
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
DivaCAN: Detecting in-vehicle intrusion attacks on a controller area network using ensemble learning
Muneeb Hassan Khan, Abdul Rehman Javed, Zafar Iqbal, et al.
Computers & Security (2024) Vol. 139, pp. 103712-103712
Closed Access | Times Cited: 14
Muneeb Hassan Khan, Abdul Rehman Javed, Zafar Iqbal, et al.
Computers & Security (2024) Vol. 139, pp. 103712-103712
Closed Access | Times Cited: 14
Showing 14 citing articles:
Multiple Intrusion Detection Using Shapley Additive Explanations and a Heterogeneous Ensemble Model in an Unmanned Aerial Vehicle’s Controller Area Network
Young-Woo Hong, Dong-Young Yoo
Applied Sciences (2024) Vol. 14, Iss. 13, pp. 5487-5487
Open Access | Times Cited: 12
Young-Woo Hong, Dong-Young Yoo
Applied Sciences (2024) Vol. 14, Iss. 13, pp. 5487-5487
Open Access | Times Cited: 12
Network and cybersecurity applications of defense in adversarial attacks: A state-of-the-art using machine learning and deep learning methods
Yahya Layth Khaleel, Mustafa Abdulfattah Habeeb, A. S. Albahri, et al.
Journal of Intelligent Systems (2024) Vol. 33, Iss. 1
Open Access | Times Cited: 9
Yahya Layth Khaleel, Mustafa Abdulfattah Habeeb, A. S. Albahri, et al.
Journal of Intelligent Systems (2024) Vol. 33, Iss. 1
Open Access | Times Cited: 9
Meta-IDS: Meta-Learning-Based Smart Intrusion Detection System for Internet of Medical Things (IoMT) Network
Umer Zukaib, Xiaohui Cui, Chengliang Zheng, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 13, pp. 23080-23095
Closed Access | Times Cited: 8
Umer Zukaib, Xiaohui Cui, Chengliang Zheng, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 13, pp. 23080-23095
Closed Access | Times Cited: 8
SIDiLDNG: A similarity-based intrusion detection system using improved Levenshtein Distance and N-gram for CAN
Jiaru Song, Guihe Qin, Yanhua Liang, et al.
Computers & Security (2024) Vol. 142, pp. 103847-103847
Closed Access | Times Cited: 6
Jiaru Song, Guihe Qin, Yanhua Liang, et al.
Computers & Security (2024) Vol. 142, pp. 103847-103847
Closed Access | Times Cited: 6
Open-set security authentication: A novel CAN-bus recognition algorithm based on metric learning
Caidan Zhao, Wenxin Hu, Yilin Wang, et al.
Computers & Electrical Engineering (2025) Vol. 123, pp. 110209-110209
Closed Access
Caidan Zhao, Wenxin Hu, Yilin Wang, et al.
Computers & Electrical Engineering (2025) Vol. 123, pp. 110209-110209
Closed Access
Enhancing IoT security through boosting and feature reduction techniques for multiclass intrusion detection
Abderahmane Hamdouchi, Ali Idri
Neural Computing and Applications (2025)
Closed Access
Abderahmane Hamdouchi, Ali Idri
Neural Computing and Applications (2025)
Closed Access
Intrusion Detection System for Vehicular Networks Based on MobileNetV3
Shaoqiang Wang, Y. Wang, Baosen Zheng, et al.
IEEE Access (2024) Vol. 12, pp. 106285-106302
Open Access | Times Cited: 1
Shaoqiang Wang, Y. Wang, Baosen Zheng, et al.
IEEE Access (2024) Vol. 12, pp. 106285-106302
Open Access | Times Cited: 1
A Novel Light-Weight Machine Learning Classifier for Intrusion Detection in Controller Area Network in Smart Cars
Anila Kousar, Saeed Ahmed, Abdullah Altamimi, et al.
Smart Cities (2024) Vol. 7, Iss. 6, pp. 3289-3314
Open Access | Times Cited: 1
Anila Kousar, Saeed Ahmed, Abdullah Altamimi, et al.
Smart Cities (2024) Vol. 7, Iss. 6, pp. 3289-3314
Open Access | Times Cited: 1
A Survey on Intrusion Detection System in IoT Networks
Md. Mahbubur Rahman, Shaharia Al Shakil, Maimunah Mustakim
Cyber Security and Applications (2024) Vol. 3, pp. 100082-100082
Open Access | Times Cited: 1
Md. Mahbubur Rahman, Shaharia Al Shakil, Maimunah Mustakim
Cyber Security and Applications (2024) Vol. 3, pp. 100082-100082
Open Access | Times Cited: 1
Design and Verification Test of T-Box Based on Lightweight Dynamic Heterogeneous Redundant Environment
J Zhang, Zhen Zhang, Yabin Peng, et al.
(2024)
Closed Access
J Zhang, Zhen Zhang, Yabin Peng, et al.
(2024)
Closed Access
Enhancing CAN-FD Security with an Ensemble Learning Approach for Intrusion Detection
M. S. Sreelekshmi, S. Aji
(2024), pp. 1-6
Closed Access
M. S. Sreelekshmi, S. Aji
(2024), pp. 1-6
Closed Access
In-Vehicle Communication Cyber Security: A Comprehensive Review of Challenges and Solutions
Batuhan Gül, Fatih Ertam
Vehicular Communications (2024), pp. 100846-100846
Closed Access
Batuhan Gül, Fatih Ertam
Vehicular Communications (2024), pp. 100846-100846
Closed Access
Um Framework Gerador de Tráfego para Detecção de Intrusões em Redes CAN
F. Luiz, Paulo Sérgio M. Vargas, Paulo Vitor C. Lima, et al.
(2024), pp. 871-877
Closed Access
F. Luiz, Paulo Sérgio M. Vargas, Paulo Vitor C. Lima, et al.
(2024), pp. 871-877
Closed Access
Review of Monitoring and Control Systems Based on Internet of Things
Dawid Witczak, Sabina Szymoniak
Applied Sciences (2024) Vol. 14, Iss. 19, pp. 8943-8943
Open Access
Dawid Witczak, Sabina Szymoniak
Applied Sciences (2024) Vol. 14, Iss. 19, pp. 8943-8943
Open Access
An ensemble system for machine learning IoT intrusion detection based on enhanced artificial hummingbird algorithm
Leyi Shi, Qihang Yang, Lin Gao, et al.
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access
Leyi Shi, Qihang Yang, Lin Gao, et al.
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access
Automotive Cybersecurity Scheme for Intrusion Detection in CAN ‐Driven Artificial Intelligence of Things
Gagan Dangwal, Mohammad Wazid, Sarah Nizam, et al.
Security and Privacy (2024) Vol. 8, Iss. 1
Closed Access
Gagan Dangwal, Mohammad Wazid, Sarah Nizam, et al.
Security and Privacy (2024) Vol. 8, Iss. 1
Closed Access