
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Deep Learning Model based IDS for Detecting Cyber Attacks in IoT based Smart Vehicle Network
M. Vijay Anand, S. Praveen Kumar, M. Selvi, et al.
2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS) (2023), pp. 281-286
Closed Access | Times Cited: 9
M. Vijay Anand, S. Praveen Kumar, M. Selvi, et al.
2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS) (2023), pp. 281-286
Closed Access | Times Cited: 9
Showing 9 citing articles:
Intrusion detection system extended CNN and artificial bee colony optimization in wireless sensor networks
Karthik Raj Kumar Yesodha, M. Krishnamurthy, M. Selvi, et al.
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 3, pp. 1237-1262
Closed Access | Times Cited: 7
Karthik Raj Kumar Yesodha, M. Krishnamurthy, M. Selvi, et al.
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 3, pp. 1237-1262
Closed Access | Times Cited: 7
CHAINS: CHAIN-Based Fusion Safety System Framework for Intelligent Connected Vehicle
Shichun Yang, Bin Sun, Haoran Guang, et al.
Deleted Journal (2024) Vol. 1, Iss. 1, pp. 2-45
Closed Access | Times Cited: 4
Shichun Yang, Bin Sun, Haoran Guang, et al.
Deleted Journal (2024) Vol. 1, Iss. 1, pp. 2-45
Closed Access | Times Cited: 4
Intelligent fuzzy logic based intrusion detection system for effective detection of black hole attack in WSN
A Binthiya, Selvi Ravindran
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 4, pp. 1813-1829
Closed Access | Times Cited: 3
A Binthiya, Selvi Ravindran
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 4, pp. 1813-1829
Closed Access | Times Cited: 3
Prediction of middle box-based attacks in Internet of Healthcare Things using ranking subsets and convolutional neural network
Harun Bangali, Paul Rodrigues, V. Pandimurugan, et al.
Wireless Networks (2023) Vol. 30, Iss. 3, pp. 1493-1511
Closed Access | Times Cited: 7
Harun Bangali, Paul Rodrigues, V. Pandimurugan, et al.
Wireless Networks (2023) Vol. 30, Iss. 3, pp. 1493-1511
Closed Access | Times Cited: 7
Enhancing In-Vehicle Network Security Against AI-Generated Cyberattacks Using Machine Learning
Rahman Shafique, Furqan Rustam, Gyu Sang Choi, et al.
2022 IEEE Wireless Communications and Networking Conference (WCNC) (2024), pp. 1-6
Closed Access | Times Cited: 1
Rahman Shafique, Furqan Rustam, Gyu Sang Choi, et al.
2022 IEEE Wireless Communications and Networking Conference (WCNC) (2024), pp. 1-6
Closed Access | Times Cited: 1
A Novel Light-Weight Machine Learning Classifier for Intrusion Detection in Controller Area Network in Smart Cars
Anila Kousar, Saeed Ahmed, Abdullah Altamimi, et al.
Smart Cities (2024) Vol. 7, Iss. 6, pp. 3289-3314
Open Access | Times Cited: 1
Anila Kousar, Saeed Ahmed, Abdullah Altamimi, et al.
Smart Cities (2024) Vol. 7, Iss. 6, pp. 3289-3314
Open Access | Times Cited: 1
Rule and Encryption based Secure Routing for Internet of Vehicle Networks
M. Vijay Anand, S. Muthurajkumar, M. Selvi, et al.
(2024), pp. 1-6
Closed Access
M. Vijay Anand, S. Muthurajkumar, M. Selvi, et al.
(2024), pp. 1-6
Closed Access
In-Vehicle Networks Security Using Transfer Learning Approach Against AI-Generated Cyberattacks
Rahman Shafique, Furqan Rustam, Gyu Sang Choi, et al.
(2024), pp. 1-6
Closed Access
Rahman Shafique, Furqan Rustam, Gyu Sang Choi, et al.
(2024), pp. 1-6
Closed Access
Towards Robust Internet of Vehicles Security: An Edge Node-Based Machine Learning Framework for Attack Classification
Liehuang Zhu, Awais Bilal, Kashif Sharif, et al.
Lecture notes in computer science (2024), pp. 78-89
Closed Access
Liehuang Zhu, Awais Bilal, Kashif Sharif, et al.
Lecture notes in computer science (2024), pp. 78-89
Closed Access