
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Intrusion detection in wireless sensor network using enhanced empirical based component analysis
Zhiqiang Liu, Ghulam Mohi-Ud-Din, Jiangbin Zheng, et al.
Future Generation Computer Systems (2022) Vol. 135, pp. 181-193
Closed Access | Times Cited: 26
Zhiqiang Liu, Ghulam Mohi-Ud-Din, Jiangbin Zheng, et al.
Future Generation Computer Systems (2022) Vol. 135, pp. 181-193
Closed Access | Times Cited: 26
Showing 1-25 of 26 citing articles:
Secure and privacy-preserving intrusion detection in wireless sensor networks: Federated learning with SCNN-Bi-LSTM for enhanced reliability
Syed Muhammad Salman Bukhari, Muhammad Hamza Zafar, Mohamad Abou Houran, et al.
Ad Hoc Networks (2024) Vol. 155, pp. 103407-103407
Open Access | Times Cited: 45
Syed Muhammad Salman Bukhari, Muhammad Hamza Zafar, Mohamad Abou Houran, et al.
Ad Hoc Networks (2024) Vol. 155, pp. 103407-103407
Open Access | Times Cited: 45
Firefly algorithm based WSN-IoT security enhancement with machine learning for intrusion detection
M. Karthikeyan, D. Manimegalai, Karthikeyan Rajagopal
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 35
M. Karthikeyan, D. Manimegalai, Karthikeyan Rajagopal
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 35
Cluster-based wireless sensor network framework for denial-of-service attack detection based on variable selection ensemble machine learning algorithms
Ayuba John, Ismail Fauzi Isnin, Syed Hamid Hussain Madni, et al.
Intelligent Systems with Applications (2024) Vol. 22, pp. 200381-200381
Open Access | Times Cited: 9
Ayuba John, Ismail Fauzi Isnin, Syed Hamid Hussain Madni, et al.
Intelligent Systems with Applications (2024) Vol. 22, pp. 200381-200381
Open Access | Times Cited: 9
IRADA: integrated reinforcement learning and deep learning algorithm for attack detection in wireless sensor networks
Vandana Shakya, Jaytrilok Choudhary, Dhirendra Pratap Singh
Multimedia Tools and Applications (2024) Vol. 83, Iss. 28, pp. 71559-71578
Closed Access | Times Cited: 8
Vandana Shakya, Jaytrilok Choudhary, Dhirendra Pratap Singh
Multimedia Tools and Applications (2024) Vol. 83, Iss. 28, pp. 71559-71578
Closed Access | Times Cited: 8
Enhancing cybersecurity in Edge IIoT networks: An asynchronous federated learning approach with a deep hybrid detection model
Syed Muhammad Salman Bukhari, Muhammad Hamza Zafar, Mohamad Abou Houran, et al.
Internet of Things (2024) Vol. 27, pp. 101252-101252
Open Access | Times Cited: 5
Syed Muhammad Salman Bukhari, Muhammad Hamza Zafar, Mohamad Abou Houran, et al.
Internet of Things (2024) Vol. 27, pp. 101252-101252
Open Access | Times Cited: 5
Multi level trust calculation with improved ant colony optimization for improving quality of service in wireless sensor network
Ahmed Jamal Ahmed, Ali Hashim Abbas, Sami Abduljabbar Rashid
IAES International Journal of Artificial Intelligence (2023) Vol. 12, Iss. 3, pp. 1224-1224
Open Access | Times Cited: 14
Ahmed Jamal Ahmed, Ali Hashim Abbas, Sami Abduljabbar Rashid
IAES International Journal of Artificial Intelligence (2023) Vol. 12, Iss. 3, pp. 1224-1224
Open Access | Times Cited: 14
A multi-agent-based dynamic charging strategy for UAV-assisted wireless rechargeable sensor networks
Hao Sun, Juntao Fei, Guoping Zhang, et al.
Computer Networks (2025), pp. 111081-111081
Closed Access
Hao Sun, Juntao Fei, Guoping Zhang, et al.
Computer Networks (2025), pp. 111081-111081
Closed Access
An Intrusion Detection System in WSN Using an Optimized Self-Attention-Based Progressive Generative Adversarial Network
R. Saravana Ram, A. Gopi Saminathan
IETE Journal of Research (2025), pp. 1-14
Closed Access
R. Saravana Ram, A. Gopi Saminathan
IETE Journal of Research (2025), pp. 1-14
Closed Access
FC-Trans: Deep learning methods for network intrusion detection in big data environments
Yuedi Zhu, Yong Wang, Lin Zhou, et al.
Computers & Security (2025), pp. 104392-104392
Closed Access
Yuedi Zhu, Yong Wang, Lin Zhou, et al.
Computers & Security (2025), pp. 104392-104392
Closed Access
Optimizing Intrusion Detection in Wireless Sensor Networks via the Improved Chameleon Swarm Algorithm for Feature Selection
Laith Abualigah, Mohammad H. Almomani, Saleh Ali Alomari, et al.
IET Communications (2025) Vol. 19, Iss. 1
Open Access
Laith Abualigah, Mohammad H. Almomani, Saleh Ali Alomari, et al.
IET Communications (2025) Vol. 19, Iss. 1
Open Access
Binary Chimp Optimization Algorithm with ML Based Intrusion Detection for Secure IoT-Assisted Wireless Sensor Networks
Mohammed Aljebreen, Manal Abdullah Alohali, Muhammad Kashif Saeed, et al.
Sensors (2023) Vol. 23, Iss. 8, pp. 4073-4073
Open Access | Times Cited: 10
Mohammed Aljebreen, Manal Abdullah Alohali, Muhammad Kashif Saeed, et al.
Sensors (2023) Vol. 23, Iss. 8, pp. 4073-4073
Open Access | Times Cited: 10
ENHANCED INTRUSION DETECTION MODEL BASED ON PRINCIPAL COMPONENT ANALYSIS AND VARIABLE ENSEMBLE MACHINE LEARNING ALGORITHM
Ayuba John, Ismail Fauzi Isnin, Syed Hamid Hussain Madni, et al.
Intelligent Systems with Applications (2024), pp. 200442-200442
Open Access | Times Cited: 3
Ayuba John, Ismail Fauzi Isnin, Syed Hamid Hussain Madni, et al.
Intelligent Systems with Applications (2024), pp. 200442-200442
Open Access | Times Cited: 3
An improved federated transfer learning model for intrusion detection in edge computing empowered wireless sensor networks
L. Raja, G. Sakthi, S. Vimalnath, et al.
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 24
Closed Access | Times Cited: 1
L. Raja, G. Sakthi, S. Vimalnath, et al.
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 24
Closed Access | Times Cited: 1
ADCL: Toward an Adaptive Network Intrusion Detection System Using Collaborative Learning in IoT Networks
Zuchao Ma, Liang Liu, Weizhi Meng, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 14, pp. 12521-12536
Open Access | Times Cited: 4
Zuchao Ma, Liang Liu, Weizhi Meng, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 14, pp. 12521-12536
Open Access | Times Cited: 4
Feature Selection Model using Naive Bayes ML Algorithm for WSN Intrusion Detection System
Deepa Jeevaraj, B. Karthik, T. Vijayan, et al.
International journal of electrical and computer engineering systems (2023) Vol. 14, Iss. 2, pp. 179-185
Open Access | Times Cited: 4
Deepa Jeevaraj, B. Karthik, T. Vijayan, et al.
International journal of electrical and computer engineering systems (2023) Vol. 14, Iss. 2, pp. 179-185
Open Access | Times Cited: 4
Seismic Signal Analysis Based on Variational Mode Decomposition and Hilbert Transform for Ground Intrusion Activity Classification
Yuan Sun, Dongdong Qian, Jing Zheng, et al.
Sensors (2023) Vol. 23, Iss. 7, pp. 3674-3674
Open Access | Times Cited: 4
Yuan Sun, Dongdong Qian, Jing Zheng, et al.
Sensors (2023) Vol. 23, Iss. 7, pp. 3674-3674
Open Access | Times Cited: 4
Enhanced Elman Spike Neural Network fostered intrusion detection framework for securing wireless sensor network
R. Sarath Kumar, Praveen Sampath, M. Ramkumar
Peer-to-Peer Networking and Applications (2023) Vol. 16, Iss. 4, pp. 1819-1833
Closed Access | Times Cited: 4
R. Sarath Kumar, Praveen Sampath, M. Ramkumar
Peer-to-Peer Networking and Applications (2023) Vol. 16, Iss. 4, pp. 1819-1833
Closed Access | Times Cited: 4
A Hybrid System for Integrating Cross-Correlation, DNNs and LSTMs for Enhanced Intrusion Detection System
Niharika Singh, Jay Prakash
(2024), pp. 1291-1296
Closed Access
Niharika Singh, Jay Prakash
(2024), pp. 1291-1296
Closed Access
Dynamically Stabilized Recurrent Neural Network Optimized with Intensified Sand Cat Swarm Optimization for Intrusion Detection in Wireless Sensor Network
A. Punitha, P. Ramani, P. Ezhilarasi, et al.
Computers & Security (2024) Vol. 148, pp. 104094-104094
Closed Access
A. Punitha, P. Ramani, P. Ezhilarasi, et al.
Computers & Security (2024) Vol. 148, pp. 104094-104094
Closed Access
Interrogation of Dynamic Data Loss in Long Range Wireless Sensor Networks by Utilizing CatBoost-MLGBA to Detect Anomalies and Unusual Patterns
R Kowsalya, C V Banupriya
Indian Journal of Science and Technology (2024) Vol. 16, Iss. 47, pp. 4547-4560
Open Access
R Kowsalya, C V Banupriya
Indian Journal of Science and Technology (2024) Vol. 16, Iss. 47, pp. 4547-4560
Open Access
LALP: Experimental Analysis of an Intrusion Detection System over Wireless Sensor Network using Learning Assisted Logical Protocols
P. Nirmala, M. Swarna, Rubesh Kumar T, et al.
(2024), pp. 1-8
Closed Access
P. Nirmala, M. Swarna, Rubesh Kumar T, et al.
(2024), pp. 1-8
Closed Access
Optimization of Network Intrusion Detection Model Based on Big Data Analysis
Jizhou Shan, Hong Ma
Journal of Cyber Security and Mobility (2024)
Open Access
Jizhou Shan, Hong Ma
Journal of Cyber Security and Mobility (2024)
Open Access
Comparative Study on Anomaly based Intrusion Detection using Deep Learning Techniques
S. Sabeena, S. Chitra
EAI Endorsed Transactions on Internet of Things (2024) Vol. 11
Open Access
S. Sabeena, S. Chitra
EAI Endorsed Transactions on Internet of Things (2024) Vol. 11
Open Access
Secure transmission of wireless energy-carrying communication systems for the Internet of Things
Gang Zhou, Mingyang Peng, Yan Li, et al.
Applied Mathematics and Nonlinear Sciences (2023) Vol. 8, Iss. 1, pp. 3135-3148
Open Access | Times Cited: 1
Gang Zhou, Mingyang Peng, Yan Li, et al.
Applied Mathematics and Nonlinear Sciences (2023) Vol. 8, Iss. 1, pp. 3135-3148
Open Access | Times Cited: 1
A novel deep learning based security assessment framework for enhanced security in swarm network environment
Zhiqiang Liu, Ghulam Mohi-Ud-Din, Jiangbin Zheng, et al.
International Journal of Critical Infrastructure Protection (2022) Vol. 38, pp. 100540-100540
Closed Access | Times Cited: 2
Zhiqiang Liu, Ghulam Mohi-Ud-Din, Jiangbin Zheng, et al.
International Journal of Critical Infrastructure Protection (2022) Vol. 38, pp. 100540-100540
Closed Access | Times Cited: 2