OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models
Fatima Alwahedi, Alyazia Aldhaheri, Mohamed Amine Ferrag, et al.
Internet of Things and Cyber-Physical Systems (2024) Vol. 4, pp. 167-185
Open Access | Times Cited: 62

Showing 1-25 of 62 citing articles:

Generative AI for Cyber Security: Analyzing the Potential of ChatGPT, DALL-E, and Other Models for Enhancing the Security Space
Siva Sai, Utkarsh Yashvardhan, Vinay Chamola, et al.
IEEE Access (2024) Vol. 12, pp. 53497-53516
Open Access | Times Cited: 17

Multisensory Metaverse-6G: A New Paradigm of Commerce and Education
Mohammed H. ALSAMH, Ammar Hawbani, Santosh Kumar, et al.
IEEE Access (2024) Vol. 12, pp. 75657-75677
Open Access | Times Cited: 14

Securing the Internet of Things in Artificial Intelligence Era: A Comprehensive Survey
Mamoona Humayun, Noshina Tariq, Majed Alfayad, et al.
IEEE Access (2024) Vol. 12, pp. 25469-25490
Open Access | Times Cited: 13

Implementing Automated Safety Circuit Breakers of Large Language Models for Prompt Integrity
Gaoshan Han, Qingchun Zhang, Baisen Deng, et al.
Research Square (Research Square) (2024)
Open Access | Times Cited: 6

Towards sustainable industry 4.0: A survey on greening IoE in 6G networks
Saeed Hamood Alsamhi, Ammar Hawbani, Radhya Sahal, et al.
Ad Hoc Networks (2024) Vol. 165, pp. 103610-103610
Open Access | Times Cited: 6

An Extensive Examination of the IoT and Blockchain Technologies in Relation to their Applications in the Healthcare Industry
Karthik Kumar Vaigandla, Madhu Kumar Vanteru, Mounika Siluveru
Mesopotamian Journal of Computer Science (2024) Vol. 2024, pp. 1-14
Open Access | Times Cited: 5

A Survey of Industrial AIoT: Opportunities, Challenges, and Directions
Kamran Sattar Awaisi, Qiang Ye, Srinivas Sampalli
IEEE Access (2024) Vol. 12, pp. 96946-96996
Open Access | Times Cited: 5

Generative AI for Secure Physical Layer Communications: A Survey
Changyuan Zhao, Hongyang Du, Dusit Niyato, et al.
IEEE Transactions on Cognitive Communications and Networking (2024) Vol. 11, Iss. 1, pp. 3-26
Open Access | Times Cited: 5

Blockchain-Enabled Large Language Models for Prognostics and Health Management Framework in Industrial Internet of Things
Dun Li, Hongzhi Li, Jing Li, et al.
Communications in computer and information science (2025), pp. 3-16
Open Access

Workplace security and privacy implications in the GenAI age: A survey
Abebe Diro, Shahriar Kaisar, Akanksha Saini, et al.
Journal of Information Security and Applications (2025) Vol. 89, pp. 103960-103960
Open Access

AI-based Malware Detection in IoT Networks within Smart Cities: A Survey
Mustafa J.M. Alhamdi, José Manuel López-Guede, Jafar AlQaryouti, et al.
Computer Communications (2025), pp. 108055-108055
Closed Access

Elevating IoT healthcare security using ProSRN and ICOM methodologies for effective threat management
Y. Sowjanya, S. Gopalakrishnan, Rakesh Kumar
International Journal of Information Technology (2025)
Closed Access

Convergence of blockchain, IoT, and machine learning: exploring opportunities and challenges – a systematic review
Youssef Aounzou, Abdelhak Boulaalam, Fahd Kalloubi
International Journal on Smart Sensing and Intelligent Systems (2025) Vol. 18, Iss. 1
Open Access

A Bibliometric Review of Trends and Insights of Internet of Things on Cybersecurity Issues
Mushtaq Yousif Alhasnawi, Ahmed Abbas Jasim Al-Hchaimi, Yousif Raad Muhsen, et al.
Studies in computational intelligence (2025), pp. 127-147
Closed Access

Revolutionizing Supply Chain Forecasting With Generative AI and Machine Learning
James Kanyepe, Rudolph L. Boy, Munyaradzi Chibaro, et al.
Advances in business strategy and competitive advantage book series (2025), pp. 435-462
Closed Access

A Diabetes Mellitus Detection Using Fusion of IoMT, Generative AI, and eXplainable AI
G Varun, S. Sarveswaran, S. Shreeshaa, et al.
Advances in healthcare information systems and administration book series (2025), pp. 291-322
Closed Access

Online ensemble learning-based anomaly detection for IoT systems
Y.-T. Wu, Lan Liu, Yong‐Jie Yu, et al.
Applied Soft Computing (2025), pp. 112931-112931
Closed Access

Enhancing IoT Security Through IOTA-Based Identity Management and Machine Learning
Reem Alsolami, Muhammad Mostafa Monowar, Afraa Attiah, et al.
Lecture notes in networks and systems (2025), pp. 333-342
Closed Access

Multicriteria group decision making for prioritizing IoT risk factors with linear diophantine fuzzy sets and MARCOS method
J. Vimala, Jeevitha Kannan, Nasreen Kausar, et al.
Granular Computing (2024) Vol. 9, Iss. 3
Open Access | Times Cited: 4

Adversarial attacks and defenses for large language models (LLMs): methods, frameworks & challenges
Pranjal Kumar
International Journal of Multimedia Information Retrieval (2024) Vol. 13, Iss. 3
Closed Access | Times Cited: 4

Optimizing neural networks using spider monkey optimization algorithm for intrusion detection system
Deepshikha Kumari, Abhinav Sinha, Sandip Dutta, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 3

Security Analysis for Smart Healthcare Systems
Mariam Ibrahim, Abdallah Al-Wadi, Ruba Elhafiz
Sensors (2024) Vol. 24, Iss. 11, pp. 3375-3375
Open Access | Times Cited: 2

Enhancing Machine Learning Model Interpretability in Intrusion Detection Systems through SHAP Explanations and LLM-Generated Descriptions
Abderrazak Khediri, Hamda Slimi, Ayoub Yahiaoui, et al.
(2024), pp. 1-6
Closed Access | Times Cited: 2

Page 1 - Next Page

Scroll to top