
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
XAI-IoT: An Explainable AI Framework for Enhancing Anomaly Detection in IoT Systems
Anna Namrita Gummadi, Jerry C. Napier, Mustafa Abdallah
IEEE Access (2024) Vol. 12, pp. 71024-71054
Open Access | Times Cited: 8
Anna Namrita Gummadi, Jerry C. Napier, Mustafa Abdallah
IEEE Access (2024) Vol. 12, pp. 71024-71054
Open Access | Times Cited: 8
Showing 8 citing articles:
Explainable AI in Manufacturing and Industrial Cyber–Physical Systems: A Survey
Sajad Moosavi, Maryam Farajzadeh-Zanjani, Roozbeh Razavi–Far, et al.
Electronics (2024) Vol. 13, Iss. 17, pp. 3497-3497
Open Access | Times Cited: 5
Sajad Moosavi, Maryam Farajzadeh-Zanjani, Roozbeh Razavi–Far, et al.
Electronics (2024) Vol. 13, Iss. 17, pp. 3497-3497
Open Access | Times Cited: 5
The role of IoT and XAI convergence in the prediction, explanation, and decision of customer perceived value (CPV) in SMEs: a theoretical framework and research proposition perspective
Kwabena Abrokwah-Larbi
Discover Internet of Things (2025) Vol. 5, Iss. 1
Open Access
Kwabena Abrokwah-Larbi
Discover Internet of Things (2025) Vol. 5, Iss. 1
Open Access
A systematic evaluation of white-box explainable AI methods for anomaly detection in IoT systems
Anna Namrita Gummadi, Osvaldo Arreche, Mustafa Abdallah
Internet of Things (2025) Vol. 30, pp. 101505-101505
Closed Access
Anna Namrita Gummadi, Osvaldo Arreche, Mustafa Abdallah
Internet of Things (2025) Vol. 30, pp. 101505-101505
Closed Access
TOCA-IoT: Threshold Optimization and Causal Analysis for IoT Network Anomaly Detection Based on Explainable Random Forest
Ibrahim Gad
Algorithms (2025) Vol. 18, Iss. 2, pp. 117-117
Open Access
Ibrahim Gad
Algorithms (2025) Vol. 18, Iss. 2, pp. 117-117
Open Access
Towards Ensemble Feature Selection for Lightweight Intrusion Detection in Resource-Constrained IoT Devices
Mahawish Fatima, Osama Rehman, Ibrahim M. H. Rahman, et al.
Future Internet (2024) Vol. 16, Iss. 10, pp. 368-368
Open Access | Times Cited: 2
Mahawish Fatima, Osama Rehman, Ibrahim M. H. Rahman, et al.
Future Internet (2024) Vol. 16, Iss. 10, pp. 368-368
Open Access | Times Cited: 2
A Comparative Analysis of Anomaly Detection Methods in IoT Networks: An Experimental Study
Emanuel Krzysztoń, Izabela Rojek, Dariusz Mikołajewski
Applied Sciences (2024) Vol. 14, Iss. 24, pp. 11545-11545
Open Access | Times Cited: 2
Emanuel Krzysztoń, Izabela Rojek, Dariusz Mikołajewski
Applied Sciences (2024) Vol. 14, Iss. 24, pp. 11545-11545
Open Access | Times Cited: 2
Building a Smart Security Framework for IoT/IIoT
Akashdeep Bhardwaj
Advances in information security, privacy, and ethics book series (2024), pp. 102-127
Closed Access
Akashdeep Bhardwaj
Advances in information security, privacy, and ethics book series (2024), pp. 102-127
Closed Access
Improving Network Resilience Against DDoS Attacks: A Fuzzy TOPSIS-based Quantitative Assessment Approach
Sultan H. Almotiri
Heliyon (2024) Vol. 10, Iss. 22, pp. e40413-e40413
Open Access
Sultan H. Almotiri
Heliyon (2024) Vol. 10, Iss. 22, pp. e40413-e40413
Open Access