
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Review of Intrusion Detection Systems in RPL Routing Protocol Based on Machine Learning for Internet of Things Applications
Ali Seyfollahi, Ali Ghaffari
Wireless Communications and Mobile Computing (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 38
Ali Seyfollahi, Ali Ghaffari
Wireless Communications and Mobile Computing (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 38
Showing 1-25 of 38 citing articles:
MFO-RPL: A secure RPL-based routing protocol utilizing moth-flame optimizer for the IoT applications
Ali Seyfollahi, Meysam Moodi, Ali Ghaffari
Computer Standards & Interfaces (2022) Vol. 82, pp. 103622-103622
Closed Access | Times Cited: 60
Ali Seyfollahi, Meysam Moodi, Ali Ghaffari
Computer Standards & Interfaces (2022) Vol. 82, pp. 103622-103622
Closed Access | Times Cited: 60
RPL routing protocol over IoT: A comprehensive survey, recent advances, insights, bibliometric analysis, recommendations, and future directions
Khalid A. Darabkh, Muna Al-Akhras, Jumana N. Zomot, et al.
Journal of Network and Computer Applications (2022) Vol. 207, pp. 103476-103476
Closed Access | Times Cited: 49
Khalid A. Darabkh, Muna Al-Akhras, Jumana N. Zomot, et al.
Journal of Network and Computer Applications (2022) Vol. 207, pp. 103476-103476
Closed Access | Times Cited: 49
An optimal task scheduling method in IoT-Fog-Cloud network using multi-objective moth-flame algorithm
Taybeh Salehnia, Ali Seyfollahi, Saeid Raziani, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 12, pp. 34351-34372
Closed Access | Times Cited: 24
Taybeh Salehnia, Ali Seyfollahi, Saeid Raziani, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 12, pp. 34351-34372
Closed Access | Times Cited: 24
Towards RPL Attacks and Mitigation Taxonomy: Systematic Literature Review Approach
Hussah Albinali, Farag Azzedin
IEEE Transactions on Network and Service Management (2024) Vol. 21, Iss. 5, pp. 5215-5238
Closed Access | Times Cited: 13
Hussah Albinali, Farag Azzedin
IEEE Transactions on Network and Service Management (2024) Vol. 21, Iss. 5, pp. 5215-5238
Closed Access | Times Cited: 13
Towards developing a machine learning-metaheuristic-enhanced energy-sensitive routing framework for the internet of things
Ali Seyfollahi, Tania Taami, Ali Ghaffari
Microprocessors and Microsystems (2022) Vol. 96, pp. 104747-104747
Closed Access | Times Cited: 32
Ali Seyfollahi, Tania Taami, Ali Ghaffari
Microprocessors and Microsystems (2022) Vol. 96, pp. 104747-104747
Closed Access | Times Cited: 32
RPL-based attack detection approaches in IoT networks: review and taxonomy
Nadia A. Alfriehat, Mohammed Anbar, Mohammad Adnan Aladaileh, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 9
Open Access | Times Cited: 5
Nadia A. Alfriehat, Mohammed Anbar, Mohammad Adnan Aladaileh, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 9
Open Access | Times Cited: 5
Study of various AI based security model for threat analysis in communication and IoT network
Shrikant S. Goje, Sanjay M. Asutkar, G. M. Asutkar
AIP conference proceedings (2025) Vol. 3255, pp. 020015-020015
Closed Access
Shrikant S. Goje, Sanjay M. Asutkar, G. M. Asutkar
AIP conference proceedings (2025) Vol. 3255, pp. 020015-020015
Closed Access
DDoS attack detection techniques in IoT networks: a survey
Amir Pakmehr, Andreas Aßmuth, Negar Taheri, et al.
Cluster Computing (2024) Vol. 27, Iss. 10, pp. 14637-14668
Open Access | Times Cited: 4
Amir Pakmehr, Andreas Aßmuth, Negar Taheri, et al.
Cluster Computing (2024) Vol. 27, Iss. 10, pp. 14637-14668
Open Access | Times Cited: 4
A comprehensive survey on RPL routing-based attacks, defences and future directions in Internet of Things
Anil Kumar Prajapati, Emmanuel S. Pilli, Ramesh Babu Battula, et al.
Computers & Electrical Engineering (2025) Vol. 123, pp. 110071-110071
Closed Access
Anil Kumar Prajapati, Emmanuel S. Pilli, Ramesh Babu Battula, et al.
Computers & Electrical Engineering (2025) Vol. 123, pp. 110071-110071
Closed Access
TARRP: Trust Aware RPL Routing Protocol for IoT
Mostafa Nazarian Parizi, Seyyed Hamid Ghafouri, Mohammad Sadegh Hajmohammadi
International Journal of Communication Systems (2025) Vol. 38, Iss. 4
Closed Access
Mostafa Nazarian Parizi, Seyyed Hamid Ghafouri, Mohammad Sadegh Hajmohammadi
International Journal of Communication Systems (2025) Vol. 38, Iss. 4
Closed Access
Detection of IPv6 routing attacks using ANN and a novel IoT dataset
Murat Emeç
ETRI Journal (2025)
Open Access
Murat Emeç
ETRI Journal (2025)
Open Access
Security-aware RPL: Designing a novel objective function for risk-based routing with rank evaluation
Ferhat Arat, Sedat Akleylek
Computer Networks (2025), pp. 111122-111122
Closed Access
Ferhat Arat, Sedat Akleylek
Computer Networks (2025), pp. 111122-111122
Closed Access
Customised Intrusion Detection for an Industrial IoT Heterogeneous Network Based on Machine Learning Algorithms Called FTL-CID
Nasr Abosata, Saba Al–Rubaye, Gökhan İnalhan
Sensors (2022) Vol. 23, Iss. 1, pp. 321-321
Open Access | Times Cited: 21
Nasr Abosata, Saba Al–Rubaye, Gökhan İnalhan
Sensors (2022) Vol. 23, Iss. 1, pp. 321-321
Open Access | Times Cited: 21
Energy-aware ACO-DNN optimization model for intrusion detection of unmanned aerial vehicle (UAVs)
Jitendra Kumar Samriya, Mohit Kumar, Rajeev Tiwari
Journal of Ambient Intelligence and Humanized Computing (2022) Vol. 14, Iss. 8, pp. 10947-10962
Closed Access | Times Cited: 17
Jitendra Kumar Samriya, Mohit Kumar, Rajeev Tiwari
Journal of Ambient Intelligence and Humanized Computing (2022) Vol. 14, Iss. 8, pp. 10947-10962
Closed Access | Times Cited: 17
The Routing Protocol for low power and lossy networks (RPL) under Attack: Simulation and Analysis
Amal Hkiri, Mouna Karmani, Mohsen Machhout
(2022), pp. 143-148
Closed Access | Times Cited: 15
Amal Hkiri, Mouna Karmani, Mohsen Machhout
(2022), pp. 143-148
Closed Access | Times Cited: 15
QFS-RPL: mobility and energy aware multi path routing protocol for the internet of mobile things data transfer infrastructures
Mahmoud Alilou, Amin Babazadeh Sangar, Kambiz Majidzadeh, et al.
Telecommunication Systems (2023) Vol. 85, Iss. 2, pp. 289-312
Closed Access | Times Cited: 7
Mahmoud Alilou, Amin Babazadeh Sangar, Kambiz Majidzadeh, et al.
Telecommunication Systems (2023) Vol. 85, Iss. 2, pp. 289-312
Closed Access | Times Cited: 7
Adaptive RPL Routing Optimization Model for Multimedia Data Transmission using IOT
P K Shashidhar, T.C. Thanuja, Rajashekar Kunabeva
Indian Journal of Science and Technology (2024) Vol. 17, Iss. 5, pp. 436-450
Open Access | Times Cited: 2
P K Shashidhar, T.C. Thanuja, Rajashekar Kunabeva
Indian Journal of Science and Technology (2024) Vol. 17, Iss. 5, pp. 436-450
Open Access | Times Cited: 2
Detecting and mitigating security anomalies in Software-Defined Networking (SDN) using Gradient-Boosted Trees and Floodlight Controller characteristics
Tohid Jafarian, Ali Ghaffari, Ali Seyfollahi, et al.
Computer Standards & Interfaces (2024) Vol. 91, pp. 103871-103871
Closed Access | Times Cited: 2
Tohid Jafarian, Ali Ghaffari, Ali Seyfollahi, et al.
Computer Standards & Interfaces (2024) Vol. 91, pp. 103871-103871
Closed Access | Times Cited: 2
Enhanced Rank Attack Detection Algorithm (E-RAD) for securing RPL-based IoT networks by early detection and isolation of rank attackers
P Nandhini, S. Kuppuswami, S. Malliga, et al.
The Journal of Supercomputing (2022) Vol. 79, Iss. 6, pp. 6825-6848
Closed Access | Times Cited: 8
P Nandhini, S. Kuppuswami, S. Malliga, et al.
The Journal of Supercomputing (2022) Vol. 79, Iss. 6, pp. 6825-6848
Closed Access | Times Cited: 8
Efficient Routing Protocol for Optimal Route Selection in Cognitive Radio Networks Over IoT Environment
Khalid A. Darabkh, Hanan F. Al-Khazaleh, Raed T. Al‐Zubi, et al.
Wireless Personal Communications (2022) Vol. 129, Iss. 1, pp. 209-253
Closed Access | Times Cited: 8
Khalid A. Darabkh, Hanan F. Al-Khazaleh, Raed T. Al‐Zubi, et al.
Wireless Personal Communications (2022) Vol. 129, Iss. 1, pp. 209-253
Closed Access | Times Cited: 8
Security-Aware Routing Protocol Based on Artificial Neural Network Algorithm and 6LoWPAN in the Internet of Things
Jiangdong Lu, Dongfang Li, Penglong Wang, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-8
Open Access | Times Cited: 7
Jiangdong Lu, Dongfang Li, Penglong Wang, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-8
Open Access | Times Cited: 7
Detecting the RPL Version Number Attack in IoT Networks using Deep Learning Models
Ayoub KRARI, Abdelmajid Hajami, Ezzitouni JARMOUNI
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 10
Open Access | Times Cited: 4
Ayoub KRARI, Abdelmajid Hajami, Ezzitouni JARMOUNI
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 10
Open Access | Times Cited: 4
An efficient and reliable service customized routing mechanism based on deep learning in IPv6 network
Yufu Wang, Xingwei Wang, Bo Yi, et al.
IET Communications (2022) Vol. 16, Iss. 19, pp. 2249-2264
Open Access | Times Cited: 6
Yufu Wang, Xingwei Wang, Bo Yi, et al.
IET Communications (2022) Vol. 16, Iss. 19, pp. 2249-2264
Open Access | Times Cited: 6
Cooperative IDS for Detecting Collaborative Attacks in RPL-AODV Protocol in Internet of Everything
E. Suresh Babu, Bhukya Padma, Soumya Ranjan Nayak, et al.
Journal of Database Management (2023) Vol. 34, Iss. 2, pp. 1-33
Open Access | Times Cited: 2
E. Suresh Babu, Bhukya Padma, Soumya Ranjan Nayak, et al.
Journal of Database Management (2023) Vol. 34, Iss. 2, pp. 1-33
Open Access | Times Cited: 2
Uncovering the Limitations and Insights of Packet Status Prediction Models in IEEE 802.15.4-Based Wireless Networks and Insights from Data Science
Mariana Ávalos-Arce, Heráclito Pérez-Díaz, Carolina Del-Valle-Soto, et al.
Informatics (2024) Vol. 11, Iss. 1, pp. 7-7
Open Access
Mariana Ávalos-Arce, Heráclito Pérez-Díaz, Carolina Del-Valle-Soto, et al.
Informatics (2024) Vol. 11, Iss. 1, pp. 7-7
Open Access