
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Secure Intrusion Detection Platform Using Blockchain and Radial Basis Function Neural Networks for Internet of Drones
Arash Heidari, Nima Jafari Navimipour, Mehmet Ünal
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 10, pp. 8445-8454
Closed Access | Times Cited: 107
Arash Heidari, Nima Jafari Navimipour, Mehmet Ünal
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 10, pp. 8445-8454
Closed Access | Times Cited: 107
Showing 1-25 of 107 citing articles:
A Comprehensive Review of Recent Research Trends on Unmanned Aerial Vehicles (UAVs)
Khaled Telli, Okba Kraa, Yassine Himeur, et al.
Systems (2023) Vol. 11, Iss. 8, pp. 400-400
Open Access | Times Cited: 120
Khaled Telli, Okba Kraa, Yassine Himeur, et al.
Systems (2023) Vol. 11, Iss. 8, pp. 400-400
Open Access | Times Cited: 120
Adventures in data analysis: a systematic review of Deep Learning techniques for pattern recognition in cyber-physical-social systems
Zahra Mohtasham‐Amiri, Arash Heidari, Nima Jafari Navimipour, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 8, pp. 22909-22973
Closed Access | Times Cited: 83
Zahra Mohtasham‐Amiri, Arash Heidari, Nima Jafari Navimipour, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 8, pp. 22909-22973
Closed Access | Times Cited: 83
Deep learning enabled intrusion detection system for Industrial IOT environment
Himanshu Nandanwar, Rahul Katarya
Expert Systems with Applications (2024) Vol. 249, pp. 123808-123808
Closed Access | Times Cited: 27
Himanshu Nandanwar, Rahul Katarya
Expert Systems with Applications (2024) Vol. 249, pp. 123808-123808
Closed Access | Times Cited: 27
A systematic review and meta-analysis of artificial neural network, machine learning, deep learning, and ensemble learning approaches in field of geotechnical engineering
Elaheh Yaghoubi, Elnaz Yaghoubi, Ahmed A. Khamees, et al.
Neural Computing and Applications (2024) Vol. 36, Iss. 21, pp. 12655-12699
Open Access | Times Cited: 18
Elaheh Yaghoubi, Elnaz Yaghoubi, Ahmed A. Khamees, et al.
Neural Computing and Applications (2024) Vol. 36, Iss. 21, pp. 12655-12699
Open Access | Times Cited: 18
Enhancing intrusion detection: a hybrid machine and deep learning approach
Muhammad Sajid, Kaleem Razzaq Malik, Ahmad Almogren, et al.
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 16
Muhammad Sajid, Kaleem Razzaq Malik, Ahmad Almogren, et al.
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 16
A Survey on Heterogeneity Taxonomy, Security and Privacy Preservation in the Integration of IoT, Wireless Sensor Networks and Federated Learning
Tesfahunegn Minwuyelet Mengistu, Taewoon Kim, Jenn-Wei Lin
Sensors (2024) Vol. 24, Iss. 3, pp. 968-968
Open Access | Times Cited: 14
Tesfahunegn Minwuyelet Mengistu, Taewoon Kim, Jenn-Wei Lin
Sensors (2024) Vol. 24, Iss. 3, pp. 968-968
Open Access | Times Cited: 14
Distributed Blockchain-SDN Secure IoT System Based on ANN to Mitigate DDoS Attacks
Rihab Jmal, Walid Ghabri, Ramzi Guesmi, et al.
Applied Sciences (2023) Vol. 13, Iss. 8, pp. 4953-4953
Open Access | Times Cited: 26
Rihab Jmal, Walid Ghabri, Ramzi Guesmi, et al.
Applied Sciences (2023) Vol. 13, Iss. 8, pp. 4953-4953
Open Access | Times Cited: 26
Blockchain-Assisted Hybrid Harris Hawks Optimization Based Deep DDoS Attack Detection in the IoT Environment
Iyad Katib, Mahmoud Ragab
Mathematics (2023) Vol. 11, Iss. 8, pp. 1887-1887
Open Access | Times Cited: 24
Iyad Katib, Mahmoud Ragab
Mathematics (2023) Vol. 11, Iss. 8, pp. 1887-1887
Open Access | Times Cited: 24
Secure and Privacy-Preserving Intrusion Detection and Prevention in the Internet of Unmanned Aerial Vehicles
Ernest Ntizikira, Lei Wang, Fahad Alblehai, et al.
Sensors (2023) Vol. 23, Iss. 19, pp. 8077-8077
Open Access | Times Cited: 22
Ernest Ntizikira, Lei Wang, Fahad Alblehai, et al.
Sensors (2023) Vol. 23, Iss. 19, pp. 8077-8077
Open Access | Times Cited: 22
Design of stochastic neural networks for the fifth order system of singular engineering model
Zulqurnain Sabir, Mohammed M. Babatin, Atef F. Hashem, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 133, pp. 108141-108141
Closed Access | Times Cited: 12
Zulqurnain Sabir, Mohammed M. Babatin, Atef F. Hashem, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 133, pp. 108141-108141
Closed Access | Times Cited: 12
Security for the Metaverse: Blockchain and Machine Learning Techniques for Intrusion Detection
Vu Tuan Truong, Long Bao Le
IEEE Network (2024) Vol. 38, Iss. 5, pp. 204-212
Open Access | Times Cited: 11
Vu Tuan Truong, Long Bao Le
IEEE Network (2024) Vol. 38, Iss. 5, pp. 204-212
Open Access | Times Cited: 11
Applying self-supervised learning to network intrusion detection for network flows with graph neural network
Renjie Xu, Guangwei Wu, Weiping Wang, et al.
Computer Networks (2024) Vol. 248, pp. 110495-110495
Open Access | Times Cited: 10
Renjie Xu, Guangwei Wu, Weiping Wang, et al.
Computer Networks (2024) Vol. 248, pp. 110495-110495
Open Access | Times Cited: 10
Designing a modified feature aggregation model with hybrid sampling techniques for network intrusion detection
NarasimhaSwamy Biyyapu, Veerapaneni Esther Jyothi, Phani Praveen Surapaneni, et al.
Cluster Computing (2024) Vol. 27, Iss. 5, pp. 5913-5931
Closed Access | Times Cited: 9
NarasimhaSwamy Biyyapu, Veerapaneni Esther Jyothi, Phani Praveen Surapaneni, et al.
Cluster Computing (2024) Vol. 27, Iss. 5, pp. 5913-5931
Closed Access | Times Cited: 9
Neural Networks for the Detection of COVID-19 and Other Diseases: Prospects and Challenges
Muhammad Waqar Azeem, Shumaila Javaid, Ruhul Amin Khalil, et al.
Bioengineering (2023) Vol. 10, Iss. 7, pp. 850-850
Open Access | Times Cited: 19
Muhammad Waqar Azeem, Shumaila Javaid, Ruhul Amin Khalil, et al.
Bioengineering (2023) Vol. 10, Iss. 7, pp. 850-850
Open Access | Times Cited: 19
Recognizing Road Surface Traffic Signs Based on Yolo Models Considering Image Flips
Christine Dewi, Rung-Ching Chen, Yong-Cun Zhuang, et al.
Big Data and Cognitive Computing (2023) Vol. 7, Iss. 1, pp. 54-54
Open Access | Times Cited: 18
Christine Dewi, Rung-Ching Chen, Yong-Cun Zhuang, et al.
Big Data and Cognitive Computing (2023) Vol. 7, Iss. 1, pp. 54-54
Open Access | Times Cited: 18
UAV Detection and Tracking in Urban Environments Using Passive Sensors: A Survey
Xiao-Chen Yan, Tingting Fu, Huaming Lin, et al.
Applied Sciences (2023) Vol. 13, Iss. 20, pp. 11320-11320
Open Access | Times Cited: 17
Xiao-Chen Yan, Tingting Fu, Huaming Lin, et al.
Applied Sciences (2023) Vol. 13, Iss. 20, pp. 11320-11320
Open Access | Times Cited: 17
Research trends in deep learning and machine learning for cloud computing security
Yehia Ibrahim Alzoubi, Alok Mishra, Ahmet E. Topcu
Artificial Intelligence Review (2024) Vol. 57, Iss. 5
Closed Access | Times Cited: 5
Yehia Ibrahim Alzoubi, Alok Mishra, Ahmet E. Topcu
Artificial Intelligence Review (2024) Vol. 57, Iss. 5
Closed Access | Times Cited: 5
ENVQA: Improving Visual Question Answering model by enriching the visual feature
Souvik Chowdhury, Badal Soni
Engineering Applications of Artificial Intelligence (2025) Vol. 142, pp. 109948-109948
Closed Access
Souvik Chowdhury, Badal Soni
Engineering Applications of Artificial Intelligence (2025) Vol. 142, pp. 109948-109948
Closed Access
A two-tier optimization strategy for feature selection in robust adversarial attack mitigation on internet of things network security
K. Sai Prasad, P. Udayakumar, E. Laxmi Lydia, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
K. Sai Prasad, P. Udayakumar, E. Laxmi Lydia, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
A new framework to assess the impact of new IT-based technologies on the success of quality management system
Yiying Cao, Farah Qasim Ahmed Alyousuf
Journal Of Big Data (2025) Vol. 12, Iss. 1
Open Access
Yiying Cao, Farah Qasim Ahmed Alyousuf
Journal Of Big Data (2025) Vol. 12, Iss. 1
Open Access
Boosting incremental intrusion detection system with adversarial samples
Xiaodong Wu, Zhigang Jin, Xuyang Chen, et al.
Expert Systems with Applications (2025), pp. 126632-126632
Closed Access
Xiaodong Wu, Zhigang Jin, Xuyang Chen, et al.
Expert Systems with Applications (2025), pp. 126632-126632
Closed Access
Privacy-preserving approach for IoT networks using statistical learning with optimization algorithm on high-dimensional big data environment
Fatma S. Alrayes, Mohammed Maray, Asma Alshuhail, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Fatma S. Alrayes, Mohammed Maray, Asma Alshuhail, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Modelling and Neuro-Adaptive Robust Control Algorithms for Solid Fuel Rockets
Christian Danner Ramos de Carvalho, João Viana da Fonseca Neto
Journal of Aerospace Technology and Management (2025) Vol. 17
Open Access
Christian Danner Ramos de Carvalho, João Viana da Fonseca Neto
Journal of Aerospace Technology and Management (2025) Vol. 17
Open Access
Smart buildings: Federated learning-driven secure, transparent and smart energy management system using XAI
Muhammad Adnan Khan, Muhammad Sajid Farooq, Muhammad Saleem, et al.
Energy Reports (2025) Vol. 13, pp. 2066-2081
Closed Access
Muhammad Adnan Khan, Muhammad Sajid Farooq, Muhammad Saleem, et al.
Energy Reports (2025) Vol. 13, pp. 2066-2081
Closed Access
Robust machine learning based Intrusion detection system using simple statistical techniques in feature selection
Sunil Kaushik, Akashdeep Bhardwaj, Ahmad Almogren, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Sunil Kaushik, Akashdeep Bhardwaj, Ahmad Almogren, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access