
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Osama Rabie, Shitharth Selvarajan, Tawfiq Hasanin, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 11
Osama Rabie, Shitharth Selvarajan, Tawfiq Hasanin, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 11
Showing 11 citing articles:
Securing Smart Manufacturing by Integrating Anomaly Detection With Zero-Knowledge Proofs
Abdu Salam, Mohammad Abrar, Farhan Amin, et al.
IEEE Access (2024) Vol. 12, pp. 36346-36360
Open Access | Times Cited: 7
Abdu Salam, Mohammad Abrar, Farhan Amin, et al.
IEEE Access (2024) Vol. 12, pp. 36346-36360
Open Access | Times Cited: 7
Enhanced Grey Wolf Optimization (EGWO) and random forest based mechanism for intrusion detection in IoT networks
Saad Said Alqahtany, Asadullah Shaikh, Ali Alqazzaz
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Saad Said Alqahtany, Asadullah Shaikh, Ali Alqazzaz
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Optimal novel nonlinear control law for attitude and heading control of a bi-copter system with controller-in-loop
Aurangzeb Jadoon, Abdullah Mughees, Iftikhar Ahmad, et al.
Expert Systems with Applications (2025), pp. 126554-126554
Closed Access
Aurangzeb Jadoon, Abdullah Mughees, Iftikhar Ahmad, et al.
Expert Systems with Applications (2025), pp. 126554-126554
Closed Access
Enhancing security of mobile crowd sensing in unmanned aerial vehicle ecosystems
Sara Sumaidaa, Hamda Almenhali, Mohammed Alazzani, et al.
Frontiers in Communications and Networks (2025) Vol. 6
Open Access
Sara Sumaidaa, Hamda Almenhali, Mohammed Alazzani, et al.
Frontiers in Communications and Networks (2025) Vol. 6
Open Access
Unknown DDoS Attack Detection with Sliced Iterative Normalizing Flows Technique
Chin‐Shiuh Shieh, Thanh Lâm Nguyễn, Thanh-Tuan Nguyen, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2025) Vol. 82, Iss. 3, pp. 4881-4912
Open Access
Chin‐Shiuh Shieh, Thanh Lâm Nguyễn, Thanh-Tuan Nguyen, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2025) Vol. 82, Iss. 3, pp. 4881-4912
Open Access
Trust-Based Consensus and ABAC for Blockchain Using Deep Learning to Secure Internet of Things
Arunkumar Muniswamy, R K Rathi
Applied Artificial Intelligence (2025) Vol. 39, Iss. 1
Open Access
Arunkumar Muniswamy, R K Rathi
Applied Artificial Intelligence (2025) Vol. 39, Iss. 1
Open Access
An adaptive nonlinear whale optimization multi-layer perceptron cyber intrusion detection framework
Hany El-Ghaish, Haitham Miqrish, Ahmed Elmogy, et al.
International Journal of Machine Learning and Cybernetics (2024) Vol. 15, Iss. 10, pp. 4801-4814
Open Access | Times Cited: 1
Hany El-Ghaish, Haitham Miqrish, Ahmed Elmogy, et al.
International Journal of Machine Learning and Cybernetics (2024) Vol. 15, Iss. 10, pp. 4801-4814
Open Access | Times Cited: 1
Dual-path feature extraction based hybrid intrusion detection in IoT networks
Arun Kumar Silivery, K. Ram Mohan Rao, Ramana Solleti
Computers & Electrical Engineering (2024) Vol. 122, pp. 109949-109949
Closed Access
Arun Kumar Silivery, K. Ram Mohan Rao, Ramana Solleti
Computers & Electrical Engineering (2024) Vol. 122, pp. 109949-109949
Closed Access
Mayfly optimistic hyperelliptic curve cryptosystem
R. Reddy, M. Kavitha, G. Sudarsana Reddy, et al.
Frontiers in Computer Science (2024) Vol. 6
Open Access
R. Reddy, M. Kavitha, G. Sudarsana Reddy, et al.
Frontiers in Computer Science (2024) Vol. 6
Open Access
ShNFN: Shepard Neuro-Fuzzy Network for Intrusion Detection in Fog Computing
Rajaram Ganeshan, Meesala Sravani, Archana Kalidindi, et al.
International Journal of Pattern Recognition and Artificial Intelligence (2024) Vol. 38, Iss. 13
Closed Access
Rajaram Ganeshan, Meesala Sravani, Archana Kalidindi, et al.
International Journal of Pattern Recognition and Artificial Intelligence (2024) Vol. 38, Iss. 13
Closed Access
Attention-Based Hybrid Deep Learning Model for Intrusion Detection in IIoT Networks
Safi Ullah, Wadii Boulila, Anis Koubâa, et al.
Procedia Computer Science (2024) Vol. 246, pp. 3323-3332
Open Access
Safi Ullah, Wadii Boulila, Anis Koubâa, et al.
Procedia Computer Science (2024) Vol. 246, pp. 3323-3332
Open Access