
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Detection of Real-Time Malicious Intrusions and Attacks in IoT Empowered Cybersecurity Infrastructures
Irfan Ali Kandhro, Sultan M. Alanazi, Fayyaz Ali, et al.
IEEE Access (2023) Vol. 11, pp. 9136-9148
Open Access | Times Cited: 49
Irfan Ali Kandhro, Sultan M. Alanazi, Fayyaz Ali, et al.
IEEE Access (2023) Vol. 11, pp. 9136-9148
Open Access | Times Cited: 49
Showing 1-25 of 49 citing articles:
Res-TranBiLSTM: An intelligent approach for intrusion detection in the Internet of Things
Shiyu Wang, Wenxiang Xu, Yiwen Liu
Computer Networks (2023) Vol. 235, pp. 109982-109982
Open Access | Times Cited: 32
Shiyu Wang, Wenxiang Xu, Yiwen Liu
Computer Networks (2023) Vol. 235, pp. 109982-109982
Open Access | Times Cited: 32
An Intrusion Detection System for Edge-Envisioned Smart Agriculture in Extreme Environment
Danish Javeed, Tianhan Gao, Muhammad Shahid Saeed, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 16, pp. 26866-26876
Open Access | Times Cited: 25
Danish Javeed, Tianhan Gao, Muhammad Shahid Saeed, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 16, pp. 26866-26876
Open Access | Times Cited: 25
Breaking Alert Fatigue: AI-Assisted SIEM Framework for Effective Incident Response
Tao Ban, Takeshi Takahashi, Samuel Ndichu, et al.
Applied Sciences (2023) Vol. 13, Iss. 11, pp. 6610-6610
Open Access | Times Cited: 21
Tao Ban, Takeshi Takahashi, Samuel Ndichu, et al.
Applied Sciences (2023) Vol. 13, Iss. 11, pp. 6610-6610
Open Access | Times Cited: 21
Intrusion Detection System for Wireless Sensor Networks: A Machine Learning Based Approach
Halima Sadia, Saima Farhan, Yasin Ul Haq, et al.
IEEE Access (2024) Vol. 12, pp. 52565-52582
Open Access | Times Cited: 8
Halima Sadia, Saima Farhan, Yasin Ul Haq, et al.
IEEE Access (2024) Vol. 12, pp. 52565-52582
Open Access | Times Cited: 8
An Automated Cyber Intrusion Prediction Model Using Deep Learning to Resilient in Cyber Threat for the Royal Thai Air Force
Information Technology Journal (2025) Vol. 21, Iss. 1, pp. 44-56
Closed Access
Information Technology Journal (2025) Vol. 21, Iss. 1, pp. 44-56
Closed Access
A hybrid approach for intrusion detection in vehicular networks using feature selection and dimensionality reduction with optimized deep learning
Fayaz Hassan, Zafi Sherhan Syed, Aftab Ahmed Memon, et al.
PLoS ONE (2025) Vol. 20, Iss. 2, pp. e0312752-e0312752
Open Access
Fayaz Hassan, Zafi Sherhan Syed, Aftab Ahmed Memon, et al.
PLoS ONE (2025) Vol. 20, Iss. 2, pp. e0312752-e0312752
Open Access
Impact of Machine Learning and AI on Cybersecurity Risks and Opportunities
Anjana Dilhara
(2025)
Closed Access
Anjana Dilhara
(2025)
Closed Access
Detection of IoT Attacks Using Hybrid RNN‐DBN Model
D. Pavithra, R. Bharathraj, P. Poovizhi, et al.
(2025), pp. 209-225
Closed Access
D. Pavithra, R. Bharathraj, P. Poovizhi, et al.
(2025), pp. 209-225
Closed Access
Multi‐Shadow Scenarios Tennis Ball Detection by an Improved RTMdet‐Light Model
Yukun Zhu, Yanxia Peng, Cong Yu
IET Image Processing (2025) Vol. 19, Iss. 1
Open Access
Yukun Zhu, Yanxia Peng, Cong Yu
IET Image Processing (2025) Vol. 19, Iss. 1
Open Access
An efficient convolutional neural network based attack detection for smart grid in 5G-IOT
Sheeja Rani S, Mostafa F. Shaaban, Abdelfatah Ali
International Journal of Critical Infrastructure Protection (2025), pp. 100738-100738
Closed Access
Sheeja Rani S, Mostafa F. Shaaban, Abdelfatah Ali
International Journal of Critical Infrastructure Protection (2025), pp. 100738-100738
Closed Access
Study on Empowering Cyber Security by Using Adaptive Machine Learning Methods
Hari Gonaygunta, Geeta Sandeep Nadella, Priyanka Pawar, et al.
(2024), pp. 166-171
Closed Access | Times Cited: 2
Hari Gonaygunta, Geeta Sandeep Nadella, Priyanka Pawar, et al.
(2024), pp. 166-171
Closed Access | Times Cited: 2
Enhancing Security in Connected Medical IoT Networks Through Deep Learning-Based Anomaly Detection
Ismaila Sy, Birahime Diouf, Abdou Khadre Diop, et al.
Lecture notes in computer science (2024), pp. 87-99
Closed Access | Times Cited: 2
Ismaila Sy, Birahime Diouf, Abdou Khadre Diop, et al.
Lecture notes in computer science (2024), pp. 87-99
Closed Access | Times Cited: 2
A comparative assessment of machine learning algorithms in the IoT-based network intrusion detection systems
Milan Samantaray, Ram Chandra Barik, Anil Kumar Biswal
Decision Analytics Journal (2024) Vol. 11, pp. 100478-100478
Open Access | Times Cited: 2
Milan Samantaray, Ram Chandra Barik, Anil Kumar Biswal
Decision Analytics Journal (2024) Vol. 11, pp. 100478-100478
Open Access | Times Cited: 2
MAC Protocol Based IoT Network Intrusion Detection Using Improved Efficient Shuffle Bidirectional COOT Channel Attention Network
Nanavath Kiran Singh Nayak, Budhaditya Bhattacharyya
IEEE Access (2023) Vol. 11, pp. 77385-77402
Open Access | Times Cited: 6
Nanavath Kiran Singh Nayak, Budhaditya Bhattacharyya
IEEE Access (2023) Vol. 11, pp. 77385-77402
Open Access | Times Cited: 6
CL2ES-KDBC: A Novel Covariance Embedded Selection Based on Kernel Distributed Bayes Classifier for Detection of Cyber-Attacks in IoT Systems
Talal Albalawi, P. Ganeshkumar
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 3, pp. 3511-3528
Open Access | Times Cited: 1
Talal Albalawi, P. Ganeshkumar
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 3, pp. 3511-3528
Open Access | Times Cited: 1
Enhanced Active Eavesdroppers Detection System for Multihop WSNs in Tactical IoT Applications
Masih Abedini, Irfan Al‐Anbagi
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 4, pp. 6748-6760
Closed Access | Times Cited: 4
Masih Abedini, Irfan Al‐Anbagi
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 4, pp. 6748-6760
Closed Access | Times Cited: 4
Cyber Security Threats Detection in IoT Using Krill Based Deep Neural Network Stacked Auto Encoders
Pragati Rana, Sanjeev Chauhan, B. P. Patil
Wireless Personal Communications (2024) Vol. 135, Iss. 1, pp. 299-322
Open Access | Times Cited: 1
Pragati Rana, Sanjeev Chauhan, B. P. Patil
Wireless Personal Communications (2024) Vol. 135, Iss. 1, pp. 299-322
Open Access | Times Cited: 1
Improved sand cat swarm optimization with deep learning based enhanced malicious activity recognition for cybersecurity
Roopa M, Naif Almakayeel, E. Laxmi Lydia
Alexandria Engineering Journal (2024) Vol. 98, pp. 187-198
Open Access | Times Cited: 1
Roopa M, Naif Almakayeel, E. Laxmi Lydia
Alexandria Engineering Journal (2024) Vol. 98, pp. 187-198
Open Access | Times Cited: 1
Team Work Optimizer Based Bidirectional LSTM Model for Designing a Secure Cybersecurity Model
Rohith Vallabhaneni, H S Nagamani, P Harshitha, et al.
(2024), pp. 1-6
Closed Access | Times Cited: 1
Rohith Vallabhaneni, H S Nagamani, P Harshitha, et al.
(2024), pp. 1-6
Closed Access | Times Cited: 1
ARP spoofing detection using machine learning classifiers: an experimental study
Sharmistha Majumder, Mrinal Kanti Deb Barma, Ashim Saha
Knowledge and Information Systems (2024) Vol. 67, Iss. 1, pp. 727-766
Closed Access | Times Cited: 1
Sharmistha Majumder, Mrinal Kanti Deb Barma, Ashim Saha
Knowledge and Information Systems (2024) Vol. 67, Iss. 1, pp. 727-766
Closed Access | Times Cited: 1
Novel Hybrid Deep Learning based Cyber Security Threat Detection Model with Optimization Algorithm
S. Markkandeyan, A. Dennis Ananth, M. Rajakumaran, et al.
Cyber Security and Applications (2024), pp. 100075-100075
Open Access | Times Cited: 1
S. Markkandeyan, A. Dennis Ananth, M. Rajakumaran, et al.
Cyber Security and Applications (2024), pp. 100075-100075
Open Access | Times Cited: 1
SecEdge: A Novel Deep Learning Framework for Real-Time Cybersecurity in Mobile IoT Environments
Kamran Ahmad Awan, Ikram Ud Din, Ahmad Almogren, et al.
Heliyon (2024) Vol. 11, Iss. 1, pp. e40874-e40874
Closed Access | Times Cited: 1
Kamran Ahmad Awan, Ikram Ud Din, Ahmad Almogren, et al.
Heliyon (2024) Vol. 11, Iss. 1, pp. e40874-e40874
Closed Access | Times Cited: 1
A Petri Net and LSTM Hybrid Approach for Intrusion Detection Systems in Enterprise Networks
Gaetano Volpe, Marco Fiore, Annabella la Grasta, et al.
Sensors (2024) Vol. 24, Iss. 24, pp. 7924-7924
Open Access | Times Cited: 1
Gaetano Volpe, Marco Fiore, Annabella la Grasta, et al.
Sensors (2024) Vol. 24, Iss. 24, pp. 7924-7924
Open Access | Times Cited: 1
An Application of the Khumbelo Function on the Camellia Algorithm to Prevent Attacks in IoT Devices
Khumbelo Difference Muthavhine, Mbuyu Sumbwanyambe
IEEE Access (2023) Vol. 11, pp. 119959-119992
Open Access | Times Cited: 2
Khumbelo Difference Muthavhine, Mbuyu Sumbwanyambe
IEEE Access (2023) Vol. 11, pp. 119959-119992
Open Access | Times Cited: 2
Threat models for vulnerability analysis of IoT devices for Manipulation of Demand attacks
J. A. Font, Javier Jarauta, Roberto Gesteira, et al.
(2023), pp. 1-8
Closed Access | Times Cited: 2
J. A. Font, Javier Jarauta, Roberto Gesteira, et al.
(2023), pp. 1-8
Closed Access | Times Cited: 2