
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A comparative evaluation of intrusion detection systems on the edge-IIoT-2022 dataset
Taraf Al Nuaimi, Salama Al Zaabi, Mansor Alyilieli, et al.
Intelligent Systems with Applications (2023) Vol. 20, pp. 200298-200298
Open Access | Times Cited: 14
Taraf Al Nuaimi, Salama Al Zaabi, Mansor Alyilieli, et al.
Intelligent Systems with Applications (2023) Vol. 20, pp. 200298-200298
Open Access | Times Cited: 14
Showing 14 citing articles:
Hybrid CNN–BiLSTM–DNN Approach for Detecting Cybersecurity Threats in IoT Networks
Bright Agbor Agbor, Bliss Utibe-Abasi Stephen, Philip Asuquo, et al.
Computers (2025) Vol. 14, Iss. 2, pp. 58-58
Open Access
Bright Agbor Agbor, Bliss Utibe-Abasi Stephen, Philip Asuquo, et al.
Computers (2025) Vol. 14, Iss. 2, pp. 58-58
Open Access
Securing Industry 5.0: An explainable deep learning model for intrusion detection in cyber-physical systems
Himanshu Nandanwar, Rahul Katarya
Computers & Electrical Engineering (2025) Vol. 123, pp. 110161-110161
Closed Access
Himanshu Nandanwar, Rahul Katarya
Computers & Electrical Engineering (2025) Vol. 123, pp. 110161-110161
Closed Access
OASIS: Online adaptive ensembles for drift adaptation on evolving IoT data streams
T. Anithakumari, Sanket Mishra
Internet of Things (2025) Vol. 31, pp. 101545-101545
Closed Access
T. Anithakumari, Sanket Mishra
Internet of Things (2025) Vol. 31, pp. 101545-101545
Closed Access
Detecting attacks on the internet of things network in the computing fog layer with an embedded learning approach based on clustering and blockchain
Abdolmanan Babaei Goushlavandani, Peyman Bayat, Gholamhossein Ekbatanifard
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access
Abdolmanan Babaei Goushlavandani, Peyman Bayat, Gholamhossein Ekbatanifard
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access
OSEN-IoT: An optimized stack ensemble network with genetic algorithm for robust intrusion detection in heterogeneous IoT networks
Sohaib Asif
Expert Systems with Applications (2025), pp. 127183-127183
Closed Access
Sohaib Asif
Expert Systems with Applications (2025), pp. 127183-127183
Closed Access
Advanced Hybrid Transformer-CNN Deep Learning Model for Effective Intrusion Detection Systems with Class Imbalance Mitigation Using Resampling Techniques
Hesham M. Kamal, Maggie Mashaly
Future Internet (2024) Vol. 16, Iss. 12, pp. 481-481
Open Access | Times Cited: 3
Hesham M. Kamal, Maggie Mashaly
Future Internet (2024) Vol. 16, Iss. 12, pp. 481-481
Open Access | Times Cited: 3
Securing the Industrial IoT: A Novel Network Intrusion Detection Models
Mangayarkarasi Ramaiah, Mohemmed Yousuf Rahamathulla
(2024), pp. 1-6
Closed Access | Times Cited: 2
Mangayarkarasi Ramaiah, Mohemmed Yousuf Rahamathulla
(2024), pp. 1-6
Closed Access | Times Cited: 2
DDoS Attacks Detection based on Machine Learning Algorithms in IoT Environments
Mehdi Ebady Manaa, Saba M. Hussain, Suad A. Alasadi, et al.
INTELIGENCIA ARTIFICIAL (2024) Vol. 27, Iss. 74, pp. 152-165
Open Access | Times Cited: 1
Mehdi Ebady Manaa, Saba M. Hussain, Suad A. Alasadi, et al.
INTELIGENCIA ARTIFICIAL (2024) Vol. 27, Iss. 74, pp. 152-165
Open Access | Times Cited: 1
Saldırı Tespit Sistemlerinde K-Means Algoritması ve Silhouette Metriği ile Optimum Küme Sayısının Belirlenmesi
Fatih Topaloğlu
Bilişim Teknolojileri Dergisi (2024) Vol. 17, Iss. 2, pp. 71-79
Open Access
Fatih Topaloğlu
Bilişim Teknolojileri Dergisi (2024) Vol. 17, Iss. 2, pp. 71-79
Open Access
Analysis of Datasets for Machine Learning-Based Cybersecurity Models
Tarcízio Ferrão, Guedes António Caetano, Sidónio Cipriano Turra
(2024)
Closed Access
Tarcízio Ferrão, Guedes António Caetano, Sidónio Cipriano Turra
(2024)
Closed Access
Performance Comparison of Malware Classification Algorithms using WEKA Tool
Maria-Mădălina Andronache, Alexandru Vulpe, Corneliu Burileanu
2022 14th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) (2024), pp. 1-6
Closed Access
Maria-Mădălina Andronache, Alexandru Vulpe, Corneliu Burileanu
2022 14th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) (2024), pp. 1-6
Closed Access
Optimized Bayesian regularization-back propagation neural network using data-driven intrusion detection system in Internet of Things
A. K., Sleeman D.H., Sayyad Jilani, et al.
Smart Science (2024), pp. 1-15
Closed Access
A. K., Sleeman D.H., Sayyad Jilani, et al.
Smart Science (2024), pp. 1-15
Closed Access
Extracting Optimal Number of Features for Machine Learning Models in Multilayer IoT Attacks
Badeea Al Sukhni, Soumya K. Manna, Jugal M. Dave, et al.
Sensors (2024) Vol. 24, Iss. 24, pp. 8121-8121
Open Access
Badeea Al Sukhni, Soumya K. Manna, Jugal M. Dave, et al.
Sensors (2024) Vol. 24, Iss. 24, pp. 8121-8121
Open Access
A Temporal Convolutional Network-Based Approach for Network Intrusion Detection
Rukmini Nazre, Rujuta Budke, Omkar Oak, et al.
(2024), pp. 1-6
Open Access
Rukmini Nazre, Rujuta Budke, Omkar Oak, et al.
(2024), pp. 1-6
Open Access