
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
USMD: UnSupervised Misbehaviour Detection for Multi-Sensor Data
Abdullah Alsaedi, Zahir Tari, Redowan Mahmud, et al.
IEEE Transactions on Dependable and Secure Computing (2022) Vol. 20, Iss. 1, pp. 724-739
Closed Access | Times Cited: 25
Abdullah Alsaedi, Zahir Tari, Redowan Mahmud, et al.
IEEE Transactions on Dependable and Secure Computing (2022) Vol. 20, Iss. 1, pp. 724-739
Closed Access | Times Cited: 25
Showing 25 citing articles:
iFogSim2: An extended iFogSim simulator for mobility, clustering, and microservice management in edge and fog computing environments
Redowan Mahmud, Samodha Pallewatta, Mohammad Goudarzi, et al.
Journal of Systems and Software (2022) Vol. 190, pp. 111351-111351
Open Access | Times Cited: 144
Redowan Mahmud, Samodha Pallewatta, Mohammad Goudarzi, et al.
Journal of Systems and Software (2022) Vol. 190, pp. 111351-111351
Open Access | Times Cited: 144
Dependable Intrusion Detection System for IoT: A Deep Transfer Learning Based Approach
Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 1, pp. 1006-1017
Open Access | Times Cited: 91
Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 1, pp. 1006-1017
Open Access | Times Cited: 91
A Review of Anomaly Detection Strategies to Detect Threats to Cyber-Physical Systems
Nicholas Jeffrey, Qing Tan, José R. Villar
Electronics (2023) Vol. 12, Iss. 15, pp. 3283-3283
Open Access | Times Cited: 54
Nicholas Jeffrey, Qing Tan, José R. Villar
Electronics (2023) Vol. 12, Iss. 15, pp. 3283-3283
Open Access | Times Cited: 54
Scalable anomaly-based intrusion detection for secure Internet of Things using generative adversarial networks in fog environment
Wei Yao, Han Shi, Hai Zhao
Journal of Network and Computer Applications (2023) Vol. 214, pp. 103622-103622
Closed Access | Times Cited: 25
Wei Yao, Han Shi, Hai Zhao
Journal of Network and Computer Applications (2023) Vol. 214, pp. 103622-103622
Closed Access | Times Cited: 25
Deep Q-network-based heuristic intrusion detection against edge-based SIoT zero-day attacks
Shigen Shen, Chenpeng Cai, Zhenwei Li, et al.
Applied Soft Computing (2023) Vol. 150, pp. 111080-111080
Closed Access | Times Cited: 24
Shigen Shen, Chenpeng Cai, Zhenwei Li, et al.
Applied Soft Computing (2023) Vol. 150, pp. 111080-111080
Closed Access | Times Cited: 24
Industrial cyber-physical systems protection: A methodological review
Roberto Canonico, Giancarlo Sperlì
Computers & Security (2023) Vol. 135, pp. 103531-103531
Open Access | Times Cited: 23
Roberto Canonico, Giancarlo Sperlì
Computers & Security (2023) Vol. 135, pp. 103531-103531
Open Access | Times Cited: 23
Adversarial sample attacks and defenses based on LSTM-ED in industrial control systems
Yaru Liu, Lijuan Xu, Shumian Yang, et al.
Computers & Security (2024) Vol. 140, pp. 103750-103750
Closed Access | Times Cited: 6
Yaru Liu, Lijuan Xu, Shumian Yang, et al.
Computers & Security (2024) Vol. 140, pp. 103750-103750
Closed Access | Times Cited: 6
ICS Anomaly Detection Based on Sensor Patterns and Actuator Rules in Spatiotemporal Dependency
Jun Cai, Zeheng Wei, Jianzhen Luo
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 8, pp. 10647-10656
Closed Access | Times Cited: 6
Jun Cai, Zeheng Wei, Jianzhen Luo
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 8, pp. 10647-10656
Closed Access | Times Cited: 6
SEHIDS: Self Evolving Host-Based Intrusion Detection System for IoT Networks
Mohammed Baz
Sensors (2022) Vol. 22, Iss. 17, pp. 6505-6505
Open Access | Times Cited: 25
Mohammed Baz
Sensors (2022) Vol. 22, Iss. 17, pp. 6505-6505
Open Access | Times Cited: 25
Empowered Cyber-Physical Systems security using both network and physical data
Roberto Canonico, Giovanni Esposito, Annalisa Navarro, et al.
Computers & Security (2025), pp. 104382-104382
Open Access
Roberto Canonico, Giovanni Esposito, Annalisa Navarro, et al.
Computers & Security (2025), pp. 104382-104382
Open Access
Remediation of chaos in cognitive Internet of Things sensor network
Vidyapati Jha, Priyanka Tripathi
Ad Hoc Networks (2025), pp. 103830-103830
Closed Access
Vidyapati Jha, Priyanka Tripathi
Ad Hoc Networks (2025), pp. 103830-103830
Closed Access
Federated learning for misbehaviour detection with variational autoencoders and Gaussian mixture models
Enrique Mármol Campos, Aurora González-Vidal, José L. Hernández-Ramos, et al.
International Journal of Information Security (2025) Vol. 24, Iss. 2
Open Access
Enrique Mármol Campos, Aurora González-Vidal, José L. Hernández-Ramos, et al.
International Journal of Information Security (2025) Vol. 24, Iss. 2
Open Access
A real-time network based anomaly detection in industrial control systems
Faeze Zare, Payam Mahmoudi-Nasr, Rohollah Yousefpour
International Journal of Critical Infrastructure Protection (2024) Vol. 45, pp. 100676-100676
Closed Access | Times Cited: 4
Faeze Zare, Payam Mahmoudi-Nasr, Rohollah Yousefpour
International Journal of Critical Infrastructure Protection (2024) Vol. 45, pp. 100676-100676
Closed Access | Times Cited: 4
Network traffic inspection to enhance anomaly detection in the Internet of Things using attention-driven Deep Learning
Mireya Lucia Hernandez-Jaimes, Alfonso Martínez-Cruz, Kelsey Alejandra Ramírez-Gutiérrez, et al.
Integration (2025), pp. 102398-102398
Closed Access
Mireya Lucia Hernandez-Jaimes, Alfonso Martínez-Cruz, Kelsey Alejandra Ramírez-Gutiérrez, et al.
Integration (2025), pp. 102398-102398
Closed Access
Intrusion Detection-Based Ensemble Learning and Microservices for Zero Touch Networks
Neda Bugshan, Ibrahim Khalil, Aditya Pribadi Kalapaaking, et al.
IEEE Communications Magazine (2023) Vol. 61, Iss. 6, pp. 86-92
Closed Access | Times Cited: 9
Neda Bugshan, Ibrahim Khalil, Aditya Pribadi Kalapaaking, et al.
IEEE Communications Magazine (2023) Vol. 61, Iss. 6, pp. 86-92
Closed Access | Times Cited: 9
Multi-Behavior Contrastive Learning with graph neural networks for recommendation
V. Rasikha, P. Marikkannu
Knowledge-Based Systems (2024) Vol. 301, pp. 112211-112211
Closed Access | Times Cited: 2
V. Rasikha, P. Marikkannu
Knowledge-Based Systems (2024) Vol. 301, pp. 112211-112211
Closed Access | Times Cited: 2
Privacy-Preserving Collaborative Intrusion Detection in Edge of Internet of Things: A Robust and Efficient Deep Generative Learning Approach
Wei Yao, Zhao Hai, Han Shi
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 9, pp. 15704-15722
Closed Access | Times Cited: 6
Wei Yao, Zhao Hai, Han Shi
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 9, pp. 15704-15722
Closed Access | Times Cited: 6
Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model
Hongsong Chen, Xingyu Li, Wenmao Liu
Computers & Security (2023) Vol. 137, pp. 103581-103581
Closed Access | Times Cited: 5
Hongsong Chen, Xingyu Li, Wenmao Liu
Computers & Security (2023) Vol. 137, pp. 103581-103581
Closed Access | Times Cited: 5
Amplification methods to promote the attacks against machine learning-based intrusion detection systems
Sicong Zhang, Yang Xu, Xinyu Zhang, et al.
Applied Intelligence (2024) Vol. 54, Iss. 4, pp. 2941-2961
Closed Access | Times Cited: 1
Sicong Zhang, Yang Xu, Xinyu Zhang, et al.
Applied Intelligence (2024) Vol. 54, Iss. 4, pp. 2941-2961
Closed Access | Times Cited: 1
Skip-patching spatial-temporal discrepancy-based anomaly detection on multivariate time series
Yinsong Xu, Yulong Ding, Jie Jiang, et al.
Neurocomputing (2024) Vol. 609, pp. 128428-128428
Open Access | Times Cited: 1
Yinsong Xu, Yulong Ding, Jie Jiang, et al.
Neurocomputing (2024) Vol. 609, pp. 128428-128428
Open Access | Times Cited: 1
Realizing credible remote agricultural auditing with trusted video technology
Redowan Mahmud, Joshua Scarsbrook, Ryan K. L. Ko, et al.
Journal of Cybersecurity (2023) Vol. 9, Iss. 1
Open Access | Times Cited: 2
Redowan Mahmud, Joshua Scarsbrook, Ryan K. L. Ko, et al.
Journal of Cybersecurity (2023) Vol. 9, Iss. 1
Open Access | Times Cited: 2
RADAR: Reactive Concept Drift Management with Robust Variational Inference for Evolving IoT Data Streams
Abdullah Alsaedi, Nasrin Sohrabi, Redowan Mahmud, et al.
2022 IEEE 38th International Conference on Data Engineering (ICDE) (2023), pp. 1995-2007
Closed Access | Times Cited: 2
Abdullah Alsaedi, Nasrin Sohrabi, Redowan Mahmud, et al.
2022 IEEE 38th International Conference on Data Engineering (ICDE) (2023), pp. 1995-2007
Closed Access | Times Cited: 2
An error neighborhood-based detection mechanism to improve the performance of anomaly detection in industrial control systems
Wendi Shen, Genke Yang
(2022), pp. 25-29
Closed Access | Times Cited: 1
Wendi Shen, Genke Yang
(2022), pp. 25-29
Closed Access | Times Cited: 1
Nonlinear Time Series Analysis for Anomaly Detection in Cybersecurity using Cloud IoT
Ashwani Kumar Dwivedi
Deleted Journal (2023) Vol. 26, Iss. 3, pp. 01-15
Open Access
Ashwani Kumar Dwivedi
Deleted Journal (2023) Vol. 26, Iss. 3, pp. 01-15
Open Access
Performance Optimisation of Regression-Based Machine Learning Models to Predict Mineral Land Prices for Tokenization
Abel James, Redowan Mahmud, Mahbuba Afrin, et al.
(2023), pp. 1-7
Closed Access
Abel James, Redowan Mahmud, Mahbuba Afrin, et al.
(2023), pp. 1-7
Closed Access