
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
IDSoft: A federated and softwarized intrusion detection framework for massive internet of things in 6G network
Asma Alotaibi, Ahmed Barnawi
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 6, pp. 101575-101575
Open Access | Times Cited: 17
Asma Alotaibi, Ahmed Barnawi
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 6, pp. 101575-101575
Open Access | Times Cited: 17
Showing 17 citing articles:
Real-time fusion multi-tier DNN-based collaborative IDPS with complementary features for secure UAV-enabled 6G networks
Hassan Jalil Hadi, Yue Cao, Sifan Li, et al.
Expert Systems with Applications (2024) Vol. 252, pp. 124215-124215
Closed Access | Times Cited: 10
Hassan Jalil Hadi, Yue Cao, Sifan Li, et al.
Expert Systems with Applications (2024) Vol. 252, pp. 124215-124215
Closed Access | Times Cited: 10
Intelligent deep federated learning model for enhancing security in internet of things enabled edge computing environment
Nasser Albogami
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access | Times Cited: 1
Nasser Albogami
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access | Times Cited: 1
Survey on Federated Learning for Intrusion Detection System: Concept, Architectures, Aggregation Strategies, Challenges, and Future Directions
Ansam Khraisat, Ammar Alazab, Sarabjot Singh, et al.
ACM Computing Surveys (2024) Vol. 57, Iss. 1, pp. 1-38
Open Access | Times Cited: 4
Ansam Khraisat, Ammar Alazab, Sarabjot Singh, et al.
ACM Computing Surveys (2024) Vol. 57, Iss. 1, pp. 1-38
Open Access | Times Cited: 4
Game theory-based optimization for efficient IoT task offloading in 6G network base stations
Ismail Keshta, Mukesh Soni, Nabamita Deb, et al.
Measurement Sensors (2024) Vol. 33, pp. 101184-101184
Open Access | Times Cited: 3
Ismail Keshta, Mukesh Soni, Nabamita Deb, et al.
Measurement Sensors (2024) Vol. 33, pp. 101184-101184
Open Access | Times Cited: 3
Review on Approaches of Federated Modeling in Anomaly-Based Intrusion Detection for IoT Devices
Umar Isma’ila Audi, Kamaluddeen Usman Danyaro, Aminu Aminu Muazu, et al.
IEEE Access (2024) Vol. 12, pp. 30941-30961
Open Access | Times Cited: 2
Umar Isma’ila Audi, Kamaluddeen Usman Danyaro, Aminu Aminu Muazu, et al.
IEEE Access (2024) Vol. 12, pp. 30941-30961
Open Access | Times Cited: 2
A look into smart factory for Industrial IoT driven by SDN technology: A comprehensive survey of taxonomy, architectures, issues and future research orientations
Nteziriza Nkerabahizi Josbert, Min Wei, Ping Wang, et al.
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 5, pp. 102069-102069
Open Access | Times Cited: 2
Nteziriza Nkerabahizi Josbert, Min Wei, Ping Wang, et al.
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 5, pp. 102069-102069
Open Access | Times Cited: 2
Blockchain and AI for Collaborative Intrusion Detection in 6G-enabled IoT Networks
Massinissa Chelghoum, Gueltoum Bendiab, Mohamed Aymen Labiod, et al.
(2024), pp. 179-184
Closed Access | Times Cited: 2
Massinissa Chelghoum, Gueltoum Bendiab, Mohamed Aymen Labiod, et al.
(2024), pp. 179-184
Closed Access | Times Cited: 2
Cybersecurity for tactical 6G networks: Threats, architecture, and intelligence
Jani Suomalainen, Ijaz Ahmad, Annette Shajan, et al.
Future Generation Computer Systems (2024) Vol. 162, pp. 107500-107500
Open Access | Times Cited: 2
Jani Suomalainen, Ijaz Ahmad, Annette Shajan, et al.
Future Generation Computer Systems (2024) Vol. 162, pp. 107500-107500
Open Access | Times Cited: 2
FBMP-IDS: FL-Based Blockchain-Powered Lightweight MPC-Secured IDS for 6G Networks
Sabrina Sakraoui, Ahmed Ahmim, Makhlouf Derdour, et al.
IEEE Access (2024) Vol. 12, pp. 105887-105905
Open Access | Times Cited: 1
Sabrina Sakraoui, Ahmed Ahmim, Makhlouf Derdour, et al.
IEEE Access (2024) Vol. 12, pp. 105887-105905
Open Access | Times Cited: 1
Efficient Internet-of-Things Cyberattack Depletion Using Blockchain-Enabled Software-Defined Networking and 6G Network Technology
Abdul Razaque, Joon Yoo, Gulnara Bektemyssova, et al.
Sensors (2023) Vol. 23, Iss. 24, pp. 9690-9690
Open Access | Times Cited: 3
Abdul Razaque, Joon Yoo, Gulnara Bektemyssova, et al.
Sensors (2023) Vol. 23, Iss. 24, pp. 9690-9690
Open Access | Times Cited: 3
An Adaptive Biomimetic Ant Colony Optimization With 6G Integration for IoT Network Communication
Sonia Khan, Kamran Ahmad Awan, Ikram Ud Din, et al.
IEEE Access (2023) Vol. 11, pp. 95584-95599
Open Access | Times Cited: 2
Sonia Khan, Kamran Ahmad Awan, Ikram Ud Din, et al.
IEEE Access (2023) Vol. 11, pp. 95584-95599
Open Access | Times Cited: 2
Trust-Centric and Economically Optimized Resource Management for 6G-Enabled Internet of Things Environment
Osama Zwaid Aletri, Kamran Ahmad Awan, Abdullah M. Alqahtani
Computers (2024) Vol. 14, Iss. 1, pp. 10-10
Open Access
Osama Zwaid Aletri, Kamran Ahmad Awan, Abdullah M. Alqahtani
Computers (2024) Vol. 14, Iss. 1, pp. 10-10
Open Access
Efficient computation for task offloading in 6G mobile computing systems
Pallavi Khatri, Bernadeth Tongli, Pankaj Kumar, et al.
International Journal of Data Science and Analytics (2024)
Closed Access
Pallavi Khatri, Bernadeth Tongli, Pankaj Kumar, et al.
International Journal of Data Science and Analytics (2024)
Closed Access
Social Network Forensics Analysis Model Based on Network Representation Learning
Kuo Zhao, Huajian Zhang, Jiaxin Li, et al.
Entropy (2024) Vol. 26, Iss. 7, pp. 579-579
Open Access
Kuo Zhao, Huajian Zhang, Jiaxin Li, et al.
Entropy (2024) Vol. 26, Iss. 7, pp. 579-579
Open Access
Explainable Prediction of features contributing to Intrusion Detection using ML algorithms and LIME
Satish Kumar, Prakash Paudel, Ruby Saud, et al.
(2023)
Open Access | Times Cited: 1
Satish Kumar, Prakash Paudel, Ruby Saud, et al.
(2023)
Open Access | Times Cited: 1
Robust Deep Regressive Neural Learning Based Intrusion Detection and Prevention in Wireless Communication
Jay Prakash, G Anitha
(2023), pp. 1-6
Closed Access
Jay Prakash, G Anitha
(2023), pp. 1-6
Closed Access
Personalized Federated Learning based Intrusion Detection Approach for Metaverse
Gurpreet Singh, P. Rajalakshmi, Yong Xiang
(2023)
Closed Access
Gurpreet Singh, P. Rajalakshmi, Yong Xiang
(2023)
Closed Access