
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A hybrid CNN+LSTM-based intrusion detection system for industrial IoT networks
Hakan Can Altunay, Zafer Albayrak
Engineering Science and Technology an International Journal (2023) Vol. 38, pp. 101322-101322
Open Access | Times Cited: 133
Hakan Can Altunay, Zafer Albayrak
Engineering Science and Technology an International Journal (2023) Vol. 38, pp. 101322-101322
Open Access | Times Cited: 133
Showing 1-25 of 133 citing articles:
A Novel Two-Stage Deep Learning Model for Network Intrusion Detection: LSTM-AE
Vanlalruata Hnamte, Hong-Nhung Nguyen, Jamal Hussain, et al.
IEEE Access (2023) Vol. 11, pp. 37131-37148
Open Access | Times Cited: 69
Vanlalruata Hnamte, Hong-Nhung Nguyen, Jamal Hussain, et al.
IEEE Access (2023) Vol. 11, pp. 37131-37148
Open Access | Times Cited: 69
Enhancing IoT network security through deep learning-powered Intrusion Detection System
Shahid Allah Bakhsh, Muhammad Almas Khan, Fawad Ahmed, et al.
Internet of Things (2023) Vol. 24, pp. 100936-100936
Open Access | Times Cited: 59
Shahid Allah Bakhsh, Muhammad Almas Khan, Fawad Ahmed, et al.
Internet of Things (2023) Vol. 24, pp. 100936-100936
Open Access | Times Cited: 59
Dugat-LSTM: Deep learning based network intrusion detection system using chaotic optimization strategy
Ramkumar Devendiran, Anil V. Turukmane
Expert Systems with Applications (2024) Vol. 245, pp. 123027-123027
Closed Access | Times Cited: 31
Ramkumar Devendiran, Anil V. Turukmane
Expert Systems with Applications (2024) Vol. 245, pp. 123027-123027
Closed Access | Times Cited: 31
A deep learning-based novel hybrid CNN-LSTM architecture for efficient detection of threats in the IoT ecosystem
Ahsan Nazir, Jingsha He, Nafei Zhu, et al.
Ain Shams Engineering Journal (2024) Vol. 15, Iss. 7, pp. 102777-102777
Open Access | Times Cited: 18
Ahsan Nazir, Jingsha He, Nafei Zhu, et al.
Ain Shams Engineering Journal (2024) Vol. 15, Iss. 7, pp. 102777-102777
Open Access | Times Cited: 18
An end-to-end learning approach for enhancing intrusion detection in Industrial-Internet of Things
Karima Hassini, Safae Khalis, Omar Habibi, et al.
Knowledge-Based Systems (2024) Vol. 294, pp. 111785-111785
Closed Access | Times Cited: 15
Karima Hassini, Safae Khalis, Omar Habibi, et al.
Knowledge-Based Systems (2024) Vol. 294, pp. 111785-111785
Closed Access | Times Cited: 15
Temporal Convolutional Network Approach to Secure Open Charge Point Protocol (OCPP) in Electric Vehicle Charging
Ikram Benfarhat, Vik Tor Goh, Siow Chun Lim, et al.
IEEE Access (2025) Vol. 13, pp. 15272-15289
Open Access | Times Cited: 1
Ikram Benfarhat, Vik Tor Goh, Siow Chun Lim, et al.
IEEE Access (2025) Vol. 13, pp. 15272-15289
Open Access | Times Cited: 1
MAG-FSNet:A high-precision robust forest fire smoke detection model integrating local features and global information
Chunman Yan, Jun Wang
Measurement (2025), pp. 116813-116813
Closed Access | Times Cited: 1
Chunman Yan, Jun Wang
Measurement (2025), pp. 116813-116813
Closed Access | Times Cited: 1
Ensemble Machine Learning of Gradient Boosting (XGBoost, LightGBM, CatBoost) and Attention-Based CNN-LSTM for Harmful Algal Blooms Forecasting
Jung Min Ahn, Jungwook Kim, Kyunghyun Kim
Toxins (2023) Vol. 15, Iss. 10, pp. 608-608
Open Access | Times Cited: 37
Jung Min Ahn, Jungwook Kim, Kyunghyun Kim
Toxins (2023) Vol. 15, Iss. 10, pp. 608-608
Open Access | Times Cited: 37
Res-TranBiLSTM: An intelligent approach for intrusion detection in the Internet of Things
Shiyu Wang, Wenxiang Xu, Yiwen Liu
Computer Networks (2023) Vol. 235, pp. 109982-109982
Open Access | Times Cited: 33
Shiyu Wang, Wenxiang Xu, Yiwen Liu
Computer Networks (2023) Vol. 235, pp. 109982-109982
Open Access | Times Cited: 33
Hyperparameter Optimization for 1D-CNN-Based Network Intrusion Detection Using GA and PSO
Dusmurod Kilichev, Wooseong Kim
Mathematics (2023) Vol. 11, Iss. 17, pp. 3724-3724
Open Access | Times Cited: 31
Dusmurod Kilichev, Wooseong Kim
Mathematics (2023) Vol. 11, Iss. 17, pp. 3724-3724
Open Access | Times Cited: 31
SMWE-GFPNNet: A high-precision and robust method for forest fire smoke detection
Rui Li, Yaowen Hu, Lin Li, et al.
Knowledge-Based Systems (2024) Vol. 289, pp. 111528-111528
Closed Access | Times Cited: 12
Rui Li, Yaowen Hu, Lin Li, et al.
Knowledge-Based Systems (2024) Vol. 289, pp. 111528-111528
Closed Access | Times Cited: 12
Security Information Event Management data acquisition and analysis methods with machine learning principles
Noyan Tendikov, Leila Rzayeva, Bilal Saoud, et al.
Results in Engineering (2024) Vol. 22, pp. 102254-102254
Open Access | Times Cited: 8
Noyan Tendikov, Leila Rzayeva, Bilal Saoud, et al.
Results in Engineering (2024) Vol. 22, pp. 102254-102254
Open Access | Times Cited: 8
DDoS attacks in Industrial IoT: A survey
Shubhankar Chaudhary, Pramod Kumar Mishra
Computer Networks (2023) Vol. 236, pp. 110015-110015
Closed Access | Times Cited: 21
Shubhankar Chaudhary, Pramod Kumar Mishra
Computer Networks (2023) Vol. 236, pp. 110015-110015
Closed Access | Times Cited: 21
VBQ-Net: A Novel Vectorization-Based Boost Quantized Network Model for Maximizing the Security Level of IoT System to Prevent Intrusions
Ganeshkumar Perumal, S. Gopalakrishnan, Qaisar Abbas, et al.
Systems (2023) Vol. 11, Iss. 8, pp. 436-436
Open Access | Times Cited: 16
Ganeshkumar Perumal, S. Gopalakrishnan, Qaisar Abbas, et al.
Systems (2023) Vol. 11, Iss. 8, pp. 436-436
Open Access | Times Cited: 16
CRSF: An Intrusion Detection Framework for Industrial Internet of Things Based on Pretrained CNN2D-RNN and SVM
Shiming Li, Guangzhao Chai, Yuhe Wang, et al.
IEEE Access (2023) Vol. 11, pp. 92041-92054
Open Access | Times Cited: 16
Shiming Li, Guangzhao Chai, Yuhe Wang, et al.
IEEE Access (2023) Vol. 11, pp. 92041-92054
Open Access | Times Cited: 16
Detecting lateral movement: A systematic survey
Christos Smiliotopoulos, Georgios Kambourakis, Constantinos Kolias
Heliyon (2024) Vol. 10, Iss. 4, pp. e26317-e26317
Open Access | Times Cited: 7
Christos Smiliotopoulos, Georgios Kambourakis, Constantinos Kolias
Heliyon (2024) Vol. 10, Iss. 4, pp. e26317-e26317
Open Access | Times Cited: 7
A multi-objectives framework for secure blockchain in fog–cloud network of vehicle-to-infrastructure applications
Abdullah Lakhan, Mazin Abed Mohammed, Karrar Hameed Abdulkareem, et al.
Knowledge-Based Systems (2024) Vol. 290, pp. 111576-111576
Open Access | Times Cited: 6
Abdullah Lakhan, Mazin Abed Mohammed, Karrar Hameed Abdulkareem, et al.
Knowledge-Based Systems (2024) Vol. 290, pp. 111576-111576
Open Access | Times Cited: 6
Deep-IDS: A Real-Time Intrusion Detector for IoT Nodes Using Deep Learning
Sandeepkumar Racherla, Prathyusha Sripathi, Nuruzzaman Faruqui, et al.
IEEE Access (2024) Vol. 12, pp. 63584-63597
Open Access | Times Cited: 6
Sandeepkumar Racherla, Prathyusha Sripathi, Nuruzzaman Faruqui, et al.
IEEE Access (2024) Vol. 12, pp. 63584-63597
Open Access | Times Cited: 6
Enhanced CNN-LSTM Deep Learning for SCADA IDS Featuring Hurst Parameter Self-Similarity
Asaad Balla, Mohamed Hadi Habaebi, Elfatih A. A. Elsheikh, et al.
IEEE Access (2024) Vol. 12, pp. 6100-6116
Open Access | Times Cited: 5
Asaad Balla, Mohamed Hadi Habaebi, Elfatih A. A. Elsheikh, et al.
IEEE Access (2024) Vol. 12, pp. 6100-6116
Open Access | Times Cited: 5
Network intrusion detection: An optimized deep learning approach using big data analytics
D. Suja Mary, L. Jaya Singh Dhas, A. Deepa, et al.
Expert Systems with Applications (2024) Vol. 251, pp. 123919-123919
Closed Access | Times Cited: 5
D. Suja Mary, L. Jaya Singh Dhas, A. Deepa, et al.
Expert Systems with Applications (2024) Vol. 251, pp. 123919-123919
Closed Access | Times Cited: 5
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
Siva Surya Narayana Chintapalli, Satya Prakash Singh, Jaroslav Frnda, et al.
Heliyon (2024) Vol. 10, Iss. 8, pp. e29410-e29410
Open Access | Times Cited: 5
Siva Surya Narayana Chintapalli, Satya Prakash Singh, Jaroslav Frnda, et al.
Heliyon (2024) Vol. 10, Iss. 8, pp. e29410-e29410
Open Access | Times Cited: 5
Multi-classification in-vehicle intrusion detection system using packet- and sequence-level characteristics from time-embedded transformer with autoencoder
Tien-Dat Le, Hoang Bao Huy Truong, Van Phu Pham, et al.
Knowledge-Based Systems (2024) Vol. 299, pp. 112091-112091
Closed Access | Times Cited: 5
Tien-Dat Le, Hoang Bao Huy Truong, Van Phu Pham, et al.
Knowledge-Based Systems (2024) Vol. 299, pp. 112091-112091
Closed Access | Times Cited: 5
Lightweight CNN-BiLSTM based Intrusion Detection Systems for Resource-Constrained IoT Devices
Mohammed Jouhari, Mohsen Guizani
2022 International Wireless Communications and Mobile Computing (IWCMC) (2024), pp. 1558-1563
Open Access | Times Cited: 5
Mohammed Jouhari, Mohsen Guizani
2022 International Wireless Communications and Mobile Computing (IWCMC) (2024), pp. 1558-1563
Open Access | Times Cited: 5
IoT security using heuristic aided symmetric convolution-based deep temporal convolution network for intrusion detection by extracting multi-cascaded deep attention features
R. Latha, S. John Justin Thangaraj
Expert Systems with Applications (2025), pp. 126363-126363
Closed Access
R. Latha, S. John Justin Thangaraj
Expert Systems with Applications (2025), pp. 126363-126363
Closed Access
Research on Improved LSTM and Deep Learning Intrusion Detection Algorithms
Baoguo Liu, Eric Blancaflor, Mideth Abisado
Journal of Machine and Computing (2025), pp. 076-088
Closed Access
Baoguo Liu, Eric Blancaflor, Mideth Abisado
Journal of Machine and Computing (2025), pp. 076-088
Closed Access