OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Fed-Inforce-Fusion: A federated reinforcement-based fusion model for security and privacy protection of IoMT networks against cyber-attacks
Izhar Ahmed Khan, Imran Razzak, Dechang Pi, et al.
Information Fusion (2023) Vol. 101, pp. 102002-102002
Open Access | Times Cited: 25

Showing 25 citing articles:

Blockchain security enhancement: an approach towards hybrid consensus algorithms and machine learning techniques
K. Venkatesan, Syarifah Bahiyah Rahayu
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 37

MLSTL-WSN: machine learning-based intrusion detection using SMOTETomek in WSNs
Md. Alamin Talukder, Selina Sharmin, Md Ashraf Uddin, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 2139-2158
Open Access | Times Cited: 22

WFE-Tab: Overcoming limitations of TabPFN in IIoT-MEC environments with a weighted fusion ensemble-TabPFN model for improved IDS performance
Sergio Ruiz-Villafranca, José Roldán-Gómez, Javier Carrillo-Mondéjar, et al.
Future Generation Computer Systems (2025), pp. 107707-107707
Closed Access

Securing the Future of IoMT
S. Satheesh Kumar, V. Muthukumaran, Sai Jahnavi, et al.
Advances in healthcare information systems and administration book series (2025), pp. 191-216
Closed Access

Analysis of convolutional-based variational autoencoders for privacy protection in realtime video surveillance
Mallepogu Sivalakshmi, K. Rajendra Prasad, C. Shoba Bindu
Expert Systems with Applications (2025), pp. 126817-126817
Closed Access

Cyber Security in Healthcare Systems: A Review of Tools and Attack Mitigation Techniques
Kousik Barik, Sanjay Misra, Sabarathinam Chockalingam
Communications in computer and information science (2025), pp. 87-105
Closed Access

Big-IDS: a decentralized multi agent reinforcement learning approach for distributed intrusion detection in big data networks
Faten Louati, Farah Barika Ktata, Ikram Amous
Cluster Computing (2024) Vol. 27, Iss. 5, pp. 6823-6841
Closed Access | Times Cited: 4

A data-driven multi-perspective approach to cybersecurity knowledge discovery through topic modelling
Fahad Alqurashi, Istiak Ahmad
Alexandria Engineering Journal (2024) Vol. 107, pp. 374-389
Open Access | Times Cited: 4

Blockchain-Integrated Security for Real-Time Patient Monitoring in the Internet of Medical Things Using Federated Learning
Mohammad Faisal Khan, Mohammad Abaoud
IEEE Access (2023) Vol. 11, pp. 117826-117850
Open Access | Times Cited: 10

BFLIDS: Blockchain-Driven Federated Learning for Intrusion Detection in IoMT Networks
Khadija Begum, Md Ariful Islam Mozumder, Moon-Il Joo, et al.
Sensors (2024) Vol. 24, Iss. 14, pp. 4591-4591
Open Access | Times Cited: 3

DeepDeter: Strengthening Cybersecurity Against DoS Attacks with Deep Learning
Vanshika Pahuja, Sharad Shyam Ojha
(2024), pp. 1-6
Closed Access | Times Cited: 2

Data fusion and network intrusion detection systems
Rasheed Ahmad, Izzat Alsmadi
Cluster Computing (2024) Vol. 27, Iss. 6, pp. 7493-7519
Closed Access | Times Cited: 1

LSF-IDM: Deep learning-based lightweight semantic fusion intrusion detection model for automotive
Pengzhou Cheng, Lei Hua, Haobin Jiang, et al.
Peer-to-Peer Networking and Applications (2024)
Closed Access | Times Cited: 1

A context-aware zero trust-based hybrid approach to IoT-based self-driving vehicles security
Izhar Ahmed Khan, Marwa Keshk, Yasir Hussain, et al.
Ad Hoc Networks (2024), pp. 103694-103694
Closed Access | Times Cited: 1

Privacy-Preserving Federated Learning-Based Intrusion Detection System for IoHT Devices
Fatemeh Mosaiyebzadeh, Seyedamin Pouriyeh, Meng Han, et al.
Electronics (2024) Vol. 14, Iss. 1, pp. 67-67
Open Access

Advancing IoT security: a comprehensive AI-based trust framework for intrusion detection
Chandra Prabha Kaliappan, Kanmani Palaniappan, Devipriya Ananthavadivel, et al.
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 5, pp. 2737-2757
Closed Access

Security and Privacy Measures to Protect Machine Learning in Medical Applications
Rashi Singh, Ruchika, Jyoti Joshi, et al.
(2024), pp. 641-646
Closed Access

RCLNet: an effective anomaly-based intrusion detection for securing the IoMT system
Jamshed Ali Shaikh, Chengliang Wang, Wajeeh Us Sima Muhammad, et al.
Frontiers in Digital Health (2024) Vol. 6
Open Access

Ensuring patient safety in IoMT: A systematic literature review of behavior-based intrusion detection systems
Jordi Doménech, Isabel V. Martin-Faus, Saber Mhiri, et al.
Internet of Things (2024) Vol. 28, pp. 101420-101420
Open Access

Cyber-Attack Detection in Healthcare Systems Based on Modified -Recurrent Neural Network Approach
Pradeep Chintale, Thomas Sure, Fardin Quazi, et al.
Communications in computer and information science (2024), pp. 213-224
Closed Access

Access Control for Secure Remote Patient Monitoring
Asifa Shahbaz, Guiyan Ni, Zihao Tian, et al.
Lecture notes in electrical engineering (2024), pp. 127-141
Closed Access

A Review on Advancing Cybersecurity Frameworks by Integrating Machine Intelligence with Federated Learning
Vaibhavi Patil, Jhankar Moolchandani, Ashutosh Kumar Dubey
(2024), pp. 180-187
Closed Access

Page 1

Scroll to top