OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Adversarial machine learning in IoT from an insider point of view
Fatimah Aloraini, Amir Javed, Omer Rana, et al.
Journal of Information Security and Applications (2022) Vol. 70, pp. 103341-103341
Open Access | Times Cited: 25

Showing 25 citing articles:

A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks
Hassan Khazane, Mohammed Ridouani, Fatima Salahdine, et al.
Future Internet (2024) Vol. 16, Iss. 1, pp. 32-32
Open Access | Times Cited: 17

Towards a robust, effective and resource efficient machine learning technique for IoT security monitoring
Idris Zakariyya, Harsha Kalutarage, M. Omar Al-Kadri
Computers & Security (2023) Vol. 133, pp. 103388-103388
Open Access | Times Cited: 16

Insider threat detection in cyber-physical systems: a systematic literature review
Mohammed Nasser Al‐Mhiqani, Tariq Alsboui, Taher Al‐Shehari, et al.
Computers & Electrical Engineering (2024) Vol. 119, pp. 109489-109489
Open Access | Times Cited: 5

Security, privacy, and robustness for trustworthy AI systems: A review
Mozamel M. Saeed, Mohammed Alsharidah
Computers & Electrical Engineering (2024) Vol. 119, pp. 109643-109643
Closed Access | Times Cited: 5

Twigs classifiers based on the Boundary Vectors Machine (BVM): A novel approach for supervised learning
Kamel Mebarkia, Aicha Reffad
Information Sciences (2025), pp. 121853-121853
Closed Access

Balancing Innovation and Privacy in the Age of Artificial Intelligence
Tunde Toyese Oyedokun
IGI Global eBooks (2025), pp. 343-376
Closed Access

Optimizing XGBoost hyperparameters using the dragonfly algorithm for enhanced cyber attack detection in the internet of healthcare things (IoHT)
SURBHI SURBHI, Nupa Ram Chauhan, Neeraj Dahiya
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access

Insights into user behavioral-based insider threat detection: systematic review
K. Kartheeban, E. Uma
International Journal of Information Security (2025) Vol. 24, Iss. 2
Closed Access

A trust-centric approach to intrusion detection in edge networks for medical internet of thing Ecosystems
G. Nagarajan, Martin Margala, Siva Shankar S, et al.
Computers & Electrical Engineering (2024) Vol. 115, pp. 109129-109129
Closed Access | Times Cited: 4

Mitigating Insider Threat: A Neural Network Approach for Enhanced Security
P. Lavanya, H. Anila Glory, V. S. Shankar Sriram
IEEE Access (2024) Vol. 12, pp. 73752-73768
Open Access | Times Cited: 4

Evasion Attack and Defense on Machine Learning Models in Cyber-Physical Systems: A Survey
Shunyao Wang, Ryan K. L. Ko, Guangdong Bai, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 26, Iss. 2, pp. 930-966
Open Access | Times Cited: 10

An Investigation of Energy Consumption in Fused Deposition Modelling using ESP32 IoT Monitoring System
Sakinah Zakaria, Paul Mativenga, E.A.R Engku Ariff
Procedia CIRP (2023) Vol. 116, pp. 263-268
Open Access | Times Cited: 8

Numerical Feature Selection and Hyperbolic Tangent Feature Scaling in Machine Learning-Based Detection of Anomalies in the Computer Network Behavior
Danijela Protić, Miomir Stanković, Radomir Prodanović, et al.
Electronics (2023) Vol. 12, Iss. 19, pp. 4158-4158
Open Access | Times Cited: 7

Adversarial Attacks on Intrusion Detection Systems in In-Vehicle Networks of Connected and Autonomous Vehicles
Fatimah Aloraini, Amir Javed, Omer Rana
Sensors (2024) Vol. 24, Iss. 12, pp. 3848-3848
Open Access | Times Cited: 2

MFEMDroid: A Novel Malware Detection Framework Using Combined Multitype Features and Ensemble Modeling
Wei Gu, Hongyan Xing, Tianhao Hou
IET Information Security (2024) Vol. 2024, pp. 1-12
Open Access

Roadmap of Adversarial Machine Learning in Internet of Things-Enabled Security Systems
Yasmine Harbi, Khedidja Medani, Chirihane Gherbi, et al.
Sensors (2024) Vol. 24, Iss. 16, pp. 5150-5150
Open Access

Systematic survey on artificial intelligence based mobile crowd sensing and sourcing solutions: Applications and security challenges
Ruba Nasser, Rabeb Mizouni, Shakti Singh, et al.
Ad Hoc Networks (2024) Vol. 164, pp. 103634-103634
Closed Access

Unifying Robust Activation Functions for Reduced Adversarial Vulnerability with the Parametric Generalized Gamma Function
Sheila Alemany, Emma Worthington, Alberto Castaño Domínguez, et al.
(2024), pp. 1892-1899
Closed Access

Pattern Recognition by IoT Systems of Machine Learning
Shyam R. Sihare
Advances in systems analysis, software engineering, and high performance computing book series (2023), pp. 18-51
Closed Access | Times Cited: 1

Adaptation issues of machine learning in safety digitization
Gyana Ranjana Panigrahi, Nalini Kanta Barpanda, K. Anitha, et al.
Indonesian Journal of Electrical Engineering and Computer Science (2022) Vol. 29, Iss. 3, pp. 1802-1802
Open Access | Times Cited: 1

Pengembangan Auto-AI Model Generatif Analisis Kompleksitas Waktu Algoritma Untuk Data Multi-Sensor IoT Pada Node-RED Menggunakan Extreme Learning Machine
Imam Cholissodin, Dahnial Syauqy, Dwi Ady Firmanda, et al.
Jurnal Teknologi Informasi dan Ilmu Komputer (2022) Vol. 9, Iss. 7, pp. 1349-1349
Open Access | Times Cited: 1

Security Landscape of Anomaly based Defence Mechanisms in Edge Environments
Aditya Wath, Tom Kurian, John Paul Martin
(2023), pp. 395-400
Closed Access

A Survey on AI-Enabled Attacks and AI-Empowered Countermeasures in Physical Layer
Jingdong Chang, Li Zhao, Masoud Kaveh, et al.
(2023), pp. 1-7
Closed Access

Page 1

Scroll to top