
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Two-layer Fog-Cloud Intrusion Detection Model for IoT Networks
Souradip Roy, Juan Li, Yan Bai
Internet of Things (2022) Vol. 19, pp. 100557-100557
Open Access | Times Cited: 29
Souradip Roy, Juan Li, Yan Bai
Internet of Things (2022) Vol. 19, pp. 100557-100557
Open Access | Times Cited: 29
Showing 1-25 of 29 citing articles:
A deep learning approach for intrusion detection in Internet of Things using focal loss function
Ayesha S. Dina, A. B. Siddique, D. Manivannan
Internet of Things (2023) Vol. 22, pp. 100699-100699
Closed Access | Times Cited: 70
Ayesha S. Dina, A. B. Siddique, D. Manivannan
Internet of Things (2023) Vol. 22, pp. 100699-100699
Closed Access | Times Cited: 70
Energy consumption of on-device machine learning models for IoT intrusion detection
Nazlı Tekin, Abbas Acar, Ahmet Arış, et al.
Internet of Things (2022) Vol. 21, pp. 100670-100670
Open Access | Times Cited: 52
Nazlı Tekin, Abbas Acar, Ahmet Arış, et al.
Internet of Things (2022) Vol. 21, pp. 100670-100670
Open Access | Times Cited: 52
Blockchain-Based Secure Localization against Malicious Nodes in IoT-Based Wireless Sensor Networks Using Federated Learning
Gebrekiros Gebreyesus Gebremariam, Jeebananda Panda, S. Indu
Wireless Communications and Mobile Computing (2023) Vol. 2023, pp. 1-27
Open Access | Times Cited: 36
Gebrekiros Gebreyesus Gebremariam, Jeebananda Panda, S. Indu
Wireless Communications and Mobile Computing (2023) Vol. 2023, pp. 1-27
Open Access | Times Cited: 36
Lightweight, Trust-Managing, and Privacy-Preserving Collaborative Intrusion Detection for Internet of Things
Aulia Arif Wardana, Grzegorz Kołaczek, Parman Sukarno
Applied Sciences (2024) Vol. 14, Iss. 10, pp. 4109-4109
Open Access | Times Cited: 9
Aulia Arif Wardana, Grzegorz Kołaczek, Parman Sukarno
Applied Sciences (2024) Vol. 14, Iss. 10, pp. 4109-4109
Open Access | Times Cited: 9
GOSVM: Gannet optimization based support vector machine for malicious attack detection in cloud environment
M Arunkumar, K. Ashok Kumar
International Journal of Information Technology (2023) Vol. 15, Iss. 3, pp. 1653-1660
Closed Access | Times Cited: 20
M Arunkumar, K. Ashok Kumar
International Journal of Information Technology (2023) Vol. 15, Iss. 3, pp. 1653-1660
Closed Access | Times Cited: 20
A new concatenated Multigraph Neural Network for IoT intrusion detection
Tanzeela Altaf, Xu Wang, Wei Ni, et al.
Internet of Things (2023) Vol. 22, pp. 100818-100818
Closed Access | Times Cited: 19
Tanzeela Altaf, Xu Wang, Wei Ni, et al.
Internet of Things (2023) Vol. 22, pp. 100818-100818
Closed Access | Times Cited: 19
Machine-Learning-Based Vulnerability Detection and Classification in Internet of Things Device Security
Sarah Bin Hulayyil, Shancang Li, Lida Xu
Electronics (2023) Vol. 12, Iss. 18, pp. 3927-3927
Open Access | Times Cited: 17
Sarah Bin Hulayyil, Shancang Li, Lida Xu
Electronics (2023) Vol. 12, Iss. 18, pp. 3927-3927
Open Access | Times Cited: 17
Seagull Optimization-based Feature Selection with Optimal Extreme Learning Machine for Intrusion Detection in Fog Assisted WSN
Thiruppathi Muthu, Vinoth Kumar Kalimuthu
Tehnicki vjesnik - Technical Gazette (2023) Vol. 30, Iss. 5
Open Access | Times Cited: 14
Thiruppathi Muthu, Vinoth Kumar Kalimuthu
Tehnicki vjesnik - Technical Gazette (2023) Vol. 30, Iss. 5
Open Access | Times Cited: 14
Journey from cloud of things to fog of things: Survey, new trends, and research directions
Ananya Chakraborty, Mohit Kumar, Nisha Chaurasia, et al.
Software Practice and Experience (2022) Vol. 53, Iss. 2, pp. 496-551
Closed Access | Times Cited: 19
Ananya Chakraborty, Mohit Kumar, Nisha Chaurasia, et al.
Software Practice and Experience (2022) Vol. 53, Iss. 2, pp. 496-551
Closed Access | Times Cited: 19
A Systematic Review Paper on Attack Detection Systems in Internet of Things Environment
Umang Kant, Vinod Kumar
Lecture notes in networks and systems (2025), pp. 427-443
Closed Access
Umang Kant, Vinod Kumar
Lecture notes in networks and systems (2025), pp. 427-443
Closed Access
A multilayer deep autoencoder approach for cross layer IoT attack detection using deep learning algorithms
K. Saranya, A. Valarmathi
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
K. Saranya, A. Valarmathi
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
A Consistent Augmented Stacking Polynomial Optimized Tool (ASPOT) for Improving Security of Cloud-IoT Systems
Divya Ramachandran, R. Chithambaramani, S. Sankar Ganesh, et al.
Journal of Advanced Research in Applied Sciences and Engineering Technology (2024) Vol. 37, Iss. 1, pp. 16-36
Open Access | Times Cited: 2
Divya Ramachandran, R. Chithambaramani, S. Sankar Ganesh, et al.
Journal of Advanced Research in Applied Sciences and Engineering Technology (2024) Vol. 37, Iss. 1, pp. 16-36
Open Access | Times Cited: 2
Taxonomy of deep learning-based intrusion detection system approaches in fog computing: a systematic review
Sepide Najafli, Abolfazl Toroghi Haghighat, Babak Karasfi
Knowledge and Information Systems (2024) Vol. 66, Iss. 11, pp. 6527-6560
Closed Access | Times Cited: 2
Sepide Najafli, Abolfazl Toroghi Haghighat, Babak Karasfi
Knowledge and Information Systems (2024) Vol. 66, Iss. 11, pp. 6527-6560
Closed Access | Times Cited: 2
Secure framework for IoT applications using Deep Learning in fog Computing
Ananya Chakraborty, Mohit Kumar, Nisha Chaurasia
Journal of Information Security and Applications (2023) Vol. 77, pp. 103569-103569
Closed Access | Times Cited: 6
Ananya Chakraborty, Mohit Kumar, Nisha Chaurasia
Journal of Information Security and Applications (2023) Vol. 77, pp. 103569-103569
Closed Access | Times Cited: 6
AEDS-IoT: Adaptive clustering-based Event Detection Scheme for IoT data streams
Ashwin Raut, Anubhav Shivhare, Vijay Kumar Chaurasiya, et al.
Internet of Things (2023) Vol. 22, pp. 100704-100704
Closed Access | Times Cited: 5
Ashwin Raut, Anubhav Shivhare, Vijay Kumar Chaurasiya, et al.
Internet of Things (2023) Vol. 22, pp. 100704-100704
Closed Access | Times Cited: 5
Development of novel intrusion detection in Internet of Things using improved dart game optimizer‐derived optimal cascaded ensemble learning
A. Shali, A. Chinnasamy, P. Selvakumari
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 7
Closed Access | Times Cited: 1
A. Shali, A. Chinnasamy, P. Selvakumari
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 7
Closed Access | Times Cited: 1
Trustworthy Artificial Intelligence Methods for Users’ Physical and Environmental Security: A Comprehensive Review
Sabina Szymoniak, Filip Depta, Łukasz Karbowiak, et al.
Applied Sciences (2023) Vol. 13, Iss. 21, pp. 12068-12068
Open Access | Times Cited: 2
Sabina Szymoniak, Filip Depta, Łukasz Karbowiak, et al.
Applied Sciences (2023) Vol. 13, Iss. 21, pp. 12068-12068
Open Access | Times Cited: 2
FS3: Few-Shot and Self-Supervised Framework for Efficient Intrusion Detection in Internet of Things Networks
Ayesha S. Dina, A. B. Siddique, D. Manivannan
Annual Computer Security Applications Conference (2023), pp. 138-149
Open Access | Times Cited: 2
Ayesha S. Dina, A. B. Siddique, D. Manivannan
Annual Computer Security Applications Conference (2023), pp. 138-149
Open Access | Times Cited: 2
A bizarre synthesized cascaded optimized predictor (BizSCOP) model for enhancing security in cloud systems
R. Julian Menezes, P. Jesu Jayarin, A. Chandrasekar
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access
R. Julian Menezes, P. Jesu Jayarin, A. Chandrasekar
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access
Attack detection model for BCoT based on contrastive variational autoencoder and metric learning
Chunwang Wu, Xiaolei Liu, Kangyi Ding, et al.
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access
Chunwang Wu, Xiaolei Liu, Kangyi Ding, et al.
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access
A secure authentication framework for IoV based on blockchain and ensemble learning
Wenxian Jiang, Xianglong Lv, Jun Tao
Vehicular Communications (2024) Vol. 50, pp. 100836-100836
Closed Access
Wenxian Jiang, Xianglong Lv, Jun Tao
Vehicular Communications (2024) Vol. 50, pp. 100836-100836
Closed Access
An efficient intrusion detection system for IoT security using CNN decision forest
Kamal Bella, Azidine Guezzaz, Said Benkirane, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2290-e2290
Open Access
Kamal Bella, Azidine Guezzaz, Said Benkirane, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2290-e2290
Open Access
Correlation Composition Awareness Model with Pair Collaborative Localization for IoT Authentication and Localization
Kranthi Alluri, S. Gopikrishnan
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 1, pp. 943-961
Open Access
Kranthi Alluri, S. Gopikrishnan
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 1, pp. 943-961
Open Access
Secure cloud computing: leveraging GNN and leader K-means for intrusion detection optimization
Raman Dugyala, Premkumar Chithaluru, M. Ramchander, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
Raman Dugyala, Premkumar Chithaluru, M. Ramchander, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access