OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

An end-to-end learning approach for enhancing intrusion detection in Industrial-Internet of Things
Karima Hassini, Safae Khalis, Omar Habibi, et al.
Knowledge-Based Systems (2024) Vol. 294, pp. 111785-111785
Closed Access | Times Cited: 14

Showing 14 citing articles:

An Approach to Deepfake Video Detection Based on ACO-PSO Features and Deep Learning
Hanan Saleh Alhaji, Yüksel Çelik, Sanjay Goel
Electronics (2024) Vol. 13, Iss. 12, pp. 2398-2398
Open Access | Times Cited: 7

Enhancing cybersecurity in Edge IIoT networks: An asynchronous federated learning approach with a deep hybrid detection model
Syed Muhammad Salman Bukhari, Muhammad Hamza Zafar, Mohamad Abou Houran, et al.
Internet of Things (2024) Vol. 27, pp. 101252-101252
Open Access | Times Cited: 5

Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, Threats, and Future Directions
Tamara Zhukabayeva, Lazzat Zholshiyeva, Nurdaulet Karabayev, et al.
Sensors (2025) Vol. 25, Iss. 1, pp. 213-213
Open Access

CO-STOP: A Robust P4-Powered Adaptive Framework for Comprehensive Detection and Mitigation of Coordinated and Multi-Faceted Attacks in SD-IoT Networks
Ameer El-Sayed, Ahmed A. Toony, Fayez Alqahtani, et al.
Computers & Security (2025), pp. 104349-104349
Closed Access

Llmbd: Backdoor Defense Via Large Language Model Paraphrasing and Data Voting in Nlp
Fei Ouyang, Di Zhang, Chunlong Xie, et al.
(2025)
Closed Access

Securing Industry 5.0: An explainable deep learning model for intrusion detection in cyber-physical systems
Himanshu Nandanwar, Rahul Katarya
Computers & Electrical Engineering (2025) Vol. 123, pp. 110161-110161
Closed Access

SMFDNet: spatial and multi-frequency domain network for OCT angiography retinal vessel segmentation
Sien Li, Fei Ma, Feng Yan, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 4
Closed Access

Automatic optimization for generating adversarial malware based on prioritized evolutionary computing
Yaochang Xu, Yong Fang, Yijia Xu, et al.
Applied Soft Computing (2025) Vol. 173, pp. 112933-112933
Closed Access

Generalizability Assessment of Learning‐Based Intrusion Detection Systems for IoT Security: Perspectives of Data Diversity
Zakir Ahmad Sheikh, Narinder Verma, Yashwant Singh, et al.
Security and Privacy (2025) Vol. 8, Iss. 2
Closed Access

Development of lightweight intrusion model in Industrial Internet of Things using deep learning technique
Raj Sinha, Padmanabh Thakur, Sandeep Gupta, et al.
Deleted Journal (2024) Vol. 6, Iss. 7
Open Access | Times Cited: 3

Deep-Learning-Based Approach for IoT Attack and Malware Detection
Burak Taşçı
Applied Sciences (2024) Vol. 14, Iss. 18, pp. 8505-8505
Open Access | Times Cited: 2

Enhancing the security in IoT and IIoT networks: An intrusion detection scheme leveraging deep transfer learning
Basharat Ahmad, Zhaoliang Wu, Yongfeng Huang, et al.
Knowledge-Based Systems (2024) Vol. 305, pp. 112614-112614
Closed Access | Times Cited: 2

Enhanced Deep Learning for IIoT Threat Intelligence: Revealing Advanced Persistent Threat Attack Patterns
M. K. Vishnu Priya, H. Anila Glory, V. S. Shankar Sriram
Communications in computer and information science (2024), pp. 201-217
Closed Access

Position Papers of the 19th Conference on Computer Science and Intelligence Systems

Annals of Computer Science and Information Systems (2024) Vol. 40
Open Access

A Robust Anomaly Detection Approach for IIoT Time Series
Z. Lü
(2024), pp. 168-173
Closed Access

Page 1

Scroll to top