
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An Intrusion Detection System for IoT Using KNN and Decision-Tree Based Classification
Zainab Hussam Abdaljabar, Osman N. Uçan, Khattab M. Ali Alheeti
(2021)
Closed Access | Times Cited: 17
Zainab Hussam Abdaljabar, Osman N. Uçan, Khattab M. Ali Alheeti
(2021)
Closed Access | Times Cited: 17
Showing 17 citing articles:
Analysis of IoT Security Challenges and Its Solutions Using Artificial Intelligence
Tehseen Mazhar, Dhani Bux Talpur, Tamara Al Shloul, et al.
Brain Sciences (2023) Vol. 13, Iss. 4, pp. 683-683
Open Access | Times Cited: 62
Tehseen Mazhar, Dhani Bux Talpur, Tamara Al Shloul, et al.
Brain Sciences (2023) Vol. 13, Iss. 4, pp. 683-683
Open Access | Times Cited: 62
Attack classification in network intrusion detection system based on optimization strategy and deep learning methodology
Et al. Ch. Kodanda Ramu, T. Srinivasa Rao, E. Uma Shankar Rao
Multimedia Tools and Applications (2024) Vol. 83, Iss. 31, pp. 75533-75555
Closed Access | Times Cited: 6
Et al. Ch. Kodanda Ramu, T. Srinivasa Rao, E. Uma Shankar Rao
Multimedia Tools and Applications (2024) Vol. 83, Iss. 31, pp. 75533-75555
Closed Access | Times Cited: 6
A Survey of Industrial AIoT: Opportunities, Challenges, and Directions
Kamran Sattar Awaisi, Qiang Ye, Srinivas Sampalli
IEEE Access (2024) Vol. 12, pp. 96946-96996
Open Access | Times Cited: 5
Kamran Sattar Awaisi, Qiang Ye, Srinivas Sampalli
IEEE Access (2024) Vol. 12, pp. 96946-96996
Open Access | Times Cited: 5
DDoSViT: IoT DDoS attack detection for fortifying firmware Over-The-Air (OTA) updates using vision transformer
Muhammad Intizar Ali, Yasir Saleem, Sadaf Hina, et al.
Internet of Things (2025) Vol. 30, pp. 101527-101527
Open Access
Muhammad Intizar Ali, Yasir Saleem, Sadaf Hina, et al.
Internet of Things (2025) Vol. 30, pp. 101527-101527
Open Access
Machine Learning-Based Intrusion Detection Methods in IoT Systems: A Comprehensive Review
Brunel Rolack Kikissagbe, Meddi Adda
Electronics (2024) Vol. 13, Iss. 18, pp. 3601-3601
Open Access | Times Cited: 4
Brunel Rolack Kikissagbe, Meddi Adda
Electronics (2024) Vol. 13, Iss. 18, pp. 3601-3601
Open Access | Times Cited: 4
An adaptive nonlinear whale optimization multi-layer perceptron cyber intrusion detection framework
Hany El-Ghaish, Haitham Miqrish, Ahmed Elmogy, et al.
International Journal of Machine Learning and Cybernetics (2024) Vol. 15, Iss. 10, pp. 4801-4814
Open Access | Times Cited: 2
Hany El-Ghaish, Haitham Miqrish, Ahmed Elmogy, et al.
International Journal of Machine Learning and Cybernetics (2024) Vol. 15, Iss. 10, pp. 4801-4814
Open Access | Times Cited: 2
Detection of Vulnerabilities in Smart Buildings Using the Shodan Tool
Sofía Mulero-Palencia, Víctor Monzón Baeza
Electronics (2023) Vol. 12, Iss. 23, pp. 4815-4815
Open Access | Times Cited: 6
Sofía Mulero-Palencia, Víctor Monzón Baeza
Electronics (2023) Vol. 12, Iss. 23, pp. 4815-4815
Open Access | Times Cited: 6
Machine Learning for DoS Attack Detection in IoT Systems
Brunel Rolack Kikissagbe, Mehdi Adda, Paul Célicourt, et al.
Procedia Computer Science (2024) Vol. 241, pp. 195-202
Open Access | Times Cited: 1
Brunel Rolack Kikissagbe, Mehdi Adda, Paul Célicourt, et al.
Procedia Computer Science (2024) Vol. 241, pp. 195-202
Open Access | Times Cited: 1
A Customized Machine Learning-Based Intrusion Detection System with K-Sort Loss Rfelightgbm for Scada System
Marziyeh Rezvanpanah, Mohammad Hossein Yaghmaee
(2024)
Closed Access
Marziyeh Rezvanpanah, Mohammad Hossein Yaghmaee
(2024)
Closed Access
Transmission Power Reduction Based on an Enhanced Particle Swarm Optimization Algorithm in Wireless Sensor Network for Internet of Things
Moneer Ali Lilo, Abidulkarim K. I. Yasari, Mustafa Maad Hamdi, et al.
ARO-The Scientific Journal of Koya University (2024) Vol. 12, Iss. 2, pp. 61-69
Open Access
Moneer Ali Lilo, Abidulkarim K. I. Yasari, Mustafa Maad Hamdi, et al.
ARO-The Scientific Journal of Koya University (2024) Vol. 12, Iss. 2, pp. 61-69
Open Access
IoT Network Anomaly Detection Using Machine Learning and Deep Learning Techniques - Research Study
Hamda Rashed Obaid Alghaithi, Maryam Mahmood Al Mahmood Alshehhi, M. Thangavel
(2024), pp. 1-6
Closed Access
Hamda Rashed Obaid Alghaithi, Maryam Mahmood Al Mahmood Alshehhi, M. Thangavel
(2024), pp. 1-6
Closed Access
Long-Range Wide Area Network Intrusion Detection at the Edge
Gonçalo Esteves, Filipe Fidalgo, Nuno Cruz, et al.
IoT (2024) Vol. 5, Iss. 4, pp. 871-900
Open Access
Gonçalo Esteves, Filipe Fidalgo, Nuno Cruz, et al.
IoT (2024) Vol. 5, Iss. 4, pp. 871-900
Open Access
A Survey on Supervised Machine Learning in Intrusion Detection Systems for Internet of Things
Shakirah Binti Saidin, Syifak Binti Izhar Hisham
(2023), pp. 419-423
Closed Access | Times Cited: 1
Shakirah Binti Saidin, Syifak Binti Izhar Hisham
(2023), pp. 419-423
Closed Access | Times Cited: 1
GE-IDS: an intrusion detection system based on grayscale and entropy
Dan Liao, Ruijin Zhou, Hui Li, et al.
Peer-to-Peer Networking and Applications (2022) Vol. 15, Iss. 3, pp. 1521-1534
Closed Access | Times Cited: 2
Dan Liao, Ruijin Zhou, Hui Li, et al.
Peer-to-Peer Networking and Applications (2022) Vol. 15, Iss. 3, pp. 1521-1534
Closed Access | Times Cited: 2
Detection of unique delete attack in wireless sensor network using gradient thresholding‐long short‐term memory algorithm
Tamil Selvi S, Pandikkannu Visalakshi
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 27
Closed Access | Times Cited: 2
Tamil Selvi S, Pandikkannu Visalakshi
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 27
Closed Access | Times Cited: 2
Securing 5G Networks through Machine Learning – A Comparative Analysis
Piyush Kulshreshtha, Amit Garg
2022 IEEE 11th International Conference on Communication Systems and Network Technologies (CSNT) (2022), pp. 183-189
Closed Access | Times Cited: 1
Piyush Kulshreshtha, Amit Garg
2022 IEEE 11th International Conference on Communication Systems and Network Technologies (CSNT) (2022), pp. 183-189
Closed Access | Times Cited: 1
Using Bidirectional Federated Transfer Learning for Intrusion Detection in Heterogeneous Industrial Internet of Things
Teng-Qing Zhan, Tsung-Han Lee, Lin-Huang Chang
(2023), pp. 115-123
Closed Access
Teng-Qing Zhan, Tsung-Han Lee, Lin-Huang Chang
(2023), pp. 115-123
Closed Access