
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Novel Intrusion Detection System Based on Artificial Neural Network and Genetic Algorithm With a New Dimensionality Reduction Technique for UAV Communication
Korhan Cengiz, Swati Lipsa, Ranjan Kumar Dash, et al.
IEEE Access (2024) Vol. 12, pp. 4925-4937
Open Access | Times Cited: 10
Korhan Cengiz, Swati Lipsa, Ranjan Kumar Dash, et al.
IEEE Access (2024) Vol. 12, pp. 4925-4937
Open Access | Times Cited: 10
Showing 10 citing articles:
Exhaustive distributed intrusion detection system for UAVs attacks detection and security enforcement (E-DIDS)
Fadhila Tlili, Samiha Ayed, Lamia Chaari Fourati
Computers & Security (2024) Vol. 142, pp. 103878-103878
Closed Access | Times Cited: 11
Fadhila Tlili, Samiha Ayed, Lamia Chaari Fourati
Computers & Security (2024) Vol. 142, pp. 103878-103878
Closed Access | Times Cited: 11
Machine Learning Models and Applications for Early Detection
Orlando Zapata-Cortés, Martín Darío Arango Serna, Julián Andrés Zapata-Cortés, et al.
Sensors (2024) Vol. 24, Iss. 14, pp. 4678-4678
Open Access | Times Cited: 5
Orlando Zapata-Cortés, Martín Darío Arango Serna, Julián Andrés Zapata-Cortés, et al.
Sensors (2024) Vol. 24, Iss. 14, pp. 4678-4678
Open Access | Times Cited: 5
Enhancing UAV Security Against GPS Spoofing Attacks Through a Genetic Algorithm-Driven Deep Learning Framework
Abdallah AL Sabbagh, Aya El-Bokhary, Sana El-Koussa, et al.
Information (2025) Vol. 16, Iss. 2, pp. 115-115
Open Access
Abdallah AL Sabbagh, Aya El-Bokhary, Sana El-Koussa, et al.
Information (2025) Vol. 16, Iss. 2, pp. 115-115
Open Access
An Overview of Full-Cycle Data Security for Drone Inspection
Ziwei Ding, Chen Zhang, Song Deng
Communications in computer and information science (2025), pp. 130-139
Closed Access
Ziwei Ding, Chen Zhang, Song Deng
Communications in computer and information science (2025), pp. 130-139
Closed Access
Enhancing network security with memory-augmented visual attention networks and predator–prey optimization models
Paraskevi Mani, S. Gopalakrishnan
Iran Journal of Computer Science (2025)
Closed Access
Paraskevi Mani, S. Gopalakrishnan
Iran Journal of Computer Science (2025)
Closed Access
Fixed-Wing UAV Formation Robust Fault-Tolerant Control With Switching Topologies
Jinlin Li, Fei Guo, Junmin Zhao
IEEE Access (2024) Vol. 12, pp. 40521-40533
Open Access | Times Cited: 2
Jinlin Li, Fei Guo, Junmin Zhao
IEEE Access (2024) Vol. 12, pp. 40521-40533
Open Access | Times Cited: 2
Reinforcing Network Security: Network Attack Detection Using Random Grove Blend in Weighted MLP Layers
Adel Binbusayyis
Mathematics (2024) Vol. 12, Iss. 11, pp. 1720-1720
Open Access | Times Cited: 1
Adel Binbusayyis
Mathematics (2024) Vol. 12, Iss. 11, pp. 1720-1720
Open Access | Times Cited: 1
A Nouvelle Optimal Intelligent Learning (OIL) Framework for Secured Data Transmission and Link Quality Analysis in UAV Systems
Bali Devi, S. Velliangiri
2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (2024), pp. 1-7
Closed Access
Bali Devi, S. Velliangiri
2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (2024), pp. 1-7
Closed Access
Optimization of Heat-Dissipation Structure of High-Power Diode Laser in Space Environments
Cheng Lei, Huaqing Sun, Xuanjun Dai, et al.
Micromachines (2024) Vol. 15, Iss. 8, pp. 968-968
Open Access
Cheng Lei, Huaqing Sun, Xuanjun Dai, et al.
Micromachines (2024) Vol. 15, Iss. 8, pp. 968-968
Open Access
Feature Selection using Improved Nomadic People Optimizer in Intrusion Detection
Zinah Sattar Jabbar Aboud, Rami Tawil, Mustafa S. Kadhm
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 6, pp. 18213-18221
Open Access
Zinah Sattar Jabbar Aboud, Rami Tawil, Mustafa S. Kadhm
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 6, pp. 18213-18221
Open Access
A comprehensive analysis of machine learning-based intrusion detection systems: evaluating datasets and algorithms for internet of things
Sohail Saif, Amir H. Ansari, Suparna Biswas, et al.
Journal of Cyber Security Technology (2024), pp. 1-27
Closed Access
Sohail Saif, Amir H. Ansari, Suparna Biswas, et al.
Journal of Cyber Security Technology (2024), pp. 1-27
Closed Access