OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

S-ADS: Spectrogram Image-based Anomaly Detection System for IoT networks
Zeeshan Ahmad, Adnan Shahid Khan, Sehrish Aqeel, et al.
(2022), pp. 105-110
Closed Access | Times Cited: 6

Showing 6 citing articles:

Coarse and fine feature selection for Network Intrusion Detection Systems (IDS) in IoT networks
Mohammed Sayeeduddin Habeeb, Tummala Ranga Babu
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 4
Closed Access | Times Cited: 5

TPAAD: Two‐phase authentication system for denial of service attack detection and mitigation using machine learning in software‐defined network
Najmun Nisa, Adnan Shahid Khan, Zeeshan Ahmad, et al.
International Journal of Network Management (2024) Vol. 34, Iss. 3
Open Access | Times Cited: 4

MS‐ADS: Multistage Spectrogram image‐based Anomaly Detection System for IoT security
Zeeshan Ahmad, Adnan Shahid Khan, Karti­nah Zen, et al.
Transactions on Emerging Telecommunications Technologies (2023) Vol. 34, Iss. 8
Open Access | Times Cited: 6

HEADS: Hybrid Ensemble Anomaly Detection System for Internet-of-Things Networks
Zeeshan Ahmad, Andrei Petrovski, Murshedul Arifeen, et al.
Communications in computer and information science (2024), pp. 178-190
Closed Access | Times Cited: 1

Mutual Information Based Ensemble Anomaly Detection Strategy for Cyber-Physical Systems
Zeeshan Ahmad, Andrei Petrovski, Igor Kotenko, et al.
Lecture notes in networks and systems (2024), pp. 69-78
Closed Access

Page 1

Scroll to top