OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Trustworthy and Reliable Deep-Learning-Based Cyberattack Detection in Industrial IoT
Fazlullah Khan, Ryan Alturki, Md. Arafatur Rahman, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 1, pp. 1030-1038
Open Access | Times Cited: 28

Showing 1-25 of 28 citing articles:

A Secure Ensemble Learning-Based Fog-Cloud Approach for Cyberattack Detection in IoMT
Fazlullah Khan, Mian Ahmad Jan, Ryan Alturki, et al.
IEEE Transactions on Industrial Informatics (2023) Vol. 19, Iss. 10, pp. 10125-10132
Closed Access | Times Cited: 51

Deep learning enabled intrusion detection system for Industrial IOT environment
Himanshu Nandanwar, Rahul Katarya
Expert Systems with Applications (2024) Vol. 249, pp. 123808-123808
Closed Access | Times Cited: 30

Empowering Cyberattack Identification in IoHT Networks With Neighborhood-Component-Based Improvised Long Short-Term Memory
Manish Kumar, Changjong Kim, Yongseok Son, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 9, pp. 16638-16646
Closed Access | Times Cited: 15

Enhanced Fault Diagnosis in IoT: Uniting Data Fusion with Deep Multi-Scale Fusion Neural Network
Dinesh Kumar Reddy Basani, Basava Ramanjaneyulu Gudivaka, Rajya Lakshmi Gudivaka, et al.
Internet of Things (2024), pp. 101361-101361
Closed Access | Times Cited: 6

Unlocking the black box: an in-depth review on interpretability, explainability, and reliability in deep learning
Emrullah Şahin, Naciye Nur Arslan, Durmuş Özdemir
Neural Computing and Applications (2024)
Closed Access | Times Cited: 5

An Adaptive Intrusion Detection System in the Internet of Medical Things Using Fuzzy-Based Learning
Mousa Alalhareth, Sungchul Hong
Sensors (2023) Vol. 23, Iss. 22, pp. 9247-9247
Open Access | Times Cited: 14

Are the processing facilities safe and secured against cyber threats?
Rajeevan Arunthavanathan, Faisal Khan, Zaman Sajid, et al.
Reliability Engineering & System Safety (2025), pp. 111011-111011
Closed Access

Domain generalized open-set intelligent fault diagnosis based on feature disentanglement meta-learning
Xiangdong Zhou, Deng Xiao, Zhengwu Liu, et al.
Measurement Science and Technology (2024) Vol. 35, Iss. 11, pp. 115001-115001
Closed Access | Times Cited: 3

A Modified Transformer Neural Network (MTNN) for Robust Intrusion Detection in IoT Networks
Syed Wahaj Ahmed, Fabio Kientz, Rasha Kashef
2022 International Telecommunications Conference (ITC-Egypt) (2023), pp. 663-668
Closed Access | Times Cited: 7

Call White Black: Enhanced Image-Scaling Attack in Industrial Artificial Intelligence Systems
Junjian Li, Honglong Chen, Peng Sun, et al.
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 4, pp. 6222-6233
Closed Access | Times Cited: 2

A Blockchain-Based Hybrid Model for IoMT-Enabled Intelligent Healthcare System
Ateeq Ur Rehman, Nargis Tariq, Mian Ahmad Jan, et al.
IEEE Transactions on Network Science and Engineering (2024) Vol. 11, Iss. 4, pp. 3512-3521
Open Access | Times Cited: 2

Gradient scaling and segmented SoftMax Regression Federated Learning (GDS-SRFFL): a novel methodology for attack detection in industrial internet of things (IIoT) networks
R. Vijay Anand, Alagiri Indirajithu, P. Jayalakshmi, et al.
The Journal of Supercomputing (2024) Vol. 80, Iss. 12, pp. 16860-16886
Closed Access | Times Cited: 2

Employing Social Participants for Timely Data Collection Using Pub/sub Solutions in Dynamic IoT Systems
Jiayi Yu, Anfeng Liu, Naixue Xiong, et al.
Computer Networks (2022) Vol. 220, pp. 109501-109501
Closed Access | Times Cited: 8

Machine Learning-Based Security Mechanism to Detect and Prevent Cyber-Attack in IoT Networks
Abdullah Alomiri, Shailendra Mishra, Mohammed Alshehri
International Journal of Computing and Digital Systems (2024) Vol. 15, Iss. 1, pp. 645-659
Open Access | Times Cited: 1

Fuzzy Logic-based Man-in-the-Middle Attack Detection and Improving Routing Efficiency in the IoT Network
N. Sivasankari, Siva Kamalakannan
(2023), pp. 1-6
Closed Access | Times Cited: 2

Cyber Resilience of Cyber-Physical Systems and Machine Learning, a Scoping Review
João Pavão, Rute Bastardo, Nelson Pacheco Rocha
Lecture notes in networks and systems (2024), pp. 501-512
Closed Access

Internet of Medical Things Security Frameworks for Risk Assessment and Management: A Scoping Review
Katerina Svandova, Zdeněk Smutný
Journal of Multidisciplinary Healthcare (2024) Vol. Volume 17, pp. 2281-2301
Open Access

Anomaly Detection Model for Large-scale Industrial Systems Using Transfer Entropy and Graph Attention Network
Shuo Liang, Dechang Pi, Xiangyan Zhang
Measurement Science and Technology (2024) Vol. 35, Iss. 9, pp. 095104-095104
Open Access

An open domain fault diagnosis method for rotating machinery based on dynamic convolutional graph network and bi-classifier adversarial learning
Guang Yang, Juan Su, Songhuai Du, et al.
Measurement Science and Technology (2024) Vol. 36, Iss. 2, pp. 026107-026107
Closed Access

Distributed Multiclass Cyberattack Detection Using Golden Jackal Optimization With Deep Learning Model for Securing IoT Networks
Fatma S. Alrayes, Nadhem Nemri, Nouf Aljaffan, et al.
IEEE Access (2024) Vol. 12, pp. 132434-132443
Open Access

Artificial intelligence driven cyberattack detection system using integration of deep belief network with convolution neural network on industrial IoT
Mahmoud Ragab, Mohammed Basheri, Nasser Albogami, et al.
Alexandria Engineering Journal (2024) Vol. 110, pp. 438-450
Open Access

A Hybrid Federated Learning Framework and Multi-Party Communication for Cyber-Security Analysis
Fahad Alqurashi
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 7
Open Access | Times Cited: 1

Page 1 - Next Page

Scroll to top