OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

RepuTE: A soft voting ensemble learning framework for reputation-based attack detection in fog-IoT milieu
Richa Verma, Shalini Chandra
Engineering Applications of Artificial Intelligence (2022) Vol. 118, pp. 105670-105670
Closed Access | Times Cited: 27

Showing 1-25 of 27 citing articles:

Intelligent Fog Computing Surveillance System for Crime and Vulnerability Identification and Tracing
Romil Rawat, Rajesh Kumar Chakrawarti, Piyush Vyas, et al.
International Journal of Information Security and Privacy (2023) Vol. 17, Iss. 1, pp. 1-25
Open Access | Times Cited: 66

IoT-Based Intrusion Detection System Using New Hybrid Deep Learning Algorithm
Sami Yaras, Murat Dener
Electronics (2024) Vol. 13, Iss. 6, pp. 1053-1053
Open Access | Times Cited: 22

A systematic review and meta-analysis of artificial neural network, machine learning, deep learning, and ensemble learning approaches in field of geotechnical engineering
Elaheh Yaghoubi, Elnaz Yaghoubi, Ahmed A. Khamees, et al.
Neural Computing and Applications (2024) Vol. 36, Iss. 21, pp. 12655-12699
Open Access | Times Cited: 18

A comprehensive and systematic literature review on intrusion detection systems in the internet of medical things: current status, challenges, and opportunities
Arezou Naghib, Farhad Soleimanian Gharehchopogh, Azadeh Zamanifar
Artificial Intelligence Review (2025) Vol. 58, Iss. 4
Open Access | Times Cited: 1

Enhanced Grey Wolf Optimization (EGWO) and random forest based mechanism for intrusion detection in IoT networks
Saad Said Alqahtany, Asadullah Shaikh, Ali Alqazzaz
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access

ALLC: autonomous lightweight distributed ledger constructor for securing IoT information
Mohamed A. Abo-Soliman, Eman Shaaban, Karim Emara
Computing (2025) Vol. 107, Iss. 3
Open Access

Credit Card Fraud Detection: An Improved Strategy for High Recall Using KNN, LDA, and Linear Regression
Jiwon Chung, Kyungho Lee
Sensors (2023) Vol. 23, Iss. 18, pp. 7788-7788
Open Access | Times Cited: 12

PhiUSIIL: A diverse security profile empowered phishing URL detection framework based on similarity index and incremental learning
Arvind Prasad, Shalini Chandra
Computers & Security (2023) Vol. 136, pp. 103545-103545
Closed Access | Times Cited: 12

A stacked ensemble approach to detect cyber attacks based on feature selection techniques
Wahida Ferdose Urmi, Mohammed Nasir Uddin, Md Ashraf Uddin, et al.
International Journal of Cognitive Computing in Engineering (2024) Vol. 5, pp. 316-331
Open Access | Times Cited: 4

Securing IoT With Deep Federated Learning: A Trust-Based Malicious Node Identification Approach
Kamran Ahmad Awan, Ikram Ud Din, Mahdi Zareei, et al.
IEEE Access (2023) Vol. 11, pp. 58901-58914
Open Access | Times Cited: 8

Enhancing trustworthiness among iot network nodes with ensemble deep learning-based cyber attack detection
D. Malathi, S. Razool Begum
Expert Systems with Applications (2024) Vol. 255, pp. 124528-124528
Closed Access | Times Cited: 2

OPTIMIZATION ACCURACY VALUE OF AGRICULTURAL LAND FERTILITY CLASSIFICATION USING SOFT VOTING METHOD
Khaliq Pradana, Fikri Budiman
SinkrOn (2024) Vol. 9, Iss. 1, pp. 152-164
Open Access | Times Cited: 1

Enhancing IoT Security With Trust Management Using Ensemble XGBoost and AdaBoost Techniques
Kamran Ahmad Awan, Ikram Ud Din, Ahmad Almogren, et al.
IEEE Access (2024) Vol. 12, pp. 116609-116621
Open Access | Times Cited: 1

A two-way trust routing scheme to improve security in fog computing environment
Jun Wang, Ze Luo, Chenglong Wang
Cluster Computing (2024) Vol. 27, Iss. 9, pp. 13165-13185
Closed Access | Times Cited: 1

An SDN-based Hybrid-DL-driven cognitive intrusion detection system for IoT ecosystem
Fazal Wahab, Anwar Shah, Imran Khan, et al.
Computers & Electrical Engineering (2024) Vol. 119, pp. 109545-109545
Closed Access | Times Cited: 1

An Advanced Prediction Model for Risk Assessment of Imported Food
D. Lee, E. Lee, Soon Ho Kwon, et al.
Lecture notes in networks and systems (2024), pp. 380-385
Closed Access | Times Cited: 1

Trust Management System for Hybrid Industrial Blockchains
Fatemeh Stodt, Christoph Reich, Axel Sikora, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 2

A collaborative prediction approach to defend against amplified reflection and exploitation attacks
Arvind Prasad, Shalini Chandra, Ibrahim A. Atoum, et al.
Electronic Research Archive (2023) Vol. 31, Iss. 10, pp. 6045-6070
Open Access | Times Cited: 2

3DLBS-BCHO: a three-dimensional deep learning approach based on branch splitter and binary chimp optimization for intrusion detection in IoT
Roya Zareh Farkhady, Kambiz Majidzadeh, Mohammad Masdari, et al.
Cluster Computing (2024) Vol. 28, Iss. 2
Closed Access

MSD-CDRL: A generic fusion detection framework for logic covert attack towards cyber-physical system security
Lianpeng Li, Siyuan Liu
Journal of Information Security and Applications (2024) Vol. 89, pp. 103947-103947
Closed Access

Firefly-Driven Feature Selection for Enhanced DDoS Detection in IoT Networks
Mohith Suggala, Hari Seetha, Seshu Bhavani Mallampati
2021 International Conference on Emerging Smart Computing and Informatics (ESCI) (2024), pp. 1-6
Closed Access

Lightweight Cryptography Based Secured Data Transmission Model for Quality of Service in Internet of Things-A Comparative Analysis
Srilakshmi Puli, N. Srinivasu
International Journal of Safety and Security Engineering (2024) Vol. 14, Iss. 4, pp. 1279-1291
Open Access

A robust detection scheme against selective forwarding attacks in wireless sensor networks under variable harsh environments
Liu Lili, Yilun Ma, Yuanming Wu
Engineering Applications of Artificial Intelligence (2024) Vol. 138, pp. 109392-109392
Closed Access

Deep ensemble learning for high-dimensional subsurface fluid flow modeling
Abouzar Choubineh, Jie Chen, David A. Wood, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 126, pp. 106968-106968
Open Access | Times Cited: 1

Page 1 - Next Page

Scroll to top