
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning
Orieb Abu Alghanam, Wesam Almobaideen, Maha Saadeh, et al.
Expert Systems with Applications (2022) Vol. 213, pp. 118745-118745
Closed Access | Times Cited: 65
Orieb Abu Alghanam, Wesam Almobaideen, Maha Saadeh, et al.
Expert Systems with Applications (2022) Vol. 213, pp. 118745-118745
Closed Access | Times Cited: 65
Showing 1-25 of 65 citing articles:
LMCA: a lightweight anomaly network traffic detection model integrating adjusted mobilenet and coordinate attention mechanism for IoT
Dezhi Han, Hongxu Zhou, Tien‐Hsiung Weng, et al.
Telecommunication Systems (2023) Vol. 84, Iss. 4, pp. 549-564
Closed Access | Times Cited: 71
Dezhi Han, Hongxu Zhou, Tien‐Hsiung Weng, et al.
Telecommunication Systems (2023) Vol. 84, Iss. 4, pp. 549-564
Closed Access | Times Cited: 71
A metaheuristic-based ensemble feature selection framework for cyber threat detection in IoT-enabled networks
Arun Kumar Dey, Govind P. Gupta, Satya Prakash Sahu
Decision Analytics Journal (2023) Vol. 7, pp. 100206-100206
Open Access | Times Cited: 40
Arun Kumar Dey, Govind P. Gupta, Satya Prakash Sahu
Decision Analytics Journal (2023) Vol. 7, pp. 100206-100206
Open Access | Times Cited: 40
A Survey on Cybersecurity in IoT
Ηλίας Δρίτσας, Μαρία Τρίγκα
Future Internet (2025) Vol. 17, Iss. 1, pp. 30-30
Open Access | Times Cited: 2
Ηλίας Δρίτσας, Μαρία Τρίγκα
Future Internet (2025) Vol. 17, Iss. 1, pp. 30-30
Open Access | Times Cited: 2
An Intrusion Detection System Using BoT-IoT
Shema Alosaimi, Saad Almutairi
Applied Sciences (2023) Vol. 13, Iss. 9, pp. 5427-5427
Open Access | Times Cited: 31
Shema Alosaimi, Saad Almutairi
Applied Sciences (2023) Vol. 13, Iss. 9, pp. 5427-5427
Open Access | Times Cited: 31
A Comprehensive Survey for IoT Security Datasets Taxonomy, Classification and Machine Learning Mechanisms
Christin Alex, Giselle Creado, Wesam Almobaideen, et al.
Computers & Security (2023) Vol. 132, pp. 103283-103283
Closed Access | Times Cited: 25
Christin Alex, Giselle Creado, Wesam Almobaideen, et al.
Computers & Security (2023) Vol. 132, pp. 103283-103283
Closed Access | Times Cited: 25
Surface defect detection methods for industrial products with imbalanced samples: A review of progress in the 2020s
Dongxu Bai, Gongfa Li, Du Jiang, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 130, pp. 107697-107697
Closed Access | Times Cited: 24
Dongxu Bai, Gongfa Li, Du Jiang, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 130, pp. 107697-107697
Closed Access | Times Cited: 24
Designing a modified feature aggregation model with hybrid sampling techniques for network intrusion detection
NarasimhaSwamy Biyyapu, Veerapaneni Esther Jyothi, Phani Praveen Surapaneni, et al.
Cluster Computing (2024) Vol. 27, Iss. 5, pp. 5913-5931
Closed Access | Times Cited: 9
NarasimhaSwamy Biyyapu, Veerapaneni Esther Jyothi, Phani Praveen Surapaneni, et al.
Cluster Computing (2024) Vol. 27, Iss. 5, pp. 5913-5931
Closed Access | Times Cited: 9
Stochastic gradient descent classifier-based lightweight intrusion detection systems using the efficient feature subsets of datasets
Jahongir Azimjonov, Taehong Kim
Expert Systems with Applications (2023) Vol. 237, pp. 121493-121493
Closed Access | Times Cited: 20
Jahongir Azimjonov, Taehong Kim
Expert Systems with Applications (2023) Vol. 237, pp. 121493-121493
Closed Access | Times Cited: 20
VBQ-Net: A Novel Vectorization-Based Boost Quantized Network Model for Maximizing the Security Level of IoT System to Prevent Intrusions
Ganeshkumar Perumal, S. Gopalakrishnan, Qaisar Abbas, et al.
Systems (2023) Vol. 11, Iss. 8, pp. 436-436
Open Access | Times Cited: 16
Ganeshkumar Perumal, S. Gopalakrishnan, Qaisar Abbas, et al.
Systems (2023) Vol. 11, Iss. 8, pp. 436-436
Open Access | Times Cited: 16
Machine learning-enabled hybrid intrusion detection system with host data transformation and an advanced two-stage classifier
Zhiyan Chen, Murat Şimşek, Burak Kantarcı, et al.
Computer Networks (2024) Vol. 250, pp. 110576-110576
Open Access | Times Cited: 5
Zhiyan Chen, Murat Şimşek, Burak Kantarcı, et al.
Computer Networks (2024) Vol. 250, pp. 110576-110576
Open Access | Times Cited: 5
A Memory Interaction Quadratic Interpolation Whale Optimization Algorithm Based on Reverse Information Correction for High-Dimensional Feature Selection
Fahui Miao, Wu Yong, Guanjie Yan, et al.
Applied Soft Computing (2024) Vol. 164, pp. 111979-111979
Closed Access | Times Cited: 5
Fahui Miao, Wu Yong, Guanjie Yan, et al.
Applied Soft Computing (2024) Vol. 164, pp. 111979-111979
Closed Access | Times Cited: 5
HYRIDE: HYbrid and Robust Intrusion DEtection Approach for Enhancing Cybersecurity in Industry 4.0
Shubham Srivastav, Amit K. Shukla, Sandeep Kumar, et al.
Internet of Things (2025), pp. 101492-101492
Open Access
Shubham Srivastav, Amit K. Shukla, Sandeep Kumar, et al.
Internet of Things (2025), pp. 101492-101492
Open Access
Cybersecurity in the AI era: analyzing the impact of machine learning on intrusion detection
Huiyao Dong, Igor Kotenko
Knowledge and Information Systems (2025)
Closed Access
Huiyao Dong, Igor Kotenko
Knowledge and Information Systems (2025)
Closed Access
Ensemble Feature Selection and Ensemble Classifiers Based Intrusion Detection Model for the Internet of Things
Arun Kumar Dey, Govind P. Gupta, Satya Prakash Sahu
Advances in intelligent systems and computing (2025), pp. 194-207
Closed Access
Arun Kumar Dey, Govind P. Gupta, Satya Prakash Sahu
Advances in intelligent systems and computing (2025), pp. 194-207
Closed Access
A comparative evaluation of intrusion detection systems on the edge-IIoT-2022 dataset
Taraf Al Nuaimi, Salama Al Zaabi, Mansor Alyilieli, et al.
Intelligent Systems with Applications (2023) Vol. 20, pp. 200298-200298
Open Access | Times Cited: 14
Taraf Al Nuaimi, Salama Al Zaabi, Mansor Alyilieli, et al.
Intelligent Systems with Applications (2023) Vol. 20, pp. 200298-200298
Open Access | Times Cited: 14
Golden jackal optimization algorithm with deep learning assisted intrusion detection system for network security
Nojood O. Aljehane, Hanan Abdullah Mengash, Majdy M. Eltahir, et al.
Alexandria Engineering Journal (2023) Vol. 86, pp. 415-424
Open Access | Times Cited: 14
Nojood O. Aljehane, Hanan Abdullah Mengash, Majdy M. Eltahir, et al.
Alexandria Engineering Journal (2023) Vol. 86, pp. 415-424
Open Access | Times Cited: 14
Real-Time Detection System for Data Exfiltration over DNS Tunneling Using Machine Learning
Orieb Abualghanam, Hadeel Alazzam, Basima Elshqeirat, et al.
Electronics (2023) Vol. 12, Iss. 6, pp. 1467-1467
Open Access | Times Cited: 12
Orieb Abualghanam, Hadeel Alazzam, Basima Elshqeirat, et al.
Electronics (2023) Vol. 12, Iss. 6, pp. 1467-1467
Open Access | Times Cited: 12
M2VT-IDS: A multi-task multi-view learning architecture for designing IoT intrusion detection system
Fengyuan Nie, Weiwei Liu, Guangjie Liu, et al.
Internet of Things (2024) Vol. 25, pp. 101102-101102
Closed Access | Times Cited: 4
Fengyuan Nie, Weiwei Liu, Guangjie Liu, et al.
Internet of Things (2024) Vol. 25, pp. 101102-101102
Closed Access | Times Cited: 4
Automated Network Intrusion Detection for Internet of Things: Security Enhancements
Louai A. Maghrabi
IEEE Access (2024) Vol. 12, pp. 30839-30851
Open Access | Times Cited: 4
Louai A. Maghrabi
IEEE Access (2024) Vol. 12, pp. 30839-30851
Open Access | Times Cited: 4
Joint IoT/ML Platforms for Smart Societies and Environments: A Review on Multimodal Information-Based Learning for Safety and Security
Hani Attar
Journal of Data and Information Quality (2023) Vol. 15, Iss. 3, pp. 1-26
Closed Access | Times Cited: 11
Hani Attar
Journal of Data and Information Quality (2023) Vol. 15, Iss. 3, pp. 1-26
Closed Access | Times Cited: 11
Hybrid VGG19 and 2D-CNN for intrusion detection in the FOG-cloud environment
Adel Binbusayyis
Expert Systems with Applications (2023) Vol. 238, pp. 121758-121758
Closed Access | Times Cited: 11
Adel Binbusayyis
Expert Systems with Applications (2023) Vol. 238, pp. 121758-121758
Closed Access | Times Cited: 11
BRL-ETDM: Bayesian reinforcement learning-based explainable threat detection model for industry 5.0 network
Arun Kumar Dey, Govind P. Gupta, Satya Prakash Sahu
Cluster Computing (2024) Vol. 27, Iss. 6, pp. 8243-8268
Closed Access | Times Cited: 3
Arun Kumar Dey, Govind P. Gupta, Satya Prakash Sahu
Cluster Computing (2024) Vol. 27, Iss. 6, pp. 8243-8268
Closed Access | Times Cited: 3
Fortifying IoT against crimpling cyber-attacks: a systematic review
Usman Tariq, Irfan Ahmed, Muhammad Attique Khan, et al.
Karbala International Journal of Modern Science (2023) Vol. 9, Iss. 4
Open Access | Times Cited: 9
Usman Tariq, Irfan Ahmed, Muhammad Attique Khan, et al.
Karbala International Journal of Modern Science (2023) Vol. 9, Iss. 4
Open Access | Times Cited: 9
A two-stage clonal selection algorithm for local feature selection on high-dimensional data
Yi Wang, Hao Tian, Tao Li, et al.
Information Sciences (2024) Vol. 677, pp. 120867-120867
Closed Access | Times Cited: 2
Yi Wang, Hao Tian, Tao Li, et al.
Information Sciences (2024) Vol. 677, pp. 120867-120867
Closed Access | Times Cited: 2
A hybrid approach using support vector machine rule-based system: detecting cyber threats in internet of things
M. Wasim Abbas Ashraf, Arvind R. Singh, A. Pandian, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 2
M. Wasim Abbas Ashraf, Arvind R. Singh, A. Pandian, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 2