OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Towards a robust, effective and resource efficient machine learning technique for IoT security monitoring
Idris Zakariyya, Harsha Kalutarage, M. Omar Al-Kadri
Computers & Security (2023) Vol. 133, pp. 103388-103388
Open Access | Times Cited: 16

Showing 16 citing articles:

A Comprehensive Survey of Deep Learning Approaches in Image Processing
Μαρία Τρίγκα, Ηλίας Δρίτσας
Sensors (2025) Vol. 25, Iss. 2, pp. 531-531
Open Access | Times Cited: 1

Advancements in training and deployment strategies for AI-based intrusion detection systems in IoT: a systematic literature review
S Kumar Reddy Mallidi, Rajeswara Rao Ramisetty
Discover Internet of Things (2025) Vol. 5, Iss. 1
Open Access | Times Cited: 1

Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of things
Uneneibotejit Otokwala, Andrei Petrovski, Harsha Kalutarage
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2559-2581
Open Access | Times Cited: 7

Transformer-based knowledge distillation for explainable intrusion detection system
Nadiah AL-Nomasy, Abdulelah Alamri, Ahamed Aljuhani, et al.
Computers & Security (2025), pp. 104417-104417
Open Access

Optimizing Intrusion Detection for IoT: A Systematic Review of Machine Learning and Deep Learning Approaches With Feature Selection and Data Balancing
S Kumar Reddy Mallidi, Rajeswara Rao Ramisetty
Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery (2025) Vol. 15, Iss. 2
Closed Access

Refining Land Cover Classification and Change Detection for Urban Water Management using Comparative Machine Learning Approach.
Douraied Guizani, János Tamás, Dávid Pásztor, et al.
Environmental Challenges (2025), pp. 101118-101118
Open Access

Navigating the Cyber Threat Landscape: An In-Depth Analysis of Attack Detection within IoT Ecosystems
Samar AboulEla, Nourhan M. Ibrahim, Sarama Shehmir, et al.
AI (2024) Vol. 5, Iss. 2, pp. 704-732
Open Access | Times Cited: 3

Multi-dimension-precision chaotic encryption mechanism for Internet of Things
Shengwen Fan, Junchao Wang
Internet of Things (2024) Vol. 26, pp. 101202-101202
Closed Access | Times Cited: 2

IoT in Home Automation: A Data-Driven User Behaviour Analysis and User Adoption Test
Vasilieva Elena, Deepa Bisht, Soosan Chhabra, et al.
BIO Web of Conferences (2024) Vol. 86, pp. 01085-01085
Open Access | Times Cited: 1

Adaptive Learning-Based IoT Security Framework Using Recurrent Neural Networks
Lydia D. Isaac, V. Mohanraj, Nisha Soms, et al.
Lecture notes in electrical engineering (2024), pp. 91-101
Closed Access

MLBFN optimized with Archimedes optimization Algorithm for SRCE
K. Sathish Kumar, Sridevi Sonaimuthu, Navaneetha Rama Krishnan Alangudi Balaji, et al.
Expert Systems with Applications (2024) Vol. 255, pp. 124529-124529
Closed Access

A survey on various security protocols of edge computing
Tathagata Bhattacharya, Adithya Vardhan Peddi, Srikanth Ponaganti, et al.
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access

Enhancing Home Security with IoT Devices: A Vulnerability Analysis Using the IoT Security Test
Andrey Yu. Misailov, Neeti Mishra, Sorabh Lakhanpal, et al.
BIO Web of Conferences (2024) Vol. 86, pp. 01084-01084
Open Access

Efficient Adversarial Attack Based on Moment Estimation and Lookahead Gradient
Dian Hong, Deng Chen, Yanduo Zhang, et al.
Electronics (2024) Vol. 13, Iss. 13, pp. 2464-2464
Open Access

On the Cybersecurity of Logistics in the Age of Artificial Intelligence
Mikko Kiviharju
(2024), pp. 189-219
Closed Access

Page 1

Scroll to top