
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Intrusion detection models for IOT networks via deep learning approaches
Bhukya Madhu, M. Venu Gopalachari, Ramdas Vankdothu, et al.
Measurement Sensors (2022) Vol. 25, pp. 100641-100641
Open Access | Times Cited: 42
Bhukya Madhu, M. Venu Gopalachari, Ramdas Vankdothu, et al.
Measurement Sensors (2022) Vol. 25, pp. 100641-100641
Open Access | Times Cited: 42
Showing 1-25 of 42 citing articles:
Analysis of IoT Security Challenges and Its Solutions Using Artificial Intelligence
Tehseen Mazhar, Dhani Bux Talpur, Tamara Al Shloul, et al.
Brain Sciences (2023) Vol. 13, Iss. 4, pp. 683-683
Open Access | Times Cited: 63
Tehseen Mazhar, Dhani Bux Talpur, Tamara Al Shloul, et al.
Brain Sciences (2023) Vol. 13, Iss. 4, pp. 683-683
Open Access | Times Cited: 63
Deep Learning Models with Transfer Learning and Ensemble for Enhancing Cybersecurity in IoT Use Cases
Sivananda Hanumanthu, G. Anil Kumar
International Journal of Computational and Experimental Science and Engineering (2025) Vol. 11, Iss. 1
Open Access | Times Cited: 4
Sivananda Hanumanthu, G. Anil Kumar
International Journal of Computational and Experimental Science and Engineering (2025) Vol. 11, Iss. 1
Open Access | Times Cited: 4
Metaverse-IDS: Deep learning-based intrusion detection system for Metaverse-IoT networks
Tarek Gaber, Joseph Bamidele Awotunde, Mohamed Torky, et al.
Internet of Things (2023) Vol. 24, pp. 100977-100977
Open Access | Times Cited: 22
Tarek Gaber, Joseph Bamidele Awotunde, Mohamed Torky, et al.
Internet of Things (2023) Vol. 24, pp. 100977-100977
Open Access | Times Cited: 22
Combining Edge Computing-Assisted Internet of Things Security with Artificial Intelligence: Applications, Challenges, and Opportunities
Dulana Rupanetti, Naima Kaabouch
Applied Sciences (2024) Vol. 14, Iss. 16, pp. 7104-7104
Open Access | Times Cited: 10
Dulana Rupanetti, Naima Kaabouch
Applied Sciences (2024) Vol. 14, Iss. 16, pp. 7104-7104
Open Access | Times Cited: 10
A novel deep learning-based intrusion detection system for IoT DDoS security
Selman Hızal, Ünal Çavuşoğlu, Devrim Akgün
Internet of Things (2024) Vol. 28, pp. 101336-101336
Closed Access | Times Cited: 10
Selman Hızal, Ünal Çavuşoğlu, Devrim Akgün
Internet of Things (2024) Vol. 28, pp. 101336-101336
Closed Access | Times Cited: 10
Hybrid-CID: Securing IoT with Mongoose Optimization
S. Merlin Sheeba, R. S. Shaji
International Journal of Computational Intelligence Systems (2025) Vol. 18, Iss. 1
Open Access | Times Cited: 1
S. Merlin Sheeba, R. S. Shaji
International Journal of Computational Intelligence Systems (2025) Vol. 18, Iss. 1
Open Access | Times Cited: 1
A model for multi-attack classification to improve intrusion detection performance using deep learning approaches
Arun Kumar Silivery, K. Ram Mohan Rao, Ramana Solleti, et al.
Measurement Sensors (2023) Vol. 30, pp. 100924-100924
Open Access | Times Cited: 18
Arun Kumar Silivery, K. Ram Mohan Rao, Ramana Solleti, et al.
Measurement Sensors (2023) Vol. 30, pp. 100924-100924
Open Access | Times Cited: 18
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
Siva Surya Narayana Chintapalli, Satya Prakash Singh, Jaroslav Frnda, et al.
Heliyon (2024) Vol. 10, Iss. 8, pp. e29410-e29410
Open Access | Times Cited: 6
Siva Surya Narayana Chintapalli, Satya Prakash Singh, Jaroslav Frnda, et al.
Heliyon (2024) Vol. 10, Iss. 8, pp. e29410-e29410
Open Access | Times Cited: 6
Moving object detection using modified GMM based background subtraction
S. Rakesh, Nagaratna P. Hegde, M. Venu Gopalachari, et al.
Measurement Sensors (2023) Vol. 30, pp. 100898-100898
Open Access | Times Cited: 12
S. Rakesh, Nagaratna P. Hegde, M. Venu Gopalachari, et al.
Measurement Sensors (2023) Vol. 30, pp. 100898-100898
Open Access | Times Cited: 12
Improving smart home surveillance through YOLO model with transfer learning and quantization for enhanced accuracy and efficiency
Surjeet Dalal, Umesh Kumar Lilhore, Nidhi Sharma, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e1939-e1939
Open Access | Times Cited: 4
Surjeet Dalal, Umesh Kumar Lilhore, Nidhi Sharma, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e1939-e1939
Open Access | Times Cited: 4
Detection and Classification of Novel Attacks and Anomaly in IoT Network using Rule based Deep Learning Model
Sanjay Chakraborty, Saroj Kumar Pandey, Saikat Ranjan Maity, et al.
SN Computer Science (2024) Vol. 5, Iss. 8
Closed Access | Times Cited: 4
Sanjay Chakraborty, Saroj Kumar Pandey, Saikat Ranjan Maity, et al.
SN Computer Science (2024) Vol. 5, Iss. 8
Closed Access | Times Cited: 4
DLIIoT: A Deep Learning based Intelligent Attack Detection in IoT Networks using Cooja Simulator
Hanjabam Barun Sharma, Jasbir Singh Manhas, Vinod Sharma
Journal of Scientific Research (2025) Vol. 17, Iss. 1, pp. 177-193
Open Access
Hanjabam Barun Sharma, Jasbir Singh Manhas, Vinod Sharma
Journal of Scientific Research (2025) Vol. 17, Iss. 1, pp. 177-193
Open Access
Optimizing XGBoost hyperparameters using the dragonfly algorithm for enhanced cyber attack detection in the internet of healthcare things (IoHT)
SURBHI SURBHI, Nupa Ram Chauhan, Neeraj Dahiya
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access
SURBHI SURBHI, Nupa Ram Chauhan, Neeraj Dahiya
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access
A Novel Approach to IoT Device Identification via Anti‐Interference Dynamic Integral Neural Network and Multiobjective Fitness‐Dependent Optimizer Algorithm
E. Anbalagan, M. Kanchana, G. Manikandan, et al.
International Journal of Communication Systems (2025) Vol. 38, Iss. 7
Closed Access
E. Anbalagan, M. Kanchana, G. Manikandan, et al.
International Journal of Communication Systems (2025) Vol. 38, Iss. 7
Closed Access
Deep Learning-Based Intrusion Detection for IoT Networks: A Scalable and Efficient Approach
Md. Alamgir Hossain
Research Square (Research Square) (2025)
Closed Access
Md. Alamgir Hossain
Research Square (Research Square) (2025)
Closed Access
Deciphering TON-IoT threats: Meta-heuristic and deep learning for attack classification
Yifan Fang, Yuhan Jia, Guirong Bai, et al.
Expert Systems with Applications (2025), pp. 127414-127414
Closed Access
Yifan Fang, Yuhan Jia, Guirong Bai, et al.
Expert Systems with Applications (2025), pp. 127414-127414
Closed Access
Transformative role of private AI in secondary education
Raghu Kumar Lingamallu, Karthik Jangam, Nikith Sai Reddy Banda, et al.
AIP conference proceedings (2025) Vol. 3157, pp. 020004-020004
Closed Access
Raghu Kumar Lingamallu, Karthik Jangam, Nikith Sai Reddy Banda, et al.
AIP conference proceedings (2025) Vol. 3157, pp. 020004-020004
Closed Access
Block chain role in real estate
Laxmikanth Mangalagiri, Harikrishna Bommala, Naveen Kumar Pattipati, et al.
AIP conference proceedings (2025) Vol. 3157, pp. 100003-100003
Closed Access
Laxmikanth Mangalagiri, Harikrishna Bommala, Naveen Kumar Pattipati, et al.
AIP conference proceedings (2025) Vol. 3157, pp. 100003-100003
Closed Access
Boosting in high dimensional data classification
Kuncharam Ramakrishna Reddy, Vineet Sharma, R. Dhanasekaran, et al.
AIP conference proceedings (2025) Vol. 3157, pp. 080008-080008
Closed Access
Kuncharam Ramakrishna Reddy, Vineet Sharma, R. Dhanasekaran, et al.
AIP conference proceedings (2025) Vol. 3157, pp. 080008-080008
Closed Access
Machine learning algorithms for personalized QoS aware web service recommendation
Nasra Fatima, Harikrishna Bommala, Barath Reddy Sadda, et al.
AIP conference proceedings (2025) Vol. 3157, pp. 080012-080012
Closed Access
Nasra Fatima, Harikrishna Bommala, Barath Reddy Sadda, et al.
AIP conference proceedings (2025) Vol. 3157, pp. 080012-080012
Closed Access
Implementation of YOLO8 for real-time object recognition and tracking for visually impaired
Ponguvala Haindavi, Bhukya Madhu, D. Ganesh, et al.
AIP conference proceedings (2025) Vol. 3157, pp. 070014-070014
Closed Access
Ponguvala Haindavi, Bhukya Madhu, D. Ganesh, et al.
AIP conference proceedings (2025) Vol. 3157, pp. 070014-070014
Closed Access
Cloud task scheduling using context-aware task scheduling with machine learning (CATSM-ML)
Logabiraman Govardhan, Bhukya Madhu, D. Raghava Raju, et al.
AIP conference proceedings (2025) Vol. 3157, pp. 080009-080009
Closed Access
Logabiraman Govardhan, Bhukya Madhu, D. Raghava Raju, et al.
AIP conference proceedings (2025) Vol. 3157, pp. 080009-080009
Closed Access
Machine learning-based mutation testing framework
Swapna Rani Kura, Harikrishna Bommala, Sarojini Rani Marri, et al.
AIP conference proceedings (2025) Vol. 3157, pp. 080015-080015
Closed Access
Swapna Rani Kura, Harikrishna Bommala, Sarojini Rani Marri, et al.
AIP conference proceedings (2025) Vol. 3157, pp. 080015-080015
Closed Access
Application of hybrid PSO-KNN algorithm for early prediction and classification of fundus images in diabetic retinopathy
Likith Reddy, Sreenivasulu Gogula, Udanth Reddy Lakkireddy, et al.
AIP conference proceedings (2025) Vol. 3157, pp. 070004-070004
Closed Access
Likith Reddy, Sreenivasulu Gogula, Udanth Reddy Lakkireddy, et al.
AIP conference proceedings (2025) Vol. 3157, pp. 070004-070004
Closed Access
Energy efficient fault diagnosis protocol for IoT
Srinivas Jhade, Bhukya Madhu, Channa Madhavuni Shruthi, et al.
AIP conference proceedings (2025) Vol. 3157, pp. 070009-070009
Closed Access
Srinivas Jhade, Bhukya Madhu, Channa Madhavuni Shruthi, et al.
AIP conference proceedings (2025) Vol. 3157, pp. 070009-070009
Closed Access