OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A comparative evaluation of intrusion detection systems on the edge-IIoT-2022 dataset
Taraf Al Nuaimi, Salama Al Zaabi, Mansor Alyilieli, et al.
Intelligent Systems with Applications (2023) Vol. 20, pp. 200298-200298
Open Access | Times Cited: 14

Showing 14 citing articles:

Hybrid CNN–BiLSTM–DNN Approach for Detecting Cybersecurity Threats in IoT Networks
Bright Agbor Agbor, Bliss Utibe-Abasi Stephen, Philip Asuquo, et al.
Computers (2025) Vol. 14, Iss. 2, pp. 58-58
Open Access

Securing Industry 5.0: An explainable deep learning model for intrusion detection in cyber-physical systems
Himanshu Nandanwar, Rahul Katarya
Computers & Electrical Engineering (2025) Vol. 123, pp. 110161-110161
Closed Access

OASIS: Online adaptive ensembles for drift adaptation on evolving IoT data streams
T. Anithakumari, Sanket Mishra
Internet of Things (2025) Vol. 31, pp. 101545-101545
Closed Access

Detecting attacks on the internet of things network in the computing fog layer with an embedded learning approach based on clustering and blockchain
Abdolmanan Babaei Goushlavandani, Peyman Bayat, Gholamhossein Ekbatanifard
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access

Securing the Industrial IoT: A Novel Network Intrusion Detection Models
Mangayarkarasi Ramaiah, Mohemmed Yousuf Rahamathulla
(2024), pp. 1-6
Closed Access | Times Cited: 2

DDoS Attacks Detection based on Machine Learning Algorithms in IoT Environments
Mehdi Ebady Manaa, Saba M. Hussain, Suad A. Alasadi, et al.
INTELIGENCIA ARTIFICIAL (2024) Vol. 27, Iss. 74, pp. 152-165
Open Access | Times Cited: 1

Analysis of Datasets for Machine Learning-Based Cybersecurity Models
Tarcízio Ferrão, Guedes António Caetano, Sidónio Cipriano Turra
(2024)
Closed Access

Performance Comparison of Malware Classification Algorithms using WEKA Tool
Maria-Mădălina Andronache, Alexandru Vulpe, Corneliu Burileanu
2022 14th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) (2024), pp. 1-6
Closed Access

Extracting Optimal Number of Features for Machine Learning Models in Multilayer IoT Attacks
Badeea Al Sukhni, Soumya K. Manna, Jugal M. Dave, et al.
Sensors (2024) Vol. 24, Iss. 24, pp. 8121-8121
Open Access

A Temporal Convolutional Network-Based Approach for Network Intrusion Detection
Rukmini Nazre, Rujuta Budke, Omkar Oak, et al.
(2024), pp. 1-6
Open Access

Page 1

Scroll to top