OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Sea turtle foraging algorithm with hybrid deep learning-based intrusion detection for the internet of drones environment
José Escorcia‐Gutierrez, Margarita Gamarra, Esmeide Leal, et al.
Computers & Electrical Engineering (2023) Vol. 108, pp. 108704-108704
Open Access | Times Cited: 22

Showing 22 citing articles:

Machine learning for enhancing transportation security: A comprehensive analysis of electric and flying vehicle systems
Hamed Alqahtani, Gulshan Kumar
Engineering Applications of Artificial Intelligence (2023) Vol. 129, pp. 107667-107667
Closed Access | Times Cited: 53

DDoS Attack and Detection Methods in Internet-Enabled Networks: Concept, Research Perspectives, and Challenges
Kazeem B. Adedeji, Adnan M. Abu‐Mahfouz, Anish Kurien
Journal of Sensor and Actuator Networks (2023) Vol. 12, Iss. 4, pp. 51-51
Open Access | Times Cited: 30

A lightweight IoT intrusion detection model based on improved BERT-of-Theseus
Zhendong Wang, Jingfei Li, Shuxin Yang, et al.
Expert Systems with Applications (2023) Vol. 238, pp. 122045-122045
Closed Access | Times Cited: 29

DeepSpoofNet: a framework for securing UAVs against GPS spoofing attacks
Aziz Ur Rehman Badar, Danish Mahmood, Adeel Iqbal, et al.
PeerJ Computer Science (2025) Vol. 11, pp. e2714-e2714
Open Access

Enhanced Dwarf Mongoose optimization algorithm with deep learning-based attack detection for drones
Yazan A. Alsariera, Waleed F. Awwad, Abeer D. Algarni, et al.
Alexandria Engineering Journal (2024) Vol. 93, pp. 59-66
Open Access | Times Cited: 4

Artificial intelligence (AI) advancements for transportation security: in-depth insights into electric and aerial vehicle systems
Gulshan Kumar, Ali Altalbe
Environment Development and Sustainability (2024)
Closed Access | Times Cited: 4

Harnessing Machine Learning Intelligence Against Cyber Threats
Bhupinder Singh, Christian Kaunert, Ritu Gautam
Advances in business strategy and competitive advantage book series (2024), pp. 319-352
Closed Access | Times Cited: 4

Addressing security challenges in industry 4.0: AVA-MA approach for strengthening SDN-IoT network security
R. Uma Mageswari, Zafar Ali Khan N, Gowthul Alam M M, et al.
Computers & Security (2024) Vol. 144, pp. 103907-103907
Closed Access | Times Cited: 3

Ebola optimization with modified DarkNet‐53 model for scene classification and security on Internet of Things in smart cities
Mohammed Al-Jabbar, Ebtesam Al-Mansor, S. Abdel‐Khalek, et al.
Alexandria Engineering Journal (2023) Vol. 75, pp. 29-40
Open Access | Times Cited: 5

Innovative IoT Threat Detection: Weighted Variational Autoencoder-Based Hunter Prey Search Algorithm for Strengthening Cybersecurity
Sami Alshmrany
IETE Journal of Research (2024) Vol. 70, Iss. 10, pp. 7687-7700
Closed Access | Times Cited: 1

Enhancing Drone Internet Performance through Artificial Intelligence Algorithms: A Comprehensive Review
Ali Abbas, Manar Kashmola
International Research Journal of Innovations in Engineering and Technology (2024) Vol. 08, Iss. 03, pp. 146-149
Open Access

Detecting Unbalanced Network Traffic Intrusions With Deep Learning
S. Pavithra, K. Venkata Vikas
IEEE Access (2024) Vol. 12, pp. 74096-74107
Open Access

The Secured Optimization to Enhance the Maximum Target Audience in Online Advertising Using Deep Belief Networks
T Thiruvenkadam, Akhilendra Pratap Singh, Aakriti Chauhan
(2024), pp. 1-6
Closed Access

Scouting the Juncture of Internet of Things (IoT), Deep Learning, and Cybercrime
Bhupinder Singh, Christian Kaunert
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 363-398
Closed Access

Exploring Effective Strategies for Combatting Cybercrime and Intersection of IoT, Deep Learning
Bhupinder Singh, Christian Kaunert
Advances in human and social aspects of technology book series (2024), pp. 141-172
Closed Access

Mathematical modelling-based blockchain with attention deep learning model for cybersecurity in IoT-consumer electronics
Hayam Alamro, Mohammed Maray, Jawhara Aljabri, et al.
Alexandria Engineering Journal (2024) Vol. 113, pp. 366-377
Open Access

Investigation on datasets toward intelligent intrusion detection systems for Intra and inter-UAVs communication systems
Ahmed Burhan Mohammed, Lamia Chaari Fourati
Computers & Security (2024), pp. 104215-104215
Closed Access

Navigating Cryptocurrency Regulation
Bhupinder Singh, Christian Kaunert
Advances in hospitality, tourism and the services industry (AHTSI) book series (2024), pp. 133-160
Closed Access

A Survey on Trust Management in Flying Ad Hoc Networks: Challenges, Classifications, and Analysis
Sihem Benfriha, Nabila Labraoui, Haythem Bany Salameh, et al.
(2023), pp. 107-114
Closed Access

Page 1

Scroll to top