
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Deep learning enabled intrusion detection system for Industrial IOT environment
Himanshu Nandanwar, Rahul Katarya
Expert Systems with Applications (2024) Vol. 249, pp. 123808-123808
Closed Access | Times Cited: 27
Himanshu Nandanwar, Rahul Katarya
Expert Systems with Applications (2024) Vol. 249, pp. 123808-123808
Closed Access | Times Cited: 27
Showing 1-25 of 27 citing articles:
A novel deep learning-based intrusion detection system for IoT DDoS security
Selman Hızal, Ünal Çavuşoğlu, Devrim Akgün
Internet of Things (2024) Vol. 28, pp. 101336-101336
Closed Access | Times Cited: 7
Selman Hızal, Ünal Çavuşoğlu, Devrim Akgün
Internet of Things (2024) Vol. 28, pp. 101336-101336
Closed Access | Times Cited: 7
Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, Threats, and Future Directions
Tamara Zhukabayeva, Lazzat Zholshiyeva, Nurdaulet Karabayev, et al.
Sensors (2025) Vol. 25, Iss. 1, pp. 213-213
Open Access
Tamara Zhukabayeva, Lazzat Zholshiyeva, Nurdaulet Karabayev, et al.
Sensors (2025) Vol. 25, Iss. 1, pp. 213-213
Open Access
CO-STOP: A Robust P4-Powered Adaptive Framework for Comprehensive Detection and Mitigation of Coordinated and Multi-Faceted Attacks in SD-IoT Networks
Ameer El-Sayed, Ahmed A. Toony, Fayez Alqahtani, et al.
Computers & Security (2025), pp. 104349-104349
Closed Access
Ameer El-Sayed, Ahmed A. Toony, Fayez Alqahtani, et al.
Computers & Security (2025), pp. 104349-104349
Closed Access
FP-growth-based signature extraction and unknown variants of DoS/DDoS attack detection on real-time data stream
Arpita Srivastava, Ditipriya Sinha
Journal of Information Security and Applications (2025) Vol. 89, pp. 103996-103996
Closed Access
Arpita Srivastava, Ditipriya Sinha
Journal of Information Security and Applications (2025) Vol. 89, pp. 103996-103996
Closed Access
Application of deep reinforcement learning for intrusion detection in Internet of Things: A systematic review
Saeid Jamshidi, Amin Nikanjam, Kawser Wazed Nafi, et al.
Internet of Things (2025), pp. 101531-101531
Closed Access
Saeid Jamshidi, Amin Nikanjam, Kawser Wazed Nafi, et al.
Internet of Things (2025), pp. 101531-101531
Closed Access
Evolutionary LightGBM‐Based Intrusion Detection System for IoT Networks
Khushi Singal, Nisha Kandhoul, Sanjay K. Dhurander
International Journal of Communication Systems (2025) Vol. 38, Iss. 5
Closed Access
Khushi Singal, Nisha Kandhoul, Sanjay K. Dhurander
International Journal of Communication Systems (2025) Vol. 38, Iss. 5
Closed Access
Securing Industry 5.0: An explainable deep learning model for intrusion detection in cyber-physical systems
Himanshu Nandanwar, Rahul Katarya
Computers & Electrical Engineering (2025) Vol. 123, pp. 110161-110161
Closed Access
Himanshu Nandanwar, Rahul Katarya
Computers & Electrical Engineering (2025) Vol. 123, pp. 110161-110161
Closed Access
EnterpriseAI: A Transformer-Based Framework for Cost Optimization and Process Enhancement in Enterprise Systems
Shyam Bhaskaran
Computers (2025) Vol. 14, Iss. 3, pp. 106-106
Open Access
Shyam Bhaskaran
Computers (2025) Vol. 14, Iss. 3, pp. 106-106
Open Access
MULTI-BLOCK: A novel ML-based intrusion detection framework for SDN-enabled IoT networks using new pyramidal structure
Ahmed A. Toony, Fayez Alqahtani, Yasser M. Alginahi, et al.
Internet of Things (2024) Vol. 26, pp. 101231-101231
Closed Access | Times Cited: 3
Ahmed A. Toony, Fayez Alqahtani, Yasser M. Alginahi, et al.
Internet of Things (2024) Vol. 26, pp. 101231-101231
Closed Access | Times Cited: 3
Deep learning-empowered intrusion detection framework for the Internet of Medical Things environment
Prashant Giridhar Shambharkar, Nikhil Sharma
Knowledge and Information Systems (2024) Vol. 66, Iss. 10, pp. 6001-6050
Closed Access | Times Cited: 3
Prashant Giridhar Shambharkar, Nikhil Sharma
Knowledge and Information Systems (2024) Vol. 66, Iss. 10, pp. 6001-6050
Closed Access | Times Cited: 3
Towards intrusion detection in fog environments using generative adversarial network and long short-term memory network
Aiyan Qu, Qiuhui Shen, Gholamreza Ahmadi
Computers & Security (2024) Vol. 145, pp. 104004-104004
Closed Access | Times Cited: 3
Aiyan Qu, Qiuhui Shen, Gholamreza Ahmadi
Computers & Security (2024) Vol. 145, pp. 104004-104004
Closed Access | Times Cited: 3
Against network attacks in renewable power plants: Malicious behavior defense for federated learning
Xiaodong Wu, Zhigang Jin, Junyi Zhou, et al.
Computer Networks (2024) Vol. 250, pp. 110577-110577
Closed Access | Times Cited: 1
Xiaodong Wu, Zhigang Jin, Junyi Zhou, et al.
Computer Networks (2024) Vol. 250, pp. 110577-110577
Closed Access | Times Cited: 1
Optimization of Intrusion Detection with Deep Learning: A Study Based on the KDD Cup 99 Database
Agalit Mohamed Amine, Youness Idrissi Khamlichi
International Journal of Safety and Security Engineering (2024) Vol. 14, Iss. 4, pp. 1029-1038
Open Access | Times Cited: 1
Agalit Mohamed Amine, Youness Idrissi Khamlichi
International Journal of Safety and Security Engineering (2024) Vol. 14, Iss. 4, pp. 1029-1038
Open Access | Times Cited: 1
Evaluating the cost of classifier discrimination choices for IoT sensor attack detection
Mathew Nicho, Brian Cusack, Shini Girija, et al.
International Journal of Computers and Applications (2024), pp. 1-12
Open Access | Times Cited: 1
Mathew Nicho, Brian Cusack, Shini Girija, et al.
International Journal of Computers and Applications (2024), pp. 1-12
Open Access | Times Cited: 1
DDoS Attacks Detection based on Machine Learning Algorithms in IoT Environments
Mehdi Ebady Manaa, Saba M. Hussain, Suad A. Alasadi, et al.
INTELIGENCIA ARTIFICIAL (2024) Vol. 27, Iss. 74, pp. 152-165
Open Access | Times Cited: 1
Mehdi Ebady Manaa, Saba M. Hussain, Suad A. Alasadi, et al.
INTELIGENCIA ARTIFICIAL (2024) Vol. 27, Iss. 74, pp. 152-165
Open Access | Times Cited: 1
AI for AI-based intrusion detection as a service: Reinforcement learning to configure models, tasks, and capacities
Ying‐Dar Lin, Hao-Xuan Huang, Didik Sudyana, et al.
Journal of Network and Computer Applications (2024) Vol. 229, pp. 103936-103936
Closed Access
Ying‐Dar Lin, Hao-Xuan Huang, Didik Sudyana, et al.
Journal of Network and Computer Applications (2024) Vol. 229, pp. 103936-103936
Closed Access
Integrating CNN-LSTM Networks with Statistical Filtering Techniques for Intelligent IoT Intrusion Detection
Fatemeh Imani, Masoud Kargar, Alireza Assadzadeh, et al.
(2024), pp. 189-195
Closed Access
Fatemeh Imani, Masoud Kargar, Alireza Assadzadeh, et al.
(2024), pp. 189-195
Closed Access
Multi-scale hierarchical model for long-term time series forecasting
Jie Xu, Luo Jia Zhang, De Chun Zhao, et al.
Intelligent Data Analysis (2024), pp. 1-23
Closed Access
Jie Xu, Luo Jia Zhang, De Chun Zhao, et al.
Intelligent Data Analysis (2024), pp. 1-23
Closed Access
Analysis of machine learning-based approaches for securing the Internet of Things in the smart industry: a multivocal state of knowledge review
Ricardo Emmanuel Reyes-Acosta, Carlos-Alberto Domínguez-Báez, Ricardo Mendoza-González, et al.
International Journal of Information Security (2024) Vol. 24, Iss. 1
Closed Access
Ricardo Emmanuel Reyes-Acosta, Carlos-Alberto Domínguez-Báez, Ricardo Mendoza-González, et al.
International Journal of Information Security (2024) Vol. 24, Iss. 1
Closed Access
Enhancing IoT Security: A Comparative Analysis of Hybrid Hyperparameter Optimization for Deep Learning-Based Intrusion Detection Systems
H. Asadi, Mahmood Alborzi, Hessam Zandhessami
Journal of Information Systems and Telecommunication (JIST) (2024) Vol. 12, Iss. 47, pp. 183-196
Closed Access
H. Asadi, Mahmood Alborzi, Hessam Zandhessami
Journal of Information Systems and Telecommunication (JIST) (2024) Vol. 12, Iss. 47, pp. 183-196
Closed Access
Dual-path feature extraction based hybrid intrusion detection in IoT networks
Arun Kumar Silivery, K. Ram Mohan Rao, Ramana Solleti
Computers & Electrical Engineering (2024) Vol. 122, pp. 109949-109949
Closed Access
Arun Kumar Silivery, K. Ram Mohan Rao, Ramana Solleti
Computers & Electrical Engineering (2024) Vol. 122, pp. 109949-109949
Closed Access
FFL-IDS: A Fog-Enabled Federated Learning-Based Intrusion Detection System to Counter Jamming and Spoofing Attacks for the Industrial Internet of Things
Tayyab Rehman, Noshina Tariq, Farrukh Aslam Khan, et al.
Sensors (2024) Vol. 25, Iss. 1, pp. 10-10
Open Access
Tayyab Rehman, Noshina Tariq, Farrukh Aslam Khan, et al.
Sensors (2024) Vol. 25, Iss. 1, pp. 10-10
Open Access
Optimal Hybrid Deep Belief Networks based Cyberattack Detection in Blockchain Assisted Internet of Things Environment
G. Murugesan, P. Maheswaravenkatesh, Zayd Ajzan Salami, et al.
(2024), pp. 1-5
Closed Access
G. Murugesan, P. Maheswaravenkatesh, Zayd Ajzan Salami, et al.
(2024), pp. 1-5
Closed Access
FIDWATCH: Federated Incremental Distillation for Continuous Monitoring of IoT Security Threats
Ibrahim Alrashdi, Karam M. Sallam, Majed Abdullah Alrowaily, et al.
Ad Hoc Networks (2024) Vol. 165, pp. 103637-103637
Closed Access
Ibrahim Alrashdi, Karam M. Sallam, Majed Abdullah Alrowaily, et al.
Ad Hoc Networks (2024) Vol. 165, pp. 103637-103637
Closed Access
A Novel Elm Optimization and Its Application in IoT Intrusion Detection
Elijah M. Maseno, Zenghui Wang
Communications in computer and information science (2024), pp. 202-216
Closed Access
Elijah M. Maseno, Zenghui Wang
Communications in computer and information science (2024), pp. 202-216
Closed Access