
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Adversarial machine learning in IoT from an insider point of view
Fatimah Aloraini, Amir Javed, Omer Rana, et al.
Journal of Information Security and Applications (2022) Vol. 70, pp. 103341-103341
Open Access | Times Cited: 25
Fatimah Aloraini, Amir Javed, Omer Rana, et al.
Journal of Information Security and Applications (2022) Vol. 70, pp. 103341-103341
Open Access | Times Cited: 25
Showing 25 citing articles:
A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks
Hassan Khazane, Mohammed Ridouani, Fatima Salahdine, et al.
Future Internet (2024) Vol. 16, Iss. 1, pp. 32-32
Open Access | Times Cited: 17
Hassan Khazane, Mohammed Ridouani, Fatima Salahdine, et al.
Future Internet (2024) Vol. 16, Iss. 1, pp. 32-32
Open Access | Times Cited: 17
Towards a robust, effective and resource efficient machine learning technique for IoT security monitoring
Idris Zakariyya, Harsha Kalutarage, M. Omar Al-Kadri
Computers & Security (2023) Vol. 133, pp. 103388-103388
Open Access | Times Cited: 16
Idris Zakariyya, Harsha Kalutarage, M. Omar Al-Kadri
Computers & Security (2023) Vol. 133, pp. 103388-103388
Open Access | Times Cited: 16
Insider threat detection in cyber-physical systems: a systematic literature review
Mohammed Nasser Al‐Mhiqani, Tariq Alsboui, Taher Al‐Shehari, et al.
Computers & Electrical Engineering (2024) Vol. 119, pp. 109489-109489
Open Access | Times Cited: 5
Mohammed Nasser Al‐Mhiqani, Tariq Alsboui, Taher Al‐Shehari, et al.
Computers & Electrical Engineering (2024) Vol. 119, pp. 109489-109489
Open Access | Times Cited: 5
Security, privacy, and robustness for trustworthy AI systems: A review
Mozamel M. Saeed, Mohammed Alsharidah
Computers & Electrical Engineering (2024) Vol. 119, pp. 109643-109643
Closed Access | Times Cited: 5
Mozamel M. Saeed, Mohammed Alsharidah
Computers & Electrical Engineering (2024) Vol. 119, pp. 109643-109643
Closed Access | Times Cited: 5
Twigs classifiers based on the Boundary Vectors Machine (BVM): A novel approach for supervised learning
Kamel Mebarkia, Aicha Reffad
Information Sciences (2025), pp. 121853-121853
Closed Access
Kamel Mebarkia, Aicha Reffad
Information Sciences (2025), pp. 121853-121853
Closed Access
Balancing Innovation and Privacy in the Age of Artificial Intelligence
Tunde Toyese Oyedokun
IGI Global eBooks (2025), pp. 343-376
Closed Access
Tunde Toyese Oyedokun
IGI Global eBooks (2025), pp. 343-376
Closed Access
Optimizing XGBoost hyperparameters using the dragonfly algorithm for enhanced cyber attack detection in the internet of healthcare things (IoHT)
SURBHI SURBHI, Nupa Ram Chauhan, Neeraj Dahiya
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access
SURBHI SURBHI, Nupa Ram Chauhan, Neeraj Dahiya
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access
Insights into user behavioral-based insider threat detection: systematic review
K. Kartheeban, E. Uma
International Journal of Information Security (2025) Vol. 24, Iss. 2
Closed Access
K. Kartheeban, E. Uma
International Journal of Information Security (2025) Vol. 24, Iss. 2
Closed Access
A trust-centric approach to intrusion detection in edge networks for medical internet of thing Ecosystems
G. Nagarajan, Martin Margala, Siva Shankar S, et al.
Computers & Electrical Engineering (2024) Vol. 115, pp. 109129-109129
Closed Access | Times Cited: 4
G. Nagarajan, Martin Margala, Siva Shankar S, et al.
Computers & Electrical Engineering (2024) Vol. 115, pp. 109129-109129
Closed Access | Times Cited: 4
Mitigating Insider Threat: A Neural Network Approach for Enhanced Security
P. Lavanya, H. Anila Glory, V. S. Shankar Sriram
IEEE Access (2024) Vol. 12, pp. 73752-73768
Open Access | Times Cited: 4
P. Lavanya, H. Anila Glory, V. S. Shankar Sriram
IEEE Access (2024) Vol. 12, pp. 73752-73768
Open Access | Times Cited: 4
Evasion Attack and Defense on Machine Learning Models in Cyber-Physical Systems: A Survey
Shunyao Wang, Ryan K. L. Ko, Guangdong Bai, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 26, Iss. 2, pp. 930-966
Open Access | Times Cited: 10
Shunyao Wang, Ryan K. L. Ko, Guangdong Bai, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 26, Iss. 2, pp. 930-966
Open Access | Times Cited: 10
An Investigation of Energy Consumption in Fused Deposition Modelling using ESP32 IoT Monitoring System
Sakinah Zakaria, Paul Mativenga, E.A.R Engku Ariff
Procedia CIRP (2023) Vol. 116, pp. 263-268
Open Access | Times Cited: 8
Sakinah Zakaria, Paul Mativenga, E.A.R Engku Ariff
Procedia CIRP (2023) Vol. 116, pp. 263-268
Open Access | Times Cited: 8
Numerical Feature Selection and Hyperbolic Tangent Feature Scaling in Machine Learning-Based Detection of Anomalies in the Computer Network Behavior
Danijela Protić, Miomir Stanković, Radomir Prodanović, et al.
Electronics (2023) Vol. 12, Iss. 19, pp. 4158-4158
Open Access | Times Cited: 7
Danijela Protić, Miomir Stanković, Radomir Prodanović, et al.
Electronics (2023) Vol. 12, Iss. 19, pp. 4158-4158
Open Access | Times Cited: 7
Adversarial Attacks on Intrusion Detection Systems in In-Vehicle Networks of Connected and Autonomous Vehicles
Fatimah Aloraini, Amir Javed, Omer Rana
Sensors (2024) Vol. 24, Iss. 12, pp. 3848-3848
Open Access | Times Cited: 2
Fatimah Aloraini, Amir Javed, Omer Rana
Sensors (2024) Vol. 24, Iss. 12, pp. 3848-3848
Open Access | Times Cited: 2
Exploring the Vulnerabilities of Machine Learning and Quantum Machine Learning to Adversarial Attacks Using a Malware Dataset: A Comparative Analysis
Mst Shapna Akter, Hossain Shahriar, Iysa Iqbal, et al.
(2023), pp. 222-231
Open Access | Times Cited: 5
Mst Shapna Akter, Hossain Shahriar, Iysa Iqbal, et al.
(2023), pp. 222-231
Open Access | Times Cited: 5
MFEMDroid: A Novel Malware Detection Framework Using Combined Multitype Features and Ensemble Modeling
Wei Gu, Hongyan Xing, Tianhao Hou
IET Information Security (2024) Vol. 2024, pp. 1-12
Open Access
Wei Gu, Hongyan Xing, Tianhao Hou
IET Information Security (2024) Vol. 2024, pp. 1-12
Open Access
Systematic Survey on Ai-Based Mobile Crowd Sensing/Sourcing Solutions: Applications and Securitychallenges
Rabeb Mizouni, Ruba Nasser, Hadi Otrok, et al.
(2024)
Closed Access
Rabeb Mizouni, Ruba Nasser, Hadi Otrok, et al.
(2024)
Closed Access
Roadmap of Adversarial Machine Learning in Internet of Things-Enabled Security Systems
Yasmine Harbi, Khedidja Medani, Chirihane Gherbi, et al.
Sensors (2024) Vol. 24, Iss. 16, pp. 5150-5150
Open Access
Yasmine Harbi, Khedidja Medani, Chirihane Gherbi, et al.
Sensors (2024) Vol. 24, Iss. 16, pp. 5150-5150
Open Access
Systematic survey on artificial intelligence based mobile crowd sensing and sourcing solutions: Applications and security challenges
Ruba Nasser, Rabeb Mizouni, Shakti Singh, et al.
Ad Hoc Networks (2024) Vol. 164, pp. 103634-103634
Closed Access
Ruba Nasser, Rabeb Mizouni, Shakti Singh, et al.
Ad Hoc Networks (2024) Vol. 164, pp. 103634-103634
Closed Access
Unifying Robust Activation Functions for Reduced Adversarial Vulnerability with the Parametric Generalized Gamma Function
Sheila Alemany, Emma Worthington, Alberto Castaño Domínguez, et al.
(2024), pp. 1892-1899
Closed Access
Sheila Alemany, Emma Worthington, Alberto Castaño Domínguez, et al.
(2024), pp. 1892-1899
Closed Access
Pattern Recognition by IoT Systems of Machine Learning
Shyam R. Sihare
Advances in systems analysis, software engineering, and high performance computing book series (2023), pp. 18-51
Closed Access | Times Cited: 1
Shyam R. Sihare
Advances in systems analysis, software engineering, and high performance computing book series (2023), pp. 18-51
Closed Access | Times Cited: 1
Adaptation issues of machine learning in safety digitization
Gyana Ranjana Panigrahi, Nalini Kanta Barpanda, K. Anitha, et al.
Indonesian Journal of Electrical Engineering and Computer Science (2022) Vol. 29, Iss. 3, pp. 1802-1802
Open Access | Times Cited: 1
Gyana Ranjana Panigrahi, Nalini Kanta Barpanda, K. Anitha, et al.
Indonesian Journal of Electrical Engineering and Computer Science (2022) Vol. 29, Iss. 3, pp. 1802-1802
Open Access | Times Cited: 1
Pengembangan Auto-AI Model Generatif Analisis Kompleksitas Waktu Algoritma Untuk Data Multi-Sensor IoT Pada Node-RED Menggunakan Extreme Learning Machine
Imam Cholissodin, Dahnial Syauqy, Dwi Ady Firmanda, et al.
Jurnal Teknologi Informasi dan Ilmu Komputer (2022) Vol. 9, Iss. 7, pp. 1349-1349
Open Access | Times Cited: 1
Imam Cholissodin, Dahnial Syauqy, Dwi Ady Firmanda, et al.
Jurnal Teknologi Informasi dan Ilmu Komputer (2022) Vol. 9, Iss. 7, pp. 1349-1349
Open Access | Times Cited: 1
Security Landscape of Anomaly based Defence Mechanisms in Edge Environments
Aditya Wath, Tom Kurian, John Paul Martin
(2023), pp. 395-400
Closed Access
Aditya Wath, Tom Kurian, John Paul Martin
(2023), pp. 395-400
Closed Access
A Survey on AI-Enabled Attacks and AI-Empowered Countermeasures in Physical Layer
Jingdong Chang, Li Zhao, Masoud Kaveh, et al.
(2023), pp. 1-7
Closed Access
Jingdong Chang, Li Zhao, Masoud Kaveh, et al.
(2023), pp. 1-7
Closed Access