
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An extended evaluation on machine learning techniques for Denial-of-Service detection in Wireless Sensor Networks
Silvio E. Quincozes, Juliano F. Kazienko, Vagner E. Quincozes
Internet of Things (2023) Vol. 22, pp. 100684-100684
Closed Access | Times Cited: 13
Silvio E. Quincozes, Juliano F. Kazienko, Vagner E. Quincozes
Internet of Things (2023) Vol. 22, pp. 100684-100684
Closed Access | Times Cited: 13
Showing 13 citing articles:
Detection of Denial-of-Service Attack in Wireless Sensor Networks: A Lightweight Machine Learning Approach
Muawia A. Elsadig
IEEE Access (2023) Vol. 11, pp. 83537-83552
Open Access | Times Cited: 24
Muawia A. Elsadig
IEEE Access (2023) Vol. 11, pp. 83537-83552
Open Access | Times Cited: 24
Cluster-based wireless sensor network framework for denial-of-service attack detection based on variable selection ensemble machine learning algorithms
Ayuba John, Ismail Fauzi Isnin, Syed Hamid Hussain Madni, et al.
Intelligent Systems with Applications (2024) Vol. 22, pp. 200381-200381
Open Access | Times Cited: 9
Ayuba John, Ismail Fauzi Isnin, Syed Hamid Hussain Madni, et al.
Intelligent Systems with Applications (2024) Vol. 22, pp. 200381-200381
Open Access | Times Cited: 9
A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT)
Vagner E. Quincozes, Silvio E. Quincozes, Juliano F. Kazienko, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 1975-2002
Open Access | Times Cited: 8
Vagner E. Quincozes, Silvio E. Quincozes, Juliano F. Kazienko, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 1975-2002
Open Access | Times Cited: 8
A Survey on Energy Drainage Attacks and Countermeasures in Wireless Sensor Networks
J. W. Lee, You-Rak Choi, Beomkyu Suh, et al.
Applied Sciences (2025) Vol. 15, Iss. 4, pp. 2213-2213
Open Access
J. W. Lee, You-Rak Choi, Beomkyu Suh, et al.
Applied Sciences (2025) Vol. 15, Iss. 4, pp. 2213-2213
Open Access
Utilize DBN and DBSCAN to detect selective forwarding attacks in event-driven wireless sensors networks
Quanbing Li, Yilun Ma, Yuanming Wu
Engineering Applications of Artificial Intelligence (2023) Vol. 126, pp. 107122-107122
Closed Access | Times Cited: 8
Quanbing Li, Yilun Ma, Yuanming Wu
Engineering Applications of Artificial Intelligence (2023) Vol. 126, pp. 107122-107122
Closed Access | Times Cited: 8
Enhancing agricultural wireless sensor network security through integrated machine learning approaches
Ishu Sharma, Aditya Bhardwaj, Keshav Kaushik
Security and Privacy (2024) Vol. 7, Iss. 6
Closed Access | Times Cited: 1
Ishu Sharma, Aditya Bhardwaj, Keshav Kaushik
Security and Privacy (2024) Vol. 7, Iss. 6
Closed Access | Times Cited: 1
Blockchain-Based Data Breach Detection: Approaches, Challenges, and Future Directions
Kainat Ansar, Mansoor Ahmed, Markus Helfert, et al.
Mathematics (2023) Vol. 12, Iss. 1, pp. 107-107
Open Access | Times Cited: 3
Kainat Ansar, Mansoor Ahmed, Markus Helfert, et al.
Mathematics (2023) Vol. 12, Iss. 1, pp. 107-107
Open Access | Times Cited: 3
A Reputation-Based AODV Protocol for Blackhole and Malfunction Nodes Detection and Avoidance
Qussai Yaseen, Monther Aldwairi, Ahmad M. Manasrah
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 80, Iss. 2, pp. 1867-1888
Open Access
Qussai Yaseen, Monther Aldwairi, Ahmad M. Manasrah
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 80, Iss. 2, pp. 1867-1888
Open Access
A comprehensive review of energy efficient routing protocols for query driven wireless sensor networks
Punith Bekal, Pramod Kumar, Pallavi R. Mane, et al.
F1000Research (2024) Vol. 12, pp. 644-644
Open Access
Punith Bekal, Pramod Kumar, Pallavi R. Mane, et al.
F1000Research (2024) Vol. 12, pp. 644-644
Open Access
A comprehensive review of energy efficient routing protocols for query driven wireless sensor networks
Punith Bekal, Pramod Kumar, Pallavi R. Mane, et al.
F1000Research (2024) Vol. 12, pp. 644-644
Open Access
Punith Bekal, Pramod Kumar, Pallavi R. Mane, et al.
F1000Research (2024) Vol. 12, pp. 644-644
Open Access
Modelos Interpretáveis com Inteligência Artificial Explicável (XAI) na Detecção de Intrusões em Redes Intra-Veiculares Controller Area Network (CAN)
Felipe N. Dresch, Felipe H. Scherer, Silvio E. Quincozes, et al.
(2024), pp. 445-460
Closed Access
Felipe N. Dresch, Felipe H. Scherer, Silvio E. Quincozes, et al.
(2024), pp. 445-460
Closed Access
Li-IDS: An Approach Towards a Lightweight IDS for Resource-Constrained IoT
Mahawish Fatima, Osama Rehman, Ibrahim M.H Rehman
(2023) Vol. 10, pp. 1-6
Closed Access | Times Cited: 1
Mahawish Fatima, Osama Rehman, Ibrahim M.H Rehman
(2023) Vol. 10, pp. 1-6
Closed Access | Times Cited: 1
DDoS Attack Detection in WSN Using Modified BGRU With MFO Model
S. Venkatasubramanian, R. Mohankumar
Advances in computational intelligence and robotics book series (2023), pp. 286-305
Closed Access
S. Venkatasubramanian, R. Mohankumar
Advances in computational intelligence and robotics book series (2023), pp. 286-305
Closed Access