OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Cyber Attacks Detection based on Deep Learning for Cloud-Dew Computing in Automotive IoT Applications
Mohamed Mounir Moussa, Lubna Alazzawi
(2020), pp. 55-61
Closed Access | Times Cited: 21

Showing 21 citing articles:

Zero-day attack detection: a systematic literature review
Rasheed Ahmad, Izzat Alsmadi, Wasim A. Al-Hamdani, et al.
Artificial Intelligence Review (2023) Vol. 56, Iss. 10, pp. 10733-10811
Closed Access | Times Cited: 54

Cyberattack and Fraud Detection Using Ensemble Stacking
Raha Soleymanzadeh, Mustafa Aljasim, Muhammad Waseem Qadeer, et al.
AI (2022) Vol. 3, Iss. 1, pp. 22-36
Open Access | Times Cited: 35

A genetic-based random ensemble forest learning for cloud-based automotive data transformation in internet of vehicle
Suja N Qureshi, Alireza Souri, Nihat İnanç, et al.
Alexandria Engineering Journal (2025) Vol. 120, pp. 74-86
Closed Access

Enhancing cloud security: A study on ensemble learning‐based intrusion detection systems
Maha Al‐Sharif, Anas Bushnag
IET Communications (2024) Vol. 18, Iss. 16, pp. 950-965
Open Access | Times Cited: 1

A Hybrid Machine Learning‐Based Data‐Centric Cybersecurity Detection in the 5G‐Enabled IoT
Lingcheng Zeng, Yunzhu An, Heng Zhou, et al.
Security and Privacy (2024)
Open Access | Times Cited: 1

Towards building data analytics benchmarks for IoT intrusion detection
Rasheed Ahmad, Izzat Alsmadi, Wasim A. Al-Hamdani, et al.
Cluster Computing (2021) Vol. 25, Iss. 3, pp. 2125-2141
Closed Access | Times Cited: 11

Experimental Analysis using Deep Learning Techniques for Safety and Riskless Transport - A Sustainable Mobility Environment for Post Covid-19
D. Selvakarthi, D. Sivabalaselvamani, Soumya Ashwath, et al.
(2021), pp. 980-984
Closed Access | Times Cited: 9

Comprehensive Study of Moving from Grid and Cloud Computing Through Fog and Edge Computing towards Dew Computing
Zainab Salih Ageed, Subhi R. M. Zeebaree, Mohammed A. M. Sadeeq, et al.
(2021), pp. 68-74
Closed Access | Times Cited: 9

Internet of Things Aware Secure Dew Computing Architecture for Distributed Hotspot Network: A Conceptual Study
Partha Pratim Ray, Karolj Skala
Applied Sciences (2022) Vol. 12, Iss. 18, pp. 8963-8963
Open Access | Times Cited: 4

A Deep Fusion Model For Automated Industrial Iot Cyber Attack Detection And Mitigation
Bibhuti Bhusana Behera, Rajani Kanta Mohanty, Binod Kumar Pattanayak
International Journal of Electrical and Electronics Research (2022) Vol. 10, Iss. 3, pp. 604-613
Open Access | Times Cited: 4

Screening Cyberattacks and Fraud via Heterogeneous Layering
Abdulrahman Alahmadi
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 3
Open Access

Recent Research Solutions on Deep Learning-based Anomaly Detection in Internet of Things
Alanoud Eisa Faraj Alfalahi, Shahd Rashed Abdulla Alhebsi, M. Thangavel
(2024), pp. 1-6
Closed Access

A Hybrid Deep Learning Cyber-Attacks Intrusion Detection System for CAV Path Planning
Mohamed Mounir Moussa, Lubna Alazzawi
(2021) Vol. 15, pp. 607-610
Closed Access | Times Cited: 4

Minimum required accuracy for HD maps
Štěpán Křehlík, Marek Vanžura, Adam Skokan
Journal of Navigation (2023) Vol. 76, Iss. 2-3, pp. 238-254
Open Access | Times Cited: 1

AI-Enabled Anomaly-Aware Occupancy Prediction in Grid-Interactive Efficient Buildings
Nina Fatehi, Alexandros Politis, Masoud H. Nazari
2021 North American Power Symposium (NAPS) (2023), pp. 1-6
Closed Access | Times Cited: 1

Models versus Datasets: Reducing Bias through Building a Comprehensive IDS Benchmark
Rasheed Ahmad, Izzat Alsmadi, Wasim A. Al-Hamdani, et al.
Future Internet (2021) Vol. 13, Iss. 12, pp. 318-318
Open Access | Times Cited: 2

A Novel Ensemble Model Using Learning Classifiers to Enhance Malware Detection for Cyber Security Systems
Abhijit Das, Pramod Pramod
International Journal on Recent and Innovation Trends in Computing and Communication (2022) Vol. 10, Iss. 1s, pp. 31-43
Open Access | Times Cited: 1

A Vision of Dew-IoT Ecosystem: Requirements, Architecture, and Challenges
Partha Pratim Ray, Karolj Skala
2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) (2021), pp. 1783-1788
Closed Access | Times Cited: 1

Machine Learning-Based Sustainable Dew Computing: Classical to Quantum
Mahua Nandy Pal, Diganta Sengupta, Tien Anh Tran, et al.
Internet of things (2023), pp. 149-177
Closed Access

Establishing security using cryptography and biometric authentication to counter cyber-attacks
Mohammed Adil Akbar, Mehdi Hamidkhani, Mostafa Sadeghi
(2023), pp. 247-252
Closed Access

Page 1

Scroll to top