OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Threat analysis model to control IoT network routing attacks through deep learning approach
K. Janani, S. Ramamoorthy
Connection Science (2022) Vol. 34, Iss. 1, pp. 2714-2754
Open Access | Times Cited: 12

Showing 12 citing articles:

Quantum Machine Learning for Security Assessment in the Internet of Medical Things (IoMT)
Anand Singh Rajawat, S. B. Goyal, Pradeep Bedi, et al.
Future Internet (2023) Vol. 15, Iss. 8, pp. 271-271
Open Access | Times Cited: 21

Graph-ensemble fusion for enhanced IoT intrusion detection: leveraging GCN and deep learning
Kajol Mittal, Payal Khurana Batra
Cluster Computing (2024) Vol. 27, Iss. 8, pp. 10525-10552
Closed Access | Times Cited: 4

Detection of Cyber Attack in IoT Based Model Using ANN Model with Genetic Algorithm
Animesh Srivastava, Hemendra Shanker Sharma, Rishikesh Rawat, et al.
(2024), pp. 1198-1201
Closed Access | Times Cited: 2

A security framework to enhance IoT device identity and data access through blockchain consensus model
K. Janani, S. Ramamoorthy
Cluster Computing (2023) Vol. 27, Iss. 3, pp. 2877-2900
Closed Access | Times Cited: 6

Secure IoT Routing through Manifold Criterion Trust Evaluation using Ant Colony Optimization
Afsah Sharmin, Rashidah Funke Olanrewaju, Burhan Ul Islam Khan, et al.
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 11
Open Access | Times Cited: 3

Hybrid feature learning framework for the classification of encrypted network traffic
S. Ramraj, G. Usha
Connection Science (2023) Vol. 35, Iss. 1
Open Access | Times Cited: 2

IoT Attack Detection Using LSTM Model
Animesh Srivastava, Vikash Sawan, Kumari Jugnu, et al.
(2024), pp. 7-10
Closed Access

An effective attack detection framework using multi-scale depth-wise separable 1DCNN via fused grasshopper-based lemur optimizer in IoT routing system
Ajay Dilip Kumar Marapatla, E. Ilavarasan
Intelligent Decision Technologies (2024) Vol. 18, Iss. 3, pp. 1741-1762
Closed Access

Rehabilitation process to Control and Predict User Hand gestures through EMG signal based Reinforced Transradial Amputation Model
S. Surya, S. Ramamoorthy
Journal of Mechanics in Medicine and Biology (2024)
Closed Access

Smart wearable device gesture classification using supervised machine learning algorithms
S. Surya, S. Ramamoorthy, Arjun Gopikrishnan, et al.
AIP conference proceedings (2024) Vol. 3075, pp. 020224-020224
Closed Access

Page 1

Scroll to top