OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets
Nour Moustafa
Sustainable Cities and Society (2021) Vol. 72, pp. 102994-102994
Closed Access | Times Cited: 331

Showing 1-25 of 331 citing articles:

Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review
Mujaheed Abdullahi, Yahia Baashar, Hitham Alhussian, et al.
Electronics (2022) Vol. 11, Iss. 2, pp. 198-198
Open Access | Times Cited: 214

Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis
Mohamed Amine Ferrag, Othmane Friha, Λέανδρος Μαγλαράς, et al.
IEEE Access (2021) Vol. 9, pp. 138509-138542
Open Access | Times Cited: 189

AI-Enabled Secure Microservices in Edge Computing: Opportunities and Challenges
Firas Al-Doghman, Nour Moustafa, Ibrahim Khalil, et al.
IEEE Transactions on Services Computing (2022) Vol. 16, Iss. 2, pp. 1485-1504
Closed Access | Times Cited: 90

An Explainable Deep Learning Framework for Resilient Intrusion Detection in IoT-Enabled Transportation Networks
Ayodeji Oseni, Nour Moustafa, Gideon Creech, et al.
IEEE Transactions on Intelligent Transportation Systems (2022) Vol. 24, Iss. 1, pp. 1000-1014
Closed Access | Times Cited: 87

An explainable deep learning-enabled intrusion detection framework in IoT networks
Marwa Keshk, Nickolaos Koroniotis, Nam Pham, et al.
Information Sciences (2023) Vol. 639, pp. 119000-119000
Open Access | Times Cited: 81

Explainable Intrusion Detection for Cyber Defences in the Internet of Things: Opportunities and Solutions
Nour Moustafa, Nickolaos Koroniotis, Marwa Keshk, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 3, pp. 1775-1807
Closed Access | Times Cited: 76

Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats
Zhiyan Chen, Jinxin Liu, Yu Shen, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 5, pp. 1-37
Open Access | Times Cited: 73

Analysis of ToN-IoT, UNW-NB15, and Edge-IIoT Datasets Using DL in Cybersecurity for IoT
Imad Tareq, Bassant M. Elbagoury, Salsabil Amin El-Regaily, et al.
Applied Sciences (2022) Vol. 12, Iss. 19, pp. 9572-9572
Open Access | Times Cited: 68

A deep learning approach for intrusion detection in Internet of Things using focal loss function
Ayesha S. Dina, A. B. Siddique, D. Manivannan
Internet of Things (2023) Vol. 22, pp. 100699-100699
Closed Access | Times Cited: 68

Analysis of IoT Security Challenges and Its Solutions Using Artificial Intelligence
Tehseen Mazhar, Dhani Bux Talpur, Tamara Al Shloul, et al.
Brain Sciences (2023) Vol. 13, Iss. 4, pp. 683-683
Open Access | Times Cited: 61

Blockchain and federated learning-based intrusion detection approaches for edge-enabled industrial IoT networks: a survey
Saqib Ali, Qianmu Li, Abdullah Yousafzai
Ad Hoc Networks (2023) Vol. 152, pp. 103320-103320
Closed Access | Times Cited: 60

Anomaly-based intrusion detection system in the Internet of Things using a convolutional neural network and multi-objective enhanced Capuchin Search Algorithm
Hossein Asgharzadeh, Ali Ghaffari, Mohammad Masdari, et al.
Journal of Parallel and Distributed Computing (2023) Vol. 175, pp. 1-21
Closed Access | Times Cited: 57

Security issues in Internet of Vehicles (IoV): A comprehensive survey
Hamideh Taslimasa, Sajjad Dadkhah, Euclides Carlos Pinto Neto, et al.
Internet of Things (2023) Vol. 22, pp. 100809-100809
Closed Access | Times Cited: 57

Generalizing intrusion detection for heterogeneous networks: A stacked-unsupervised federated learning approach
Gustavo de Carvalho Bertoli, Lourenço Alves Pereira, Osamu Saotome, et al.
Computers & Security (2023) Vol. 127, pp. 103106-103106
Open Access | Times Cited: 48

A comparative analysis of various machine learning methods for anomaly detection in cyber attacks on IoT networks
Muhammad Muhammad Inuwa, Resul Daş
Internet of Things (2024) Vol. 26, pp. 101162-101162
Closed Access | Times Cited: 46

Graph Neural Networks for Intrusion Detection: A Survey
Tristan Bilot, Nour El Madhoun, Khaldoun Al Agha, et al.
IEEE Access (2023) Vol. 11, pp. 49114-49139
Open Access | Times Cited: 43

Ensemble-Learning Framework for Intrusion Detection to Enhance Internet of Things’ Devices Security
Yazeed Alotaibi, Mohammad Ilyas
Sensors (2023) Vol. 23, Iss. 12, pp. 5568-5568
Open Access | Times Cited: 40

Optimizing IoT intrusion detection system: feature selection versus feature extraction in machine learning
Jing Li, Mohd Shahizan Othman, Hewan Chen, et al.
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 29

A Systematic Literature Review on Host-Based Intrusion Detection Systems
Hami Satılmış, Sedat Akleylek, Zaliha Yüce Tok
IEEE Access (2024) Vol. 12, pp. 27237-27266
Open Access | Times Cited: 21

Temporal Convolutional Network Approach to Secure Open Charge Point Protocol (OCPP) in Electric Vehicle Charging
Ikram Benfarhat, Vik Tor Goh, Siow Chun Lim, et al.
IEEE Access (2025) Vol. 13, pp. 15272-15289
Open Access | Times Cited: 1

XSRU-IoMT: Explainable simple recurrent units for threat detection in Internet of Medical Things networks
Izhar Ahmed Khan, Nour Moustafa, Imran Razzak, et al.
Future Generation Computer Systems (2021) Vol. 127, pp. 181-193
Closed Access | Times Cited: 88

Enhancing IIoT networks protection: A robust security model for attack detection in Internet Industrial Control Systems
Izhar Ahmed Khan, Marwa Keshk, Dechang Pi, et al.
Ad Hoc Networks (2022) Vol. 134, pp. 102930-102930
Closed Access | Times Cited: 62

Datasets are not enough: Challenges in labeling network traffic
Jorge Luis Guerra, Carlos Catania, Eduardo Veas
Computers & Security (2022) Vol. 120, pp. 102810-102810
Open Access | Times Cited: 52

Dew-Cloud-Based Hierarchical Federated Learning for Intrusion Detection in IoMT
Parminder Singh, Gurjot Singh Gaba, Avinash Kaur, et al.
IEEE Journal of Biomedical and Health Informatics (2022) Vol. 27, Iss. 2, pp. 722-731
Open Access | Times Cited: 46

Page 1 - Next Page

Scroll to top