
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Anomaly detection for multivariate time series in IoT using discrete wavelet decomposition and dual graph attention networks
Shujiang Xie, Lian Li, Yian Zhu
Computers & Security (2024) Vol. 146, pp. 104075-104075
Closed Access | Times Cited: 3
Shujiang Xie, Lian Li, Yian Zhu
Computers & Security (2024) Vol. 146, pp. 104075-104075
Closed Access | Times Cited: 3
Showing 3 citing articles:
Optimized detection of cyber-attacks on IoT networks via hybrid deep learning models
Ahmed Bensaoud, Jugal Kalita
Ad Hoc Networks (2025) Vol. 170, pp. 103770-103770
Open Access
Ahmed Bensaoud, Jugal Kalita
Ad Hoc Networks (2025) Vol. 170, pp. 103770-103770
Open Access
A Prediction-Based Anomaly Detection Method for Traffic Flow Data with Multi-Domain Feature Extraction
Xianguang Jia, Jinfeng Qu, Yingying Lyu, et al.
Applied Sciences (2025) Vol. 15, Iss. 6, pp. 3234-3234
Open Access
Xianguang Jia, Jinfeng Qu, Yingying Lyu, et al.
Applied Sciences (2025) Vol. 15, Iss. 6, pp. 3234-3234
Open Access
Geographical Graph Attention Networks: Spatial Deep Learning Models for Spatial Prediction and Exploratory Spatial Data Analysis
Zhenzhi Jiao, Ran Tao
Transactions in GIS (2025) Vol. 29, Iss. 2
Closed Access
Zhenzhi Jiao, Ran Tao
Transactions in GIS (2025) Vol. 29, Iss. 2
Closed Access
A parallel neural network based structural anomaly detection: Leveraging time-frequency domain features
Yingying He, Bo Yang, Weihong Jin, et al.
Neurocomputing (2025), pp. 129907-129907
Closed Access
Yingying He, Bo Yang, Weihong Jin, et al.
Neurocomputing (2025), pp. 129907-129907
Closed Access
MFT: A novel memory flow transformer efficient intrusion detection method
Xuefeng Jiang, Liuquan Xu, Yu Li, et al.
Computers & Security (2024) Vol. 148, pp. 104174-104174
Closed Access | Times Cited: 1
Xuefeng Jiang, Liuquan Xu, Yu Li, et al.
Computers & Security (2024) Vol. 148, pp. 104174-104174
Closed Access | Times Cited: 1