OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A hybrid CNN+LSTM-based intrusion detection system for industrial IoT networks
Hakan Can Altunay, Zafer Albayrak
Engineering Science and Technology an International Journal (2023) Vol. 38, pp. 101322-101322
Open Access | Times Cited: 133

Showing 1-25 of 133 citing articles:

A Novel Two-Stage Deep Learning Model for Network Intrusion Detection: LSTM-AE
Vanlalruata Hnamte, Hong-Nhung Nguyen, Jamal Hussain, et al.
IEEE Access (2023) Vol. 11, pp. 37131-37148
Open Access | Times Cited: 69

Enhancing IoT network security through deep learning-powered Intrusion Detection System
Shahid Allah Bakhsh, Muhammad Almas Khan, Fawad Ahmed, et al.
Internet of Things (2023) Vol. 24, pp. 100936-100936
Open Access | Times Cited: 59

Dugat-LSTM: Deep learning based network intrusion detection system using chaotic optimization strategy
Ramkumar Devendiran, Anil V. Turukmane
Expert Systems with Applications (2024) Vol. 245, pp. 123027-123027
Closed Access | Times Cited: 31

A deep learning-based novel hybrid CNN-LSTM architecture for efficient detection of threats in the IoT ecosystem
Ahsan Nazir, Jingsha He, Nafei Zhu, et al.
Ain Shams Engineering Journal (2024) Vol. 15, Iss. 7, pp. 102777-102777
Open Access | Times Cited: 18

An end-to-end learning approach for enhancing intrusion detection in Industrial-Internet of Things
Karima Hassini, Safae Khalis, Omar Habibi, et al.
Knowledge-Based Systems (2024) Vol. 294, pp. 111785-111785
Closed Access | Times Cited: 15

Temporal Convolutional Network Approach to Secure Open Charge Point Protocol (OCPP) in Electric Vehicle Charging
Ikram Benfarhat, Vik Tor Goh, Siow Chun Lim, et al.
IEEE Access (2025) Vol. 13, pp. 15272-15289
Open Access | Times Cited: 1

MAG-FSNet:A high-precision robust forest fire smoke detection model integrating local features and global information
Chunman Yan, Jun Wang
Measurement (2025), pp. 116813-116813
Closed Access | Times Cited: 1

Res-TranBiLSTM: An intelligent approach for intrusion detection in the Internet of Things
Shiyu Wang, Wenxiang Xu, Yiwen Liu
Computer Networks (2023) Vol. 235, pp. 109982-109982
Open Access | Times Cited: 33

Hyperparameter Optimization for 1D-CNN-Based Network Intrusion Detection Using GA and PSO
Dusmurod Kilichev, Wooseong Kim
Mathematics (2023) Vol. 11, Iss. 17, pp. 3724-3724
Open Access | Times Cited: 31

SMWE-GFPNNet: A high-precision and robust method for forest fire smoke detection
Rui Li, Yaowen Hu, Lin Li, et al.
Knowledge-Based Systems (2024) Vol. 289, pp. 111528-111528
Closed Access | Times Cited: 12

Security Information Event Management data acquisition and analysis methods with machine learning principles
Noyan Tendikov, Leila Rzayeva, Bilal Saoud, et al.
Results in Engineering (2024) Vol. 22, pp. 102254-102254
Open Access | Times Cited: 8

DDoS attacks in Industrial IoT: A survey
Shubhankar Chaudhary, Pramod Kumar Mishra
Computer Networks (2023) Vol. 236, pp. 110015-110015
Closed Access | Times Cited: 21

VBQ-Net: A Novel Vectorization-Based Boost Quantized Network Model for Maximizing the Security Level of IoT System to Prevent Intrusions
Ganeshkumar Perumal, S. Gopalakrishnan, Qaisar Abbas, et al.
Systems (2023) Vol. 11, Iss. 8, pp. 436-436
Open Access | Times Cited: 16

CRSF: An Intrusion Detection Framework for Industrial Internet of Things Based on Pretrained CNN2D-RNN and SVM
Shiming Li, Guangzhao Chai, Yuhe Wang, et al.
IEEE Access (2023) Vol. 11, pp. 92041-92054
Open Access | Times Cited: 16

Detecting lateral movement: A systematic survey
Christos Smiliotopoulos, Georgios Kambourakis, Constantinos Kolias
Heliyon (2024) Vol. 10, Iss. 4, pp. e26317-e26317
Open Access | Times Cited: 7

A multi-objectives framework for secure blockchain in fog–cloud network of vehicle-to-infrastructure applications
Abdullah Lakhan, Mazin Abed Mohammed, Karrar Hameed Abdulkareem, et al.
Knowledge-Based Systems (2024) Vol. 290, pp. 111576-111576
Open Access | Times Cited: 6

Deep-IDS: A Real-Time Intrusion Detector for IoT Nodes Using Deep Learning
Sandeepkumar Racherla, Prathyusha Sripathi, Nuruzzaman Faruqui, et al.
IEEE Access (2024) Vol. 12, pp. 63584-63597
Open Access | Times Cited: 6

Enhanced CNN-LSTM Deep Learning for SCADA IDS Featuring Hurst Parameter Self-Similarity
Asaad Balla, Mohamed Hadi Habaebi, Elfatih A. A. Elsheikh, et al.
IEEE Access (2024) Vol. 12, pp. 6100-6116
Open Access | Times Cited: 5

Network intrusion detection: An optimized deep learning approach using big data analytics
D. Suja Mary, L. Jaya Singh Dhas, A. Deepa, et al.
Expert Systems with Applications (2024) Vol. 251, pp. 123919-123919
Closed Access | Times Cited: 5

OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
Siva Surya Narayana Chintapalli, Satya Prakash Singh, Jaroslav Frnda, et al.
Heliyon (2024) Vol. 10, Iss. 8, pp. e29410-e29410
Open Access | Times Cited: 5

Multi-classification in-vehicle intrusion detection system using packet- and sequence-level characteristics from time-embedded transformer with autoencoder
Tien-Dat Le, Hoang Bao Huy Truong, Van Phu Pham, et al.
Knowledge-Based Systems (2024) Vol. 299, pp. 112091-112091
Closed Access | Times Cited: 5

Lightweight CNN-BiLSTM based Intrusion Detection Systems for Resource-Constrained IoT Devices
Mohammed Jouhari, Mohsen Guizani
2022 International Wireless Communications and Mobile Computing (IWCMC) (2024), pp. 1558-1563
Open Access | Times Cited: 5

Research on Improved LSTM and Deep Learning Intrusion Detection Algorithms
Baoguo Liu, Eric Blancaflor, Mideth Abisado
Journal of Machine and Computing (2025), pp. 076-088
Closed Access

Page 1 - Next Page

Scroll to top