OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

USMD: UnSupervised Misbehaviour Detection for Multi-Sensor Data
Abdullah Alsaedi, Zahir Tari, Redowan Mahmud, et al.
IEEE Transactions on Dependable and Secure Computing (2022) Vol. 20, Iss. 1, pp. 724-739
Closed Access | Times Cited: 25

Showing 25 citing articles:

iFogSim2: An extended iFogSim simulator for mobility, clustering, and microservice management in edge and fog computing environments
Redowan Mahmud, Samodha Pallewatta, Mohammad Goudarzi, et al.
Journal of Systems and Software (2022) Vol. 190, pp. 111351-111351
Open Access | Times Cited: 144

Dependable Intrusion Detection System for IoT: A Deep Transfer Learning Based Approach
Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 1, pp. 1006-1017
Open Access | Times Cited: 91

A Review of Anomaly Detection Strategies to Detect Threats to Cyber-Physical Systems
Nicholas Jeffrey, Qing Tan, José R. Villar
Electronics (2023) Vol. 12, Iss. 15, pp. 3283-3283
Open Access | Times Cited: 54

Scalable anomaly-based intrusion detection for secure Internet of Things using generative adversarial networks in fog environment
Wei Yao, Han Shi, Hai Zhao
Journal of Network and Computer Applications (2023) Vol. 214, pp. 103622-103622
Closed Access | Times Cited: 25

Deep Q-network-based heuristic intrusion detection against edge-based SIoT zero-day attacks
Shigen Shen, Chenpeng Cai, Zhenwei Li, et al.
Applied Soft Computing (2023) Vol. 150, pp. 111080-111080
Closed Access | Times Cited: 24

Industrial cyber-physical systems protection: A methodological review
Roberto Canonico, Giancarlo Sperlì
Computers & Security (2023) Vol. 135, pp. 103531-103531
Open Access | Times Cited: 23

Adversarial sample attacks and defenses based on LSTM-ED in industrial control systems
Yaru Liu, Lijuan Xu, Shumian Yang, et al.
Computers & Security (2024) Vol. 140, pp. 103750-103750
Closed Access | Times Cited: 6

ICS Anomaly Detection Based on Sensor Patterns and Actuator Rules in Spatiotemporal Dependency
Jun Cai, Zeheng Wei, Jianzhen Luo
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 8, pp. 10647-10656
Closed Access | Times Cited: 6

SEHIDS: Self Evolving Host-Based Intrusion Detection System for IoT Networks
Mohammed Baz
Sensors (2022) Vol. 22, Iss. 17, pp. 6505-6505
Open Access | Times Cited: 25

Empowered Cyber-Physical Systems security using both network and physical data
Roberto Canonico, Giovanni Esposito, Annalisa Navarro, et al.
Computers & Security (2025), pp. 104382-104382
Open Access

Remediation of chaos in cognitive Internet of Things sensor network
Vidyapati Jha, Priyanka Tripathi
Ad Hoc Networks (2025), pp. 103830-103830
Closed Access

Federated learning for misbehaviour detection with variational autoencoders and Gaussian mixture models
Enrique Mármol Campos, Aurora González-Vidal, José L. Hernández-Ramos, et al.
International Journal of Information Security (2025) Vol. 24, Iss. 2
Open Access

A real-time network based anomaly detection in industrial control systems
Faeze Zare, Payam Mahmoudi-Nasr, Rohollah Yousefpour
International Journal of Critical Infrastructure Protection (2024) Vol. 45, pp. 100676-100676
Closed Access | Times Cited: 4

Network traffic inspection to enhance anomaly detection in the Internet of Things using attention-driven Deep Learning
Mireya Lucia Hernandez-Jaimes, Alfonso Martínez-Cruz, Kelsey Alejandra Ramírez-Gutiérrez, et al.
Integration (2025), pp. 102398-102398
Closed Access

Intrusion Detection-Based Ensemble Learning and Microservices for Zero Touch Networks
Neda Bugshan, Ibrahim Khalil, Aditya Pribadi Kalapaaking, et al.
IEEE Communications Magazine (2023) Vol. 61, Iss. 6, pp. 86-92
Closed Access | Times Cited: 9

Multi-Behavior Contrastive Learning with graph neural networks for recommendation
V. Rasikha, P. Marikkannu
Knowledge-Based Systems (2024) Vol. 301, pp. 112211-112211
Closed Access | Times Cited: 2

Privacy-Preserving Collaborative Intrusion Detection in Edge of Internet of Things: A Robust and Efficient Deep Generative Learning Approach
Wei Yao, Zhao Hai, Han Shi
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 9, pp. 15704-15722
Closed Access | Times Cited: 6

Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model
Hongsong Chen, Xingyu Li, Wenmao Liu
Computers & Security (2023) Vol. 137, pp. 103581-103581
Closed Access | Times Cited: 5

Amplification methods to promote the attacks against machine learning-based intrusion detection systems
Sicong Zhang, Yang Xu, Xinyu Zhang, et al.
Applied Intelligence (2024) Vol. 54, Iss. 4, pp. 2941-2961
Closed Access | Times Cited: 1

Skip-patching spatial-temporal discrepancy-based anomaly detection on multivariate time series
Yinsong Xu, Yulong Ding, Jie Jiang, et al.
Neurocomputing (2024) Vol. 609, pp. 128428-128428
Open Access | Times Cited: 1

Realizing credible remote agricultural auditing with trusted video technology
Redowan Mahmud, Joshua Scarsbrook, Ryan K. L. Ko, et al.
Journal of Cybersecurity (2023) Vol. 9, Iss. 1
Open Access | Times Cited: 2

RADAR: Reactive Concept Drift Management with Robust Variational Inference for Evolving IoT Data Streams
Abdullah Alsaedi, Nasrin Sohrabi, Redowan Mahmud, et al.
2022 IEEE 38th International Conference on Data Engineering (ICDE) (2023), pp. 1995-2007
Closed Access | Times Cited: 2

Nonlinear Time Series Analysis for Anomaly Detection in Cybersecurity using Cloud IoT
Ashwani Kumar Dwivedi
Deleted Journal (2023) Vol. 26, Iss. 3, pp. 01-15
Open Access

Performance Optimisation of Regression-Based Machine Learning Models to Predict Mineral Land Prices for Tokenization
Abel James, Redowan Mahmud, Mahbuba Afrin, et al.
(2023), pp. 1-7
Closed Access

Page 1

Scroll to top