
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Intelligent approaches toward intrusion detection systems for Industrial Internet of Things: A systematic comprehensive review
Mudhafar Nuaimi, Lamia Chaari Fourati, Bassem Ben Hamed
Journal of Network and Computer Applications (2023) Vol. 215, pp. 103637-103637
Closed Access | Times Cited: 46
Mudhafar Nuaimi, Lamia Chaari Fourati, Bassem Ben Hamed
Journal of Network and Computer Applications (2023) Vol. 215, pp. 103637-103637
Closed Access | Times Cited: 46
Showing 1-25 of 46 citing articles:
Blockchain and federated learning-based intrusion detection approaches for edge-enabled industrial IoT networks: a survey
Saqib Ali, Qianmu Li, Abdullah Yousafzai
Ad Hoc Networks (2023) Vol. 152, pp. 103320-103320
Closed Access | Times Cited: 60
Saqib Ali, Qianmu Li, Abdullah Yousafzai
Ad Hoc Networks (2023) Vol. 152, pp. 103320-103320
Closed Access | Times Cited: 60
An end-to-end learning approach for enhancing intrusion detection in Industrial-Internet of Things
Karima Hassini, Safae Khalis, Omar Habibi, et al.
Knowledge-Based Systems (2024) Vol. 294, pp. 111785-111785
Closed Access | Times Cited: 15
Karima Hassini, Safae Khalis, Omar Habibi, et al.
Knowledge-Based Systems (2024) Vol. 294, pp. 111785-111785
Closed Access | Times Cited: 15
GPT and Interpolation-Based Data Augmentation for Multiclass Intrusion Detection in IIoT
Francisco S. Melícias, Tiago Ribeiro, Carlos Rabadão, et al.
IEEE Access (2024) Vol. 12, pp. 17945-17965
Open Access | Times Cited: 10
Francisco S. Melícias, Tiago Ribeiro, Carlos Rabadão, et al.
IEEE Access (2024) Vol. 12, pp. 17945-17965
Open Access | Times Cited: 10
A Self-Attention-Based Deep Convolutional Neural Networks for IIoT Networks Intrusion Detection
Mohammed S. Alshehri, Oumaima Saidani, Fatma S. Alrayes, et al.
IEEE Access (2024) Vol. 12, pp. 45762-45772
Open Access | Times Cited: 8
Mohammed S. Alshehri, Oumaima Saidani, Fatma S. Alrayes, et al.
IEEE Access (2024) Vol. 12, pp. 45762-45772
Open Access | Times Cited: 8
HMS-IDS: Threat Intelligence Integration for Zero-Day Exploits and Advanced Persistent Threats in IIoT
Kumar Saurabh, Vaidik Sharma, Uphar Singh, et al.
Arabian Journal for Science and Engineering (2024)
Closed Access | Times Cited: 8
Kumar Saurabh, Vaidik Sharma, Uphar Singh, et al.
Arabian Journal for Science and Engineering (2024)
Closed Access | Times Cited: 8
A hybrid evolutionary and machine learning approach for smart city planning: Digital twin approach
Chongxing Ji, Yi Niu
Sustainable Energy Technologies and Assessments (2024) Vol. 64, pp. 103650-103650
Closed Access | Times Cited: 5
Chongxing Ji, Yi Niu
Sustainable Energy Technologies and Assessments (2024) Vol. 64, pp. 103650-103650
Closed Access | Times Cited: 5
SmartSentry: Cyber Threat Intelligence in Industrial IoT
Sapna Sadhwani, Urvi Kavan Modi, Raja Muthalagu, et al.
IEEE Access (2024) Vol. 12, pp. 34720-34740
Open Access | Times Cited: 5
Sapna Sadhwani, Urvi Kavan Modi, Raja Muthalagu, et al.
IEEE Access (2024) Vol. 12, pp. 34720-34740
Open Access | Times Cited: 5
Anomaly and intrusion detection using deep learning for software-defined networks: A survey
Vitor Gabriel da Silva Ruffo, Daniel Matheus Brandão Lent, Mateus Komarchesqui, et al.
Expert Systems with Applications (2024) Vol. 256, pp. 124982-124982
Closed Access | Times Cited: 5
Vitor Gabriel da Silva Ruffo, Daniel Matheus Brandão Lent, Mateus Komarchesqui, et al.
Expert Systems with Applications (2024) Vol. 256, pp. 124982-124982
Closed Access | Times Cited: 5
WFE-Tab: Overcoming limitations of TabPFN in IIoT-MEC environments with a weighted fusion ensemble-TabPFN model for improved IDS performance
Sergio Ruiz-Villafranca, José Roldán-Gómez, Javier Carrillo-Mondéjar, et al.
Future Generation Computer Systems (2025), pp. 107707-107707
Closed Access
Sergio Ruiz-Villafranca, José Roldán-Gómez, Javier Carrillo-Mondéjar, et al.
Future Generation Computer Systems (2025), pp. 107707-107707
Closed Access
FL-CTIF: A federated learning based CTI framework based on information fusion for secure IIoT
Mikail Mohammed Salim, Abir El Azzaoui, Xianjun Deng, et al.
Information Fusion (2023) Vol. 102, pp. 102074-102074
Closed Access | Times Cited: 15
Mikail Mohammed Salim, Abir El Azzaoui, Xianjun Deng, et al.
Information Fusion (2023) Vol. 102, pp. 102074-102074
Closed Access | Times Cited: 15
Comprehensive systematic review of intelligent approaches in UAV-based intrusion detection, blockchain, and network security
Ahmed Burhan Mohammed, Lamia Chaari Fourati, Ahmed M. Fakhrudeen
Computer Networks (2023) Vol. 239, pp. 110140-110140
Closed Access | Times Cited: 14
Ahmed Burhan Mohammed, Lamia Chaari Fourati, Ahmed M. Fakhrudeen
Computer Networks (2023) Vol. 239, pp. 110140-110140
Closed Access | Times Cited: 14
Intrusion detection system: a deep neural network-based concatenated approach
Hidangmayum Satyajeet Sharma, Khundrakpam Johnson Singh
The Journal of Supercomputing (2024) Vol. 80, Iss. 10, pp. 13918-13948
Closed Access | Times Cited: 4
Hidangmayum Satyajeet Sharma, Khundrakpam Johnson Singh
The Journal of Supercomputing (2024) Vol. 80, Iss. 10, pp. 13918-13948
Closed Access | Times Cited: 4
Scrutinizing Security in Industrial Control Systems: An Architectural Vulnerabilities and Communication Network Perspective
Muhammad Muzamil Aslam, Ali Tufail, Rosyzie Anna Awg Haji Mohd Apong, et al.
IEEE Access (2024) Vol. 12, pp. 67537-67573
Open Access | Times Cited: 4
Muhammad Muzamil Aslam, Ali Tufail, Rosyzie Anna Awg Haji Mohd Apong, et al.
IEEE Access (2024) Vol. 12, pp. 67537-67573
Open Access | Times Cited: 4
A deep learning-based approach with two-step minority classes prediction for intrusion detection in Internet of Things networks
Salah-Eddine Maoudj, Aissam Belghiat
Knowledge-Based Systems (2025), pp. 113143-113143
Closed Access
Salah-Eddine Maoudj, Aissam Belghiat
Knowledge-Based Systems (2025), pp. 113143-113143
Closed Access
Two‐Stage Botnet Detection Method Based on Feature Selection for Industrial Internet of Things
Shu Jian, J.-H Lu
IET Information Security (2025) Vol. 2025, Iss. 1
Open Access
Shu Jian, J.-H Lu
IET Information Security (2025) Vol. 2025, Iss. 1
Open Access
Collaborative Defense Strategies: AI, ML, and Cybersecurity: A Comprehensive Study
Samarjeet Borah, Dharmesh Dhabliya, Prashant Dhage, et al.
Smart innovation, systems and technologies (2025), pp. 451-462
Closed Access
Samarjeet Borah, Dharmesh Dhabliya, Prashant Dhage, et al.
Smart innovation, systems and technologies (2025), pp. 451-462
Closed Access
Next-generation IIoT security: Comprehensive comparative analysis of CNN-based approaches
Huiyao Dong, Igor Kotenko, Dmitry Levshun
Knowledge-Based Systems (2025), pp. 113337-113337
Closed Access
Huiyao Dong, Igor Kotenko, Dmitry Levshun
Knowledge-Based Systems (2025), pp. 113337-113337
Closed Access
A TabPFN-based intrusion detection system for the industrial internet of things
Sergio Ruiz-Villafranca, José Roldán-Gómez, Juan Manuel Castelo Gómez, et al.
The Journal of Supercomputing (2024) Vol. 80, Iss. 14, pp. 20080-20117
Open Access | Times Cited: 3
Sergio Ruiz-Villafranca, José Roldán-Gómez, Juan Manuel Castelo Gómez, et al.
The Journal of Supercomputing (2024) Vol. 80, Iss. 14, pp. 20080-20117
Open Access | Times Cited: 3
Detecting the cyber-physical-social cooperated APTs in high-DER-penetrated smart grids: Threats, current work and challenges
Qiuyu Lu, June Li, Peng Zhao, et al.
Computer Networks (2024) Vol. 254, pp. 110776-110776
Closed Access | Times Cited: 3
Qiuyu Lu, June Li, Peng Zhao, et al.
Computer Networks (2024) Vol. 254, pp. 110776-110776
Closed Access | Times Cited: 3
GateKeeper: An UltraLite malicious traffic identification method with dual-aspect optimization strategies on IoT gateways
Jie Cao, Yuwei Xu, Enze Yu, et al.
Computer Networks (2024) Vol. 250, pp. 110556-110556
Closed Access | Times Cited: 2
Jie Cao, Yuwei Xu, Enze Yu, et al.
Computer Networks (2024) Vol. 250, pp. 110556-110556
Closed Access | Times Cited: 2
Secure architecture for Industrial Edge of Things(IEoT): A hierarchical perspective
Pengyong Li, Jiaqi Xia, Qian Wang, et al.
Computer Networks (2024) Vol. 251, pp. 110641-110641
Closed Access | Times Cited: 2
Pengyong Li, Jiaqi Xia, Qian Wang, et al.
Computer Networks (2024) Vol. 251, pp. 110641-110641
Closed Access | Times Cited: 2
A Carrying Method for 5G Network Slicing in Smart Grid Communication Services Based on Neural Network
Yang Hu, Liangliang Gong, Xinyang Li, et al.
Future Internet (2023) Vol. 15, Iss. 7, pp. 247-247
Open Access | Times Cited: 5
Yang Hu, Liangliang Gong, Xinyang Li, et al.
Future Internet (2023) Vol. 15, Iss. 7, pp. 247-247
Open Access | Times Cited: 5
Novel modeling and optimization for joint Cybersecurity-vs-QoS Intrusion Detection Mechanisms in 5G networks
Arash Bozorgchenani, Charilaos C. Zarakovitis, Su Fong Chien, et al.
Computer Networks (2023) Vol. 237, pp. 110051-110051
Open Access | Times Cited: 5
Arash Bozorgchenani, Charilaos C. Zarakovitis, Su Fong Chien, et al.
Computer Networks (2023) Vol. 237, pp. 110051-110051
Open Access | Times Cited: 5
Enhancing Cloud-Based Security: A Novel Approach for Efficient Cyber-Threat Detection Using GSCSO-IHNN Model
Divya Ramachandran, Mubarak Albathan, Ayyaz Hussain, et al.
Systems (2023) Vol. 11, Iss. 10, pp. 518-518
Open Access | Times Cited: 4
Divya Ramachandran, Mubarak Albathan, Ayyaz Hussain, et al.
Systems (2023) Vol. 11, Iss. 10, pp. 518-518
Open Access | Times Cited: 4
Intrusion Detection Techniques in Internet of Things: A Bird’s Eye View
Mayank Gautam, Sachin Ahuja, Abhishek Kumar
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) (2024), pp. 622-628
Closed Access | Times Cited: 1
Mayank Gautam, Sachin Ahuja, Abhishek Kumar
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) (2024), pp. 622-628
Closed Access | Times Cited: 1