Ebola optimization with modified DarkNet‐53 model for scene classification and security on Internet of Things in smart cities
Mohammed Al-Jabbar, Ebtesam Al-Mansor, S. Abdel‐Khalek, et al.
Alexandria Engineering Journal (2023) Vol. 75, pp. 29-40
Open Access | Times Cited: 5
Mohammed Al-Jabbar, Ebtesam Al-Mansor, S. Abdel‐Khalek, et al.
Alexandria Engineering Journal (2023) Vol. 75, pp. 29-40
Open Access | Times Cited: 5
Investigation on Datasets Toward Intelligent Intrusion Detection Systems for Intra and Inter-Uavs Communication Systems
Ahmed Burhan Mohammed, Lamia Chaari Fourati
(2024)
Closed Access | Times Cited: 1
Ahmed Burhan Mohammed, Lamia Chaari Fourati
(2024)
Closed Access | Times Cited: 1
Innovative IoT Threat Detection: Weighted Variational Autoencoder-Based Hunter Prey Search Algorithm for Strengthening Cybersecurity
Sami Alshmrany
IETE Journal of Research (2024) Vol. 70, Iss. 10, pp. 7687-7700
Closed Access | Times Cited: 1
Sami Alshmrany
IETE Journal of Research (2024) Vol. 70, Iss. 10, pp. 7687-7700
Closed Access | Times Cited: 1
Enhancing Drone Internet Performance through Artificial Intelligence Algorithms: A Comprehensive Review
Ali Abbas, Manar Kashmola
International Research Journal of Innovations in Engineering and Technology (2024) Vol. 08, Iss. 03, pp. 146-149
Open Access
Ali Abbas, Manar Kashmola
International Research Journal of Innovations in Engineering and Technology (2024) Vol. 08, Iss. 03, pp. 146-149
Open Access
Detecting Unbalanced Network Traffic Intrusions With Deep Learning
S. Pavithra, K. Venkata Vikas
IEEE Access (2024) Vol. 12, pp. 74096-74107
Open Access
S. Pavithra, K. Venkata Vikas
IEEE Access (2024) Vol. 12, pp. 74096-74107
Open Access
The Secured Optimization to Enhance the Maximum Target Audience in Online Advertising Using Deep Belief Networks
T Thiruvenkadam, Akhilendra Pratap Singh, Aakriti Chauhan
(2024), pp. 1-6
Closed Access
T Thiruvenkadam, Akhilendra Pratap Singh, Aakriti Chauhan
(2024), pp. 1-6
Closed Access
Enhancing Intrusion Detection System (IDS) Through Deep Packet Inspection (DPI) with Machine Learning approaches
K A Bathiri, M Vijayakumar
(2024), pp. 1-7
Closed Access
K A Bathiri, M Vijayakumar
(2024), pp. 1-7
Closed Access
Scouting the Juncture of Internet of Things (IoT), Deep Learning, and Cybercrime
Bhupinder Singh, Christian Kaunert
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 363-398
Closed Access
Bhupinder Singh, Christian Kaunert
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 363-398
Closed Access
Exploring Effective Strategies for Combatting Cybercrime and Intersection of IoT, Deep Learning
Bhupinder Singh, Christian Kaunert
Advances in human and social aspects of technology book series (2024), pp. 141-172
Closed Access
Bhupinder Singh, Christian Kaunert
Advances in human and social aspects of technology book series (2024), pp. 141-172
Closed Access
Mathematical modelling-based blockchain with attention deep learning model for cybersecurity in IoT-consumer electronics
Hayam Alamro, Mohammed Maray, Jawhara Aljabri, et al.
Alexandria Engineering Journal (2024) Vol. 113, pp. 366-377
Open Access
Hayam Alamro, Mohammed Maray, Jawhara Aljabri, et al.
Alexandria Engineering Journal (2024) Vol. 113, pp. 366-377
Open Access
Investigation on datasets toward intelligent intrusion detection systems for Intra and inter-UAVs communication systems
Ahmed Burhan Mohammed, Lamia Chaari Fourati
Computers & Security (2024), pp. 104215-104215
Closed Access
Ahmed Burhan Mohammed, Lamia Chaari Fourati
Computers & Security (2024), pp. 104215-104215
Closed Access
Navigating Cryptocurrency Regulation
Bhupinder Singh, Christian Kaunert
Advances in hospitality, tourism and the services industry (AHTSI) book series (2024), pp. 133-160
Closed Access
Bhupinder Singh, Christian Kaunert
Advances in hospitality, tourism and the services industry (AHTSI) book series (2024), pp. 133-160
Closed Access
A Survey on Trust Management in Flying Ad Hoc Networks: Challenges, Classifications, and Analysis
Sihem Benfriha, Nabila Labraoui, Haythem Bany Salameh, et al.
(2023), pp. 107-114
Closed Access
Sihem Benfriha, Nabila Labraoui, Haythem Bany Salameh, et al.
(2023), pp. 107-114
Closed Access