
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Fed-Inforce-Fusion: A federated reinforcement-based fusion model for security and privacy protection of IoMT networks against cyber-attacks
Izhar Ahmed Khan, Imran Razzak, Dechang Pi, et al.
Information Fusion (2023) Vol. 101, pp. 102002-102002
Open Access | Times Cited: 25
Izhar Ahmed Khan, Imran Razzak, Dechang Pi, et al.
Information Fusion (2023) Vol. 101, pp. 102002-102002
Open Access | Times Cited: 25
Showing 25 citing articles:
Blockchain security enhancement: an approach towards hybrid consensus algorithms and machine learning techniques
K. Venkatesan, Syarifah Bahiyah Rahayu
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 37
K. Venkatesan, Syarifah Bahiyah Rahayu
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 37
MLSTL-WSN: machine learning-based intrusion detection using SMOTETomek in WSNs
Md. Alamin Talukder, Selina Sharmin, Md Ashraf Uddin, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 2139-2158
Open Access | Times Cited: 22
Md. Alamin Talukder, Selina Sharmin, Md Ashraf Uddin, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 2139-2158
Open Access | Times Cited: 22
A Comparative Study of Anomaly Detection Techniques for IoT Security Using Adaptive Machine Learning for IoT Threats
Dheyaaldin Alsalman
IEEE Access (2024) Vol. 12, pp. 14719-14730
Open Access | Times Cited: 10
Dheyaaldin Alsalman
IEEE Access (2024) Vol. 12, pp. 14719-14730
Open Access | Times Cited: 10
WFE-Tab: Overcoming limitations of TabPFN in IIoT-MEC environments with a weighted fusion ensemble-TabPFN model for improved IDS performance
Sergio Ruiz-Villafranca, José Roldán-Gómez, Javier Carrillo-Mondéjar, et al.
Future Generation Computer Systems (2025), pp. 107707-107707
Closed Access
Sergio Ruiz-Villafranca, José Roldán-Gómez, Javier Carrillo-Mondéjar, et al.
Future Generation Computer Systems (2025), pp. 107707-107707
Closed Access
Securing the Future of IoMT
S. Satheesh Kumar, V. Muthukumaran, Sai Jahnavi, et al.
Advances in healthcare information systems and administration book series (2025), pp. 191-216
Closed Access
S. Satheesh Kumar, V. Muthukumaran, Sai Jahnavi, et al.
Advances in healthcare information systems and administration book series (2025), pp. 191-216
Closed Access
Advanced artificial intelligence with federated learning framework for privacy-preserving cyberthreat detection in IoT-assisted sustainable smart cities
Mahmoud Ragab, Ehab Bahaudien Ashary, Bandar M. Alghamdi, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Mahmoud Ragab, Ehab Bahaudien Ashary, Bandar M. Alghamdi, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Analysis of convolutional-based variational autoencoders for privacy protection in realtime video surveillance
Mallepogu Sivalakshmi, K. Rajendra Prasad, C. Shoba Bindu
Expert Systems with Applications (2025), pp. 126817-126817
Closed Access
Mallepogu Sivalakshmi, K. Rajendra Prasad, C. Shoba Bindu
Expert Systems with Applications (2025), pp. 126817-126817
Closed Access
Cyber Security in Healthcare Systems: A Review of Tools and Attack Mitigation Techniques
Kousik Barik, Sanjay Misra, Sabarathinam Chockalingam
Communications in computer and information science (2025), pp. 87-105
Closed Access
Kousik Barik, Sanjay Misra, Sabarathinam Chockalingam
Communications in computer and information science (2025), pp. 87-105
Closed Access
Big-IDS: a decentralized multi agent reinforcement learning approach for distributed intrusion detection in big data networks
Faten Louati, Farah Barika Ktata, Ikram Amous
Cluster Computing (2024) Vol. 27, Iss. 5, pp. 6823-6841
Closed Access | Times Cited: 4
Faten Louati, Farah Barika Ktata, Ikram Amous
Cluster Computing (2024) Vol. 27, Iss. 5, pp. 6823-6841
Closed Access | Times Cited: 4
A data-driven multi-perspective approach to cybersecurity knowledge discovery through topic modelling
Fahad Alqurashi, Istiak Ahmad
Alexandria Engineering Journal (2024) Vol. 107, pp. 374-389
Open Access | Times Cited: 4
Fahad Alqurashi, Istiak Ahmad
Alexandria Engineering Journal (2024) Vol. 107, pp. 374-389
Open Access | Times Cited: 4
Blockchain-Integrated Security for Real-Time Patient Monitoring in the Internet of Medical Things Using Federated Learning
Mohammad Faisal Khan, Mohammad Abaoud
IEEE Access (2023) Vol. 11, pp. 117826-117850
Open Access | Times Cited: 10
Mohammad Faisal Khan, Mohammad Abaoud
IEEE Access (2023) Vol. 11, pp. 117826-117850
Open Access | Times Cited: 10
BFLIDS: Blockchain-Driven Federated Learning for Intrusion Detection in IoMT Networks
Khadija Begum, Md Ariful Islam Mozumder, Moon-Il Joo, et al.
Sensors (2024) Vol. 24, Iss. 14, pp. 4591-4591
Open Access | Times Cited: 3
Khadija Begum, Md Ariful Islam Mozumder, Moon-Il Joo, et al.
Sensors (2024) Vol. 24, Iss. 14, pp. 4591-4591
Open Access | Times Cited: 3
DeepDeter: Strengthening Cybersecurity Against DoS Attacks with Deep Learning
Vanshika Pahuja, Sharad Shyam Ojha
(2024), pp. 1-6
Closed Access | Times Cited: 2
Vanshika Pahuja, Sharad Shyam Ojha
(2024), pp. 1-6
Closed Access | Times Cited: 2
Data fusion and network intrusion detection systems
Rasheed Ahmad, Izzat Alsmadi
Cluster Computing (2024) Vol. 27, Iss. 6, pp. 7493-7519
Closed Access | Times Cited: 1
Rasheed Ahmad, Izzat Alsmadi
Cluster Computing (2024) Vol. 27, Iss. 6, pp. 7493-7519
Closed Access | Times Cited: 1
LSF-IDM: Deep learning-based lightweight semantic fusion intrusion detection model for automotive
Pengzhou Cheng, Lei Hua, Haobin Jiang, et al.
Peer-to-Peer Networking and Applications (2024)
Closed Access | Times Cited: 1
Pengzhou Cheng, Lei Hua, Haobin Jiang, et al.
Peer-to-Peer Networking and Applications (2024)
Closed Access | Times Cited: 1
A context-aware zero trust-based hybrid approach to IoT-based self-driving vehicles security
Izhar Ahmed Khan, Marwa Keshk, Yasir Hussain, et al.
Ad Hoc Networks (2024), pp. 103694-103694
Closed Access | Times Cited: 1
Izhar Ahmed Khan, Marwa Keshk, Yasir Hussain, et al.
Ad Hoc Networks (2024), pp. 103694-103694
Closed Access | Times Cited: 1
Advancement and Development of Graph-Based Reasoning Method for Human Malicious Behaviors Identification Based on Graph Contrastive Representation Learning
Zhan Li, Xingyu Song, Shi Chen, et al.
(2024)
Closed Access
Zhan Li, Xingyu Song, Shi Chen, et al.
(2024)
Closed Access
Privacy-Preserving Federated Learning-Based Intrusion Detection System for IoHT Devices
Fatemeh Mosaiyebzadeh, Seyedamin Pouriyeh, Meng Han, et al.
Electronics (2024) Vol. 14, Iss. 1, pp. 67-67
Open Access
Fatemeh Mosaiyebzadeh, Seyedamin Pouriyeh, Meng Han, et al.
Electronics (2024) Vol. 14, Iss. 1, pp. 67-67
Open Access
Advancing IoT security: a comprehensive AI-based trust framework for intrusion detection
Chandra Prabha Kaliappan, Kanmani Palaniappan, Devipriya Ananthavadivel, et al.
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 5, pp. 2737-2757
Closed Access
Chandra Prabha Kaliappan, Kanmani Palaniappan, Devipriya Ananthavadivel, et al.
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 5, pp. 2737-2757
Closed Access
Security and Privacy Measures to Protect Machine Learning in Medical Applications
Rashi Singh, Ruchika, Jyoti Joshi, et al.
(2024), pp. 641-646
Closed Access
Rashi Singh, Ruchika, Jyoti Joshi, et al.
(2024), pp. 641-646
Closed Access
RCLNet: an effective anomaly-based intrusion detection for securing the IoMT system
Jamshed Ali Shaikh, Chengliang Wang, Wajeeh Us Sima Muhammad, et al.
Frontiers in Digital Health (2024) Vol. 6
Open Access
Jamshed Ali Shaikh, Chengliang Wang, Wajeeh Us Sima Muhammad, et al.
Frontiers in Digital Health (2024) Vol. 6
Open Access
Ensuring patient safety in IoMT: A systematic literature review of behavior-based intrusion detection systems
Jordi Doménech, Isabel V. Martin-Faus, Saber Mhiri, et al.
Internet of Things (2024) Vol. 28, pp. 101420-101420
Open Access
Jordi Doménech, Isabel V. Martin-Faus, Saber Mhiri, et al.
Internet of Things (2024) Vol. 28, pp. 101420-101420
Open Access
Cyber-Attack Detection in Healthcare Systems Based on Modified -Recurrent Neural Network Approach
Pradeep Chintale, Thomas Sure, Fardin Quazi, et al.
Communications in computer and information science (2024), pp. 213-224
Closed Access
Pradeep Chintale, Thomas Sure, Fardin Quazi, et al.
Communications in computer and information science (2024), pp. 213-224
Closed Access
Access Control for Secure Remote Patient Monitoring
Asifa Shahbaz, Guiyan Ni, Zihao Tian, et al.
Lecture notes in electrical engineering (2024), pp. 127-141
Closed Access
Asifa Shahbaz, Guiyan Ni, Zihao Tian, et al.
Lecture notes in electrical engineering (2024), pp. 127-141
Closed Access
A Review on Advancing Cybersecurity Frameworks by Integrating Machine Intelligence with Federated Learning
Vaibhavi Patil, Jhankar Moolchandani, Ashutosh Kumar Dubey
(2024), pp. 180-187
Closed Access
Vaibhavi Patil, Jhankar Moolchandani, Ashutosh Kumar Dubey
(2024), pp. 180-187
Closed Access