
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Modified Transformer Neural Network (MTNN) for Robust Intrusion Detection in IoT Networks
Syed Wahaj Ahmed, Fabio Kientz, Rasha Kashef
2022 International Telecommunications Conference (ITC-Egypt) (2023), pp. 663-668
Closed Access | Times Cited: 7
Syed Wahaj Ahmed, Fabio Kientz, Rasha Kashef
2022 International Telecommunications Conference (ITC-Egypt) (2023), pp. 663-668
Closed Access | Times Cited: 7
Showing 7 citing articles:
A voting gray wolf optimizer-based ensemble learning models for intrusion detection in the Internet of Things
Yakub Kayode Saheed, Sanjay Misra
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 1557-1581
Open Access | Times Cited: 24
Yakub Kayode Saheed, Sanjay Misra
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 1557-1581
Open Access | Times Cited: 24
FPE–Transformer: A Feature Positional Encoding-Based Transformer Model for Attack Detection
Hande Çavşi Zaim, Esra YOLAÇAN
Applied Sciences (2025) Vol. 15, Iss. 3, pp. 1252-1252
Open Access
Hande Çavşi Zaim, Esra YOLAÇAN
Applied Sciences (2025) Vol. 15, Iss. 3, pp. 1252-1252
Open Access
A Transformer-Based Model for Network Intrusion Detection: Architecture, Classification Heads, and Transformer Blocks
Nourhan M. Ibrahim, Sarama Shehmir, Aman Yadav, et al.
Lecture notes in electrical engineering (2025), pp. 149-163
Closed Access
Nourhan M. Ibrahim, Sarama Shehmir, Aman Yadav, et al.
Lecture notes in electrical engineering (2025), pp. 149-163
Closed Access
Navigating the Cyber Threat Landscape: An In-Depth Analysis of Attack Detection within IoT Ecosystems
Samar AboulEla, Nourhan M. Ibrahim, Sarama Shehmir, et al.
AI (2024) Vol. 5, Iss. 2, pp. 704-732
Open Access | Times Cited: 3
Samar AboulEla, Nourhan M. Ibrahim, Sarama Shehmir, et al.
AI (2024) Vol. 5, Iss. 2, pp. 704-732
Open Access | Times Cited: 3
Multi-Class Intrusion Detection Based on Transformer for IoT Networks Using CIC-IoT-2023 Dataset
Shu‐Ming Tseng, Yanqi Wang, Yung‐Chung Wang
Future Internet (2024) Vol. 16, Iss. 8, pp. 284-284
Open Access | Times Cited: 3
Shu‐Ming Tseng, Yanqi Wang, Yung‐Chung Wang
Future Internet (2024) Vol. 16, Iss. 8, pp. 284-284
Open Access | Times Cited: 3
Survey of Transformer-Based Malicious Software Detection Systems
M. M. Al-Shomrani, Aiiad Albeshri, Badraddin Alturki, et al.
Electronics (2024) Vol. 13, Iss. 23, pp. 4677-4677
Open Access
M. M. Al-Shomrani, Aiiad Albeshri, Badraddin Alturki, et al.
Electronics (2024) Vol. 13, Iss. 23, pp. 4677-4677
Open Access
Enhancing Embedded IoT Systems for Intrusion Detection Using a Hybrid Model
Mansour Alqarni, Akramul Azim
(2024), pp. 345-366
Closed Access
Mansour Alqarni, Akramul Azim
(2024), pp. 345-366
Closed Access