
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models
Fatima Alwahedi, Alyazia Aldhaheri, Mohamed Amine Ferrag, et al.
Internet of Things and Cyber-Physical Systems (2024) Vol. 4, pp. 167-185
Open Access | Times Cited: 62
Fatima Alwahedi, Alyazia Aldhaheri, Mohamed Amine Ferrag, et al.
Internet of Things and Cyber-Physical Systems (2024) Vol. 4, pp. 167-185
Open Access | Times Cited: 62
Showing 1-25 of 62 citing articles:
Generative AI for Cyber Security: Analyzing the Potential of ChatGPT, DALL-E, and Other Models for Enhancing the Security Space
Siva Sai, Utkarsh Yashvardhan, Vinay Chamola, et al.
IEEE Access (2024) Vol. 12, pp. 53497-53516
Open Access | Times Cited: 17
Siva Sai, Utkarsh Yashvardhan, Vinay Chamola, et al.
IEEE Access (2024) Vol. 12, pp. 53497-53516
Open Access | Times Cited: 17
Multisensory Metaverse-6G: A New Paradigm of Commerce and Education
Mohammed H. ALSAMH, Ammar Hawbani, Santosh Kumar, et al.
IEEE Access (2024) Vol. 12, pp. 75657-75677
Open Access | Times Cited: 14
Mohammed H. ALSAMH, Ammar Hawbani, Santosh Kumar, et al.
IEEE Access (2024) Vol. 12, pp. 75657-75677
Open Access | Times Cited: 14
Securing the Internet of Things in Artificial Intelligence Era: A Comprehensive Survey
Mamoona Humayun, Noshina Tariq, Majed Alfayad, et al.
IEEE Access (2024) Vol. 12, pp. 25469-25490
Open Access | Times Cited: 13
Mamoona Humayun, Noshina Tariq, Majed Alfayad, et al.
IEEE Access (2024) Vol. 12, pp. 25469-25490
Open Access | Times Cited: 13
Implementing Automated Safety Circuit Breakers of Large Language Models for Prompt Integrity
Gaoshan Han, Qingchun Zhang, Baisen Deng, et al.
Research Square (Research Square) (2024)
Open Access | Times Cited: 6
Gaoshan Han, Qingchun Zhang, Baisen Deng, et al.
Research Square (Research Square) (2024)
Open Access | Times Cited: 6
Towards sustainable industry 4.0: A survey on greening IoE in 6G networks
Saeed Hamood Alsamhi, Ammar Hawbani, Radhya Sahal, et al.
Ad Hoc Networks (2024) Vol. 165, pp. 103610-103610
Open Access | Times Cited: 6
Saeed Hamood Alsamhi, Ammar Hawbani, Radhya Sahal, et al.
Ad Hoc Networks (2024) Vol. 165, pp. 103610-103610
Open Access | Times Cited: 6
An Extensive Examination of the IoT and Blockchain Technologies in Relation to their Applications in the Healthcare Industry
Karthik Kumar Vaigandla, Madhu Kumar Vanteru, Mounika Siluveru
Mesopotamian Journal of Computer Science (2024) Vol. 2024, pp. 1-14
Open Access | Times Cited: 5
Karthik Kumar Vaigandla, Madhu Kumar Vanteru, Mounika Siluveru
Mesopotamian Journal of Computer Science (2024) Vol. 2024, pp. 1-14
Open Access | Times Cited: 5
A Survey of Industrial AIoT: Opportunities, Challenges, and Directions
Kamran Sattar Awaisi, Qiang Ye, Srinivas Sampalli
IEEE Access (2024) Vol. 12, pp. 96946-96996
Open Access | Times Cited: 5
Kamran Sattar Awaisi, Qiang Ye, Srinivas Sampalli
IEEE Access (2024) Vol. 12, pp. 96946-96996
Open Access | Times Cited: 5
Generative AI for Secure Physical Layer Communications: A Survey
Changyuan Zhao, Hongyang Du, Dusit Niyato, et al.
IEEE Transactions on Cognitive Communications and Networking (2024) Vol. 11, Iss. 1, pp. 3-26
Open Access | Times Cited: 5
Changyuan Zhao, Hongyang Du, Dusit Niyato, et al.
IEEE Transactions on Cognitive Communications and Networking (2024) Vol. 11, Iss. 1, pp. 3-26
Open Access | Times Cited: 5
Blockchain-Enabled Large Language Models for Prognostics and Health Management Framework in Industrial Internet of Things
Dun Li, Hongzhi Li, Jing Li, et al.
Communications in computer and information science (2025), pp. 3-16
Open Access
Dun Li, Hongzhi Li, Jing Li, et al.
Communications in computer and information science (2025), pp. 3-16
Open Access
Workplace security and privacy implications in the GenAI age: A survey
Abebe Diro, Shahriar Kaisar, Akanksha Saini, et al.
Journal of Information Security and Applications (2025) Vol. 89, pp. 103960-103960
Open Access
Abebe Diro, Shahriar Kaisar, Akanksha Saini, et al.
Journal of Information Security and Applications (2025) Vol. 89, pp. 103960-103960
Open Access
AI-based Malware Detection in IoT Networks within Smart Cities: A Survey
Mustafa J.M. Alhamdi, José Manuel López-Guede, Jafar AlQaryouti, et al.
Computer Communications (2025), pp. 108055-108055
Closed Access
Mustafa J.M. Alhamdi, José Manuel López-Guede, Jafar AlQaryouti, et al.
Computer Communications (2025), pp. 108055-108055
Closed Access
Introductory Chapter: Challenges and Solutions in Quality of Service (QoS) – Optimizing Network Performance
Yaseein Soubhi Hussein, Abdulmajeed Al-Jumaily
IntechOpen eBooks (2025)
Open Access
Yaseein Soubhi Hussein, Abdulmajeed Al-Jumaily
IntechOpen eBooks (2025)
Open Access
Elevating IoT healthcare security using ProSRN and ICOM methodologies for effective threat management
Y. Sowjanya, S. Gopalakrishnan, Rakesh Kumar
International Journal of Information Technology (2025)
Closed Access
Y. Sowjanya, S. Gopalakrishnan, Rakesh Kumar
International Journal of Information Technology (2025)
Closed Access
Convergence of blockchain, IoT, and machine learning: exploring opportunities and challenges – a systematic review
Youssef Aounzou, Abdelhak Boulaalam, Fahd Kalloubi
International Journal on Smart Sensing and Intelligent Systems (2025) Vol. 18, Iss. 1
Open Access
Youssef Aounzou, Abdelhak Boulaalam, Fahd Kalloubi
International Journal on Smart Sensing and Intelligent Systems (2025) Vol. 18, Iss. 1
Open Access
A Bibliometric Review of Trends and Insights of Internet of Things on Cybersecurity Issues
Mushtaq Yousif Alhasnawi, Ahmed Abbas Jasim Al-Hchaimi, Yousif Raad Muhsen, et al.
Studies in computational intelligence (2025), pp. 127-147
Closed Access
Mushtaq Yousif Alhasnawi, Ahmed Abbas Jasim Al-Hchaimi, Yousif Raad Muhsen, et al.
Studies in computational intelligence (2025), pp. 127-147
Closed Access
Revolutionizing Supply Chain Forecasting With Generative AI and Machine Learning
James Kanyepe, Rudolph L. Boy, Munyaradzi Chibaro, et al.
Advances in business strategy and competitive advantage book series (2025), pp. 435-462
Closed Access
James Kanyepe, Rudolph L. Boy, Munyaradzi Chibaro, et al.
Advances in business strategy and competitive advantage book series (2025), pp. 435-462
Closed Access
A Diabetes Mellitus Detection Using Fusion of IoMT, Generative AI, and eXplainable AI
G Varun, S. Sarveswaran, S. Shreeshaa, et al.
Advances in healthcare information systems and administration book series (2025), pp. 291-322
Closed Access
G Varun, S. Sarveswaran, S. Shreeshaa, et al.
Advances in healthcare information systems and administration book series (2025), pp. 291-322
Closed Access
Online ensemble learning-based anomaly detection for IoT systems
Y.-T. Wu, Lan Liu, Yong‐Jie Yu, et al.
Applied Soft Computing (2025), pp. 112931-112931
Closed Access
Y.-T. Wu, Lan Liu, Yong‐Jie Yu, et al.
Applied Soft Computing (2025), pp. 112931-112931
Closed Access
Enhancing IoT Security Through IOTA-Based Identity Management and Machine Learning
Reem Alsolami, Muhammad Mostafa Monowar, Afraa Attiah, et al.
Lecture notes in networks and systems (2025), pp. 333-342
Closed Access
Reem Alsolami, Muhammad Mostafa Monowar, Afraa Attiah, et al.
Lecture notes in networks and systems (2025), pp. 333-342
Closed Access
Multicriteria group decision making for prioritizing IoT risk factors with linear diophantine fuzzy sets and MARCOS method
J. Vimala, Jeevitha Kannan, Nasreen Kausar, et al.
Granular Computing (2024) Vol. 9, Iss. 3
Open Access | Times Cited: 4
J. Vimala, Jeevitha Kannan, Nasreen Kausar, et al.
Granular Computing (2024) Vol. 9, Iss. 3
Open Access | Times Cited: 4
Adversarial attacks and defenses for large language models (LLMs): methods, frameworks & challenges
Pranjal Kumar
International Journal of Multimedia Information Retrieval (2024) Vol. 13, Iss. 3
Closed Access | Times Cited: 4
Pranjal Kumar
International Journal of Multimedia Information Retrieval (2024) Vol. 13, Iss. 3
Closed Access | Times Cited: 4
Optimizing neural networks using spider monkey optimization algorithm for intrusion detection system
Deepshikha Kumari, Abhinav Sinha, Sandip Dutta, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 3
Deepshikha Kumari, Abhinav Sinha, Sandip Dutta, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 3
Evaluating the Cybersecurity Robustness of Commercial LLMs against Adversarial Prompts: A PromptBench Analysis
Takeshi Goto, Kensuke Ono, Akira Morita
(2024)
Open Access | Times Cited: 2
Takeshi Goto, Kensuke Ono, Akira Morita
(2024)
Open Access | Times Cited: 2
Security Analysis for Smart Healthcare Systems
Mariam Ibrahim, Abdallah Al-Wadi, Ruba Elhafiz
Sensors (2024) Vol. 24, Iss. 11, pp. 3375-3375
Open Access | Times Cited: 2
Mariam Ibrahim, Abdallah Al-Wadi, Ruba Elhafiz
Sensors (2024) Vol. 24, Iss. 11, pp. 3375-3375
Open Access | Times Cited: 2
Enhancing Machine Learning Model Interpretability in Intrusion Detection Systems through SHAP Explanations and LLM-Generated Descriptions
Abderrazak Khediri, Hamda Slimi, Ayoub Yahiaoui, et al.
(2024), pp. 1-6
Closed Access | Times Cited: 2
Abderrazak Khediri, Hamda Slimi, Ayoub Yahiaoui, et al.
(2024), pp. 1-6
Closed Access | Times Cited: 2