OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Osama Rabie, Shitharth Selvarajan, Tawfiq Hasanin, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 11

Showing 11 citing articles:

Securing Smart Manufacturing by Integrating Anomaly Detection With Zero-Knowledge Proofs
Abdu Salam, Mohammad Abrar, Farhan Amin, et al.
IEEE Access (2024) Vol. 12, pp. 36346-36360
Open Access | Times Cited: 7

Enhanced Grey Wolf Optimization (EGWO) and random forest based mechanism for intrusion detection in IoT networks
Saad Said Alqahtany, Asadullah Shaikh, Ali Alqazzaz
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access

Optimal novel nonlinear control law for attitude and heading control of a bi-copter system with controller-in-loop
Aurangzeb Jadoon, Abdullah Mughees, Iftikhar Ahmad, et al.
Expert Systems with Applications (2025), pp. 126554-126554
Closed Access

Enhancing security of mobile crowd sensing in unmanned aerial vehicle ecosystems
Sara Sumaidaa, Hamda Almenhali, Mohammed Alazzani, et al.
Frontiers in Communications and Networks (2025) Vol. 6
Open Access

Unknown DDoS Attack Detection with Sliced Iterative Normalizing Flows Technique
Chin‐Shiuh Shieh, Thanh Lâm Nguyễn, Thanh-Tuan Nguyen, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2025) Vol. 82, Iss. 3, pp. 4881-4912
Open Access

Trust-Based Consensus and ABAC for Blockchain Using Deep Learning to Secure Internet of Things
Arunkumar Muniswamy, R K Rathi
Applied Artificial Intelligence (2025) Vol. 39, Iss. 1
Open Access

An adaptive nonlinear whale optimization multi-layer perceptron cyber intrusion detection framework
Hany El-Ghaish, Haitham Miqrish, Ahmed Elmogy, et al.
International Journal of Machine Learning and Cybernetics (2024) Vol. 15, Iss. 10, pp. 4801-4814
Open Access | Times Cited: 1

Dual-path feature extraction based hybrid intrusion detection in IoT networks
Arun Kumar Silivery, K. Ram Mohan Rao, Ramana Solleti
Computers & Electrical Engineering (2024) Vol. 122, pp. 109949-109949
Closed Access

Mayfly optimistic hyperelliptic curve cryptosystem
R. Reddy, M. Kavitha, G. Sudarsana Reddy, et al.
Frontiers in Computer Science (2024) Vol. 6
Open Access

ShNFN: Shepard Neuro-Fuzzy Network for Intrusion Detection in Fog Computing
Rajaram Ganeshan, Meesala Sravani, Archana Kalidindi, et al.
International Journal of Pattern Recognition and Artificial Intelligence (2024) Vol. 38, Iss. 13
Closed Access

Attention-Based Hybrid Deep Learning Model for Intrusion Detection in IIoT Networks
Safi Ullah, Wadii Boulila, Anis Koubâa, et al.
Procedia Computer Science (2024) Vol. 246, pp. 3323-3332
Open Access

Page 1

Scroll to top