OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A secure edge computing model using machine learning and IDS to detect and isolate intruders
Poornima Mahadevappa, Raja Kumar Murugesan, Redhwan Al-amri, et al.
MethodsX (2024) Vol. 12, pp. 102597-102597
Open Access | Times Cited: 6

Showing 6 citing articles:

TinyIDS - An IoT Intrusion Detection System by Tiny Machine Learning
Pietro Fusco, Gennaro Pio Rimoli, Massimo Ficco
Lecture notes in computer science (2024), pp. 71-82
Closed Access | Times Cited: 4

Robust intrusion detection based on personalized federated learning for IoT environment
Shimin Sun, Le Zhou, Ze Wang, et al.
Computers & Security (2025), pp. 104442-104442
Closed Access

A Survey on Edge Computing (EC) Security Challenges: Classification, Threats, and Mitigation Strategies
Abdul Manan Sheikh, Md. Rafiqul Islam, Mohamed Hadi Habaebi, et al.
Future Internet (2025) Vol. 17, Iss. 4, pp. 175-175
Open Access

Towards secure IoT networks: A comprehensive study of metaheuristic algorithms in conjunction with CNN using a self-generated dataset
Vandana Choudhary, Sarvesh Tanwar, Tanupriya Choudhury, et al.
MethodsX (2024) Vol. 12, pp. 102747-102747
Open Access | Times Cited: 2

Adaptive Probabilistic Neural Network based Edge Data Center Authentication for Secure Load Balancing in Fog Computing
V. Gowri, B. Baranidharan
Applied Soft Computing (2024), pp. 112567-112567
Closed Access | Times Cited: 1

Exploring Security Challenges in Generative AI for Web Engineering
Syeda Mariam Muzammal, Poornima Mahadevappa, Muhammad Tayyab
Advances in web technologies and engineering book series (2024), pp. 331-360
Closed Access

An enhanced whale optimizer based feature selection technique with effective ensemble classifier for network intrusion detection system
U Nandhini, S. Vasantha Kumar
Peer-to-Peer Networking and Applications (2024) Vol. 18, Iss. 2
Closed Access

Page 1

Scroll to top