OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Securing Industrial Internet of Things Against Botnet Attacks Using Hybrid Deep Learning Approach
Tooba Hasan, Jahanzaib Malik, Iram Bibi, et al.
IEEE Transactions on Network Science and Engineering (2022) Vol. 10, Iss. 5, pp. 2952-2963
Open Access | Times Cited: 45

Showing 1-25 of 45 citing articles:

A Novel Hybrid Deep Learning Model for Metastatic Cancer Detection
Shahab Ahmad, Tahir Ullah, Ijaz Ahmad, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-14
Open Access | Times Cited: 57

An empirical assessment of ensemble methods and traditional machine learning techniques for web-based attack detection in industry 5.0
Oumaima Chakir, Abdeslam Rehaimi, Yassine Sadqi, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 3, pp. 103-119
Open Access | Times Cited: 30

Reliable Machine Learning Model for IIoT Botnet Detection
Fatma Taher, Mahmoud Abdel-Salam, Mohamed Elhoseny, et al.
IEEE Access (2023) Vol. 11, pp. 49319-49336
Open Access | Times Cited: 25

Hybrid Machine Learning Model for Efficient Botnet Attack Detection in IoT Environment
Mudasir Ali, Mobeen Shahroz, Muhammad Faheem Mushtaq, et al.
IEEE Access (2024) Vol. 12, pp. 40682-40699
Open Access | Times Cited: 10

SkipGateNet: A Lightweight CNN-LSTM Hybrid Model With Learnable Skip Connections for Efficient Botnet Attack Detection in IoT
Mohammed S. Alshehri, Jawad Ahmad, Sultan Almakdi, et al.
IEEE Access (2024) Vol. 12, pp. 35521-35538
Open Access | Times Cited: 8

LSTM-Based Distributed Conditional Generative Adversarial Network for Data-Driven 5G-Enabled Maritime UAV Communications
Iftikhar Rasheed, Muhammad Asif, Asim Ihsan, et al.
IEEE Transactions on Intelligent Transportation Systems (2022), pp. 1-16
Open Access | Times Cited: 32

Towards a generalized hybrid deep learning model with optimized hyperparameters for malicious traffic detection in the Industrial Internet of Things
Bilal Babayiğit, Mohammed Abubaker
Engineering Applications of Artificial Intelligence (2023) Vol. 128, pp. 107515-107515
Closed Access | Times Cited: 12

An accurate attack detection framework based on exponential polynomial kernel‐centered deep neural networks in the wireless sensor network
Raveendranadh Bokka, Sadasivam Tamilselvan
Transactions on Emerging Telecommunications Technologies (2023) Vol. 34, Iss. 3
Closed Access | Times Cited: 11

HybridRobustNet: enhancing detection of hybrid attacks in IoT networks through advanced learning approach
D. Adhimuga Sivasakthi, A. Sathiyaraj, Ramkumar Devendiran
Cluster Computing (2024) Vol. 27, Iss. 4, pp. 5005-5019
Closed Access | Times Cited: 4

Inductive reasoning for significant concept and pattern discovery in cognitive IoT
Vidyapati Jha, Priyanka Tripathi
Service Oriented Computing and Applications (2024)
Closed Access | Times Cited: 4

Securing Industry 5.0: An explainable deep learning model for intrusion detection in cyber-physical systems
Himanshu Nandanwar, Rahul Katarya
Computers & Electrical Engineering (2025) Vol. 123, pp. 110161-110161
Closed Access

An approach to botnet attacks in the fog computing layer and Apache Spark for smart cities
Abdelaziz Al Dawi, Necmi Serkan Tezel, Javad Rahebi, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 4
Open Access

ResDNViT: A hybrid architecture for Netflow-based attack detection using a residual dense network and Vision Transformer
Hassan Wasswa, Hussein A. Abbass, Timothy Lynar
Expert Systems with Applications (2025), pp. 127504-127504
Closed Access

Optimal Deep Learning Based Intruder Identification in Industrial Internet of Things Environment
Khaled M. Alalayah, Fatma S. Alrayes, Jaber S. Alzahrani, et al.
Computer Systems Science and Engineering (2023) Vol. 46, Iss. 3, pp. 3121-3139
Open Access | Times Cited: 9

TL-BILSTM IoT: transfer learning model for prediction of intrusion detection system in IoT environment
Himanshu Nandanwar, Rahul Katarya
International Journal of Information Security (2023) Vol. 23, Iss. 2, pp. 1251-1277
Closed Access | Times Cited: 9

Plausible reasoning and knowledge extraction in Cognitive IoT
Vidyapati Jha, Priyanka Tripathi
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 3

Golden Jackal Optimization with a Deep Learning-Based Cybersecurity Solution in Industrial Internet of Things Systems
Louai A. Maghrabi, Ibrahim R. Alzahrani, Dheyaaldin Alsalman, et al.
Electronics (2023) Vol. 12, Iss. 19, pp. 4091-4091
Open Access | Times Cited: 7

SF-LAP: Secure M2M Communication in IIoT with a Single-Factor Lightweight Authentication Protocol
Shahzad Khurram, Masoom Alam, Nadeem Javaid, et al.
Journal of Sensors (2022) Vol. 2022, pp. 1-16
Open Access | Times Cited: 8

A Survey on Botnets Attack Detection Utilizing Machine and Deep Learning Models
Dorieh M. Alomari, Fatima M. Anis, Maryam Alabdullatif, et al.
(2023), pp. 493-498
Closed Access | Times Cited: 4

Review for Prevention of Botnet Attack Using Various Detection Techniques in IoT and IIoT
Mohit Goyal, Sangeeta Mittal
(2024), pp. 259-264
Closed Access | Times Cited: 1

Botnet Attack Detection in IoT Devices using Ensemble Classifiers with Reduced Feature Space
N. Dharini, Jeevaa Katiravan, Shakthi S.P
International Research Journal of Multidisciplinary Technovation (2024), pp. 274-295
Open Access | Times Cited: 1

Decentralized knowledge discovery using massive heterogenous data in Cognitive IoT
Vidyapati Jha, Priyanka Tripathi
Cluster Computing (2023) Vol. 27, Iss. 3, pp. 3657-3682
Closed Access | Times Cited: 3

DNS Traffic Monitoring to Access Vulnerability in the Internet of Healthcare Things Networks: A Survey
Mehwash Weqar, Shabana Mehfuz, Dhawal Gupta
(2023), pp. 89-94
Closed Access | Times Cited: 2

Page 1 - Next Page

Scroll to top