
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Generative Deep Learning to Detect Cyberattacks for the IoT-23 Dataset
Nada Abdalgawad, Ali Reza Sajun, Yara Kaddoura, et al.
IEEE Access (2021) Vol. 10, pp. 6430-6441
Open Access | Times Cited: 73
Nada Abdalgawad, Ali Reza Sajun, Yara Kaddoura, et al.
IEEE Access (2021) Vol. 10, pp. 6430-6441
Open Access | Times Cited: 73
Showing 1-25 of 73 citing articles:
Zero-day attack detection: a systematic literature review
Rasheed Ahmad, Izzat Alsmadi, Wasim A. Al-Hamdani, et al.
Artificial Intelligence Review (2023) Vol. 56, Iss. 10, pp. 10733-10811
Closed Access | Times Cited: 54
Rasheed Ahmad, Izzat Alsmadi, Wasim A. Al-Hamdani, et al.
Artificial Intelligence Review (2023) Vol. 56, Iss. 10, pp. 10733-10811
Closed Access | Times Cited: 54
A Comprehensive Survey of Generative Adversarial Networks (GANs) in Cybersecurity Intrusion Detection
Aeryn Dunmore, Julian Jang‐Jaccard, Fariza Sabrina, et al.
IEEE Access (2023) Vol. 11, pp. 76071-76094
Open Access | Times Cited: 42
Aeryn Dunmore, Julian Jang‐Jaccard, Fariza Sabrina, et al.
IEEE Access (2023) Vol. 11, pp. 76071-76094
Open Access | Times Cited: 42
Generative AI for Cyber Security: Analyzing the Potential of ChatGPT, DALL-E, and Other Models for Enhancing the Security Space
Siva Sai, Utkarsh Yashvardhan, Vinay Chamola, et al.
IEEE Access (2024) Vol. 12, pp. 53497-53516
Open Access | Times Cited: 18
Siva Sai, Utkarsh Yashvardhan, Vinay Chamola, et al.
IEEE Access (2024) Vol. 12, pp. 53497-53516
Open Access | Times Cited: 18
Enhancing IoT Data Analysis with Machine Learning: A Comprehensive Overview
Amit Kumar Dinkar, Md. Alimul Haque, Ajay Kumar Choudhary
LatIA (2024) Vol. 2, pp. 9-9
Open Access | Times Cited: 16
Amit Kumar Dinkar, Md. Alimul Haque, Ajay Kumar Choudhary
LatIA (2024) Vol. 2, pp. 9-9
Open Access | Times Cited: 16
Distributed Deep Neural-Network-Based Middleware for Cyber-Attacks Detection in Smart IoT Ecosystem: A Novel Framework and Performance Evaluation Approach
Guru Prasad Bhandari, Andreas Lyth, Andrii Shalaginov, et al.
Electronics (2023) Vol. 12, Iss. 2, pp. 298-298
Open Access | Times Cited: 31
Guru Prasad Bhandari, Andreas Lyth, Andrii Shalaginov, et al.
Electronics (2023) Vol. 12, Iss. 2, pp. 298-298
Open Access | Times Cited: 31
A novel intelligent approach for man‐in‐the‐middle attacks detection over internet of things environments based on message queuing telemetry transport
Álvaro Michelena, José Aveleira‐Mata, Esteban Jove, et al.
Expert Systems (2023) Vol. 41, Iss. 2
Open Access | Times Cited: 29
Álvaro Michelena, José Aveleira‐Mata, Esteban Jove, et al.
Expert Systems (2023) Vol. 41, Iss. 2
Open Access | Times Cited: 29
Unmasking Cybercrime with Artificial-Intelligence-Driven Cybersecurity Analytics
Amir Djenna, Ezedin Barka, Achouak Benchikh, et al.
Sensors (2023) Vol. 23, Iss. 14, pp. 6302-6302
Open Access | Times Cited: 22
Amir Djenna, Ezedin Barka, Achouak Benchikh, et al.
Sensors (2023) Vol. 23, Iss. 14, pp. 6302-6302
Open Access | Times Cited: 22
Revolutionizing intrusion detection in industrial IoT with distributed learning and deep generative techniques
Djallel Hamouda, Mohamed Amine Ferrag, Nadjette Benhamida, et al.
Internet of Things (2024) Vol. 26, pp. 101149-101149
Closed Access | Times Cited: 8
Djallel Hamouda, Mohamed Amine Ferrag, Nadjette Benhamida, et al.
Internet of Things (2024) Vol. 26, pp. 101149-101149
Closed Access | Times Cited: 8
Recent endeavors in machine learning-powered intrusion detection systems for the Internet of Things
D. Manivannan
Journal of Network and Computer Applications (2024) Vol. 229, pp. 103925-103925
Closed Access | Times Cited: 8
D. Manivannan
Journal of Network and Computer Applications (2024) Vol. 229, pp. 103925-103925
Closed Access | Times Cited: 8
HMS-IDS: Threat Intelligence Integration for Zero-Day Exploits and Advanced Persistent Threats in IIoT
Kumar Saurabh, Vaidik Sharma, Uphar Singh, et al.
Arabian Journal for Science and Engineering (2024)
Closed Access | Times Cited: 8
Kumar Saurabh, Vaidik Sharma, Uphar Singh, et al.
Arabian Journal for Science and Engineering (2024)
Closed Access | Times Cited: 8
Detecting Zero-Day Intrusion Attacks Using Semi-Supervised Machine Learning Approaches
Innocent Mbona, Jan H. P. Eloff
IEEE Access (2022) Vol. 10, pp. 69822-69838
Open Access | Times Cited: 35
Innocent Mbona, Jan H. P. Eloff
IEEE Access (2022) Vol. 10, pp. 69822-69838
Open Access | Times Cited: 35
BLoCNet: a hybrid, dataset-independent intrusion detection system using deep learning
Brandon Bowen, Anitha Chennamaneni, Ana Goulart, et al.
International Journal of Information Security (2023) Vol. 22, Iss. 4, pp. 893-917
Closed Access | Times Cited: 20
Brandon Bowen, Anitha Chennamaneni, Ana Goulart, et al.
International Journal of Information Security (2023) Vol. 22, Iss. 4, pp. 893-917
Closed Access | Times Cited: 20
Security Risks Concerns of Generative AI in the IoT
Honghui Xu, Yingshu Li, Olusesi Balogun, et al.
IEEE Internet of Things Magazine (2024) Vol. 7, Iss. 3, pp. 62-67
Open Access | Times Cited: 6
Honghui Xu, Yingshu Li, Olusesi Balogun, et al.
IEEE Internet of Things Magazine (2024) Vol. 7, Iss. 3, pp. 62-67
Open Access | Times Cited: 6
Internet of Things botnets: A survey on Artificial Intelligence based detection techniques
Moemedi Lefoane, Ibrahim Ghafir, Sohag Kabir, et al.
Journal of Network and Computer Applications (2025), pp. 104110-104110
Open Access
Moemedi Lefoane, Ibrahim Ghafir, Sohag Kabir, et al.
Journal of Network and Computer Applications (2025), pp. 104110-104110
Open Access
Deep Learning Models in Network Intrusion Detection Systems
Jian Li
Applied Mathematics and Nonlinear Sciences (2025) Vol. 10, Iss. 1
Open Access
Jian Li
Applied Mathematics and Nonlinear Sciences (2025) Vol. 10, Iss. 1
Open Access
Adversarial Attacks on Deep Learning-based Network Intrusion Detection Systems: A Taxonomy and Review
Md Mehedi Hasan, Rafiqul Islam, Quazi Mamun, et al.
(2025)
Closed Access
Md Mehedi Hasan, Rafiqul Islam, Quazi Mamun, et al.
(2025)
Closed Access
Using approximate matching and machine learning to uncover malicious activity in logs
Ronan Flynn, Oluwafemi Olukoya
Computers & Security (2025), pp. 104312-104312
Open Access
Ronan Flynn, Oluwafemi Olukoya
Computers & Security (2025), pp. 104312-104312
Open Access
Hybrid CNN–BiLSTM–DNN Approach for Detecting Cybersecurity Threats in IoT Networks
Bright Agbor Agbor, Bliss Utibe-Abasi Stephen, Philip Asuquo, et al.
Computers (2025) Vol. 14, Iss. 2, pp. 58-58
Open Access
Bright Agbor Agbor, Bliss Utibe-Abasi Stephen, Philip Asuquo, et al.
Computers (2025) Vol. 14, Iss. 2, pp. 58-58
Open Access
Robust Intrusion Detection System Using an Improved Hybrid Deep Learning Model for Binary and Multi-Class Classification in IoT Networks
Hesham M. Kamal, Maggie Mashaly
Technologies (2025) Vol. 13, Iss. 3, pp. 102-102
Open Access
Hesham M. Kamal, Maggie Mashaly
Technologies (2025) Vol. 13, Iss. 3, pp. 102-102
Open Access
CYBER INFRASTRUCTURE GUIDE: IT/OT INTEGRATION
Mustafa Bilgehan İmamoğlu
Ömer Halisdemir Üniversitesi İktisadi ve İdari Bilimler Fakültesi Dergisi (2025) Vol. 18, Iss. 1, pp. 378-391
Open Access
Mustafa Bilgehan İmamoğlu
Ömer Halisdemir Üniversitesi İktisadi ve İdari Bilimler Fakültesi Dergisi (2025) Vol. 18, Iss. 1, pp. 378-391
Open Access
Network-Based Intrusion Detection by Using IOT Techniques
Nihal M. Pise, Girish R. Deshpande, Laxmi S. Naik, et al.
Cognitive science and technology (2025), pp. 115-128
Closed Access
Nihal M. Pise, Girish R. Deshpande, Laxmi S. Naik, et al.
Cognitive science and technology (2025), pp. 115-128
Closed Access
A Survey of Using Machine Learning in IoT Security and the Challenges Faced by Researchers
Khawlah Harahsheh, Chung‐Hao Chen
Informatica (2023) Vol. 47, Iss. 6
Open Access | Times Cited: 11
Khawlah Harahsheh, Chung‐Hao Chen
Informatica (2023) Vol. 47, Iss. 6
Open Access | Times Cited: 11
Network Traffic Visualization Coupled With Convolutional Neural Networks for Enhanced IoT Botnet Detection
David Arnold, M. Gromov, Jafar Saniie
IEEE Access (2024) Vol. 12, pp. 73547-73560
Open Access | Times Cited: 3
David Arnold, M. Gromov, Jafar Saniie
IEEE Access (2024) Vol. 12, pp. 73547-73560
Open Access | Times Cited: 3
Protocol-Specific and Sensor Network-Inherited Attack Detection in IoT Using Machine Learning
F. Zahra, N. Z. Jhanjhi, Navid Ali Khan, et al.
Applied Sciences (2022) Vol. 12, Iss. 22, pp. 11598-11598
Open Access | Times Cited: 17
F. Zahra, N. Z. Jhanjhi, Navid Ali Khan, et al.
Applied Sciences (2022) Vol. 12, Iss. 22, pp. 11598-11598
Open Access | Times Cited: 17
Binary and Multi-Class Classification on the IoT-23 Dataset
Alia Ahli, Ayesha Raza, Kevser Ovaz Akpinar, et al.
2022 Advances in Science and Engineering Technology International Conferences (ASET) (2023)
Closed Access | Times Cited: 9
Alia Ahli, Ayesha Raza, Kevser Ovaz Akpinar, et al.
2022 Advances in Science and Engineering Technology International Conferences (ASET) (2023)
Closed Access | Times Cited: 9