OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Machine and Deep Learning for IoT Security and Privacy: Applications, Challenges, and Future Directions
Subrato Bharati, Prajoy Podder
Security and Communication Networks (2022) Vol. 2022, pp. 1-41
Open Access | Times Cited: 42

Showing 1-25 of 42 citing articles:

Progression and Challenges of IoT in Healthcare: A Short Review
Shamimur Rahman, Sifat Ibtisum, Priya Podder, et al.
International Journal of Computer Applications (2023) Vol. 185, Iss. 37, pp. 9-15
Open Access | Times Cited: 21

Empowering blockchain with SmartNIC: Enhancing performance, security, and scalability
Rahmanul Hoque, Md. Maniruzzaman, Daniel Lucky Michael, et al.
World Journal of Advanced Research and Reviews (2024) Vol. 22, Iss. 1, pp. 151-162
Open Access | Times Cited: 8

A Secure Hybrid Deep Learning Technique for Anomaly Detection in IIoT Edge Computing
Bharath Konatham, Tabassum Simra, Fathi Amsaad, et al.
(2024)
Open Access | Times Cited: 7

Machine Learning Techniques for Cyberattack Prevention in IoT Systems: A Comparative Perspective of Cybersecurity and Cyberdefense in Colombia
Emanuel Ortiz-Ruiz, Juan Ramón Bermejo Higuera, Juan Antonio Sicilia Montalvo, et al.
Electronics (2024) Vol. 13, Iss. 5, pp. 824-824
Open Access | Times Cited: 5

Security and Privacy of Future Wireless Communication Systems
Abdulwaheed Musa, Abdullateef Ola Adebayo, Peace Oluwasijibomi Balogun, et al.
(2025), pp. 23-57
Closed Access

Enhancing Internet of Things security using performance gradient boosting for network intrusion detection systems
Muhammad Ahmed, Yasser AbdelSatar, Raed Alotaibi, et al.
Alexandria Engineering Journal (2025) Vol. 116, pp. 472-482
Closed Access

A Comprehensive Analysis of the Machine Learning Algorithms in IoT IDS Systems
Erdal ÖZDOĞAN
IEEE Access (2024) Vol. 12, pp. 46785-46811
Open Access | Times Cited: 3

Integration of artificial intelligence technologies in data engineering: Challenges and prospects in the modern information environment
Vasyl Nesterov
Вісник Черкаського державного технологічного університету (2023) Vol. 28, Iss. 4, pp. 82-92
Open Access | Times Cited: 7

BlockDLO: Blockchain computing with deep learning orchestration for secure data communication in IoT Environment
M. Kokila, K. Srinivasa Reddy
IEEE Access (2024) Vol. 12, pp. 134521-134540
Open Access | Times Cited: 2

Deep hashing with multilayer CNN-based biometric authentication for identifying individuals in transportation security
Subba Reddy Borra, B. Premalatha, G. Divya, et al.
Journal of Transportation Security (2024) Vol. 17, Iss. 1
Closed Access | Times Cited: 1

A critical analysis of the role of artificial intelligence and machine learning in enhancing nuclear waste management
Thiagarajan Chenniappan, Yuvarajan Devarajan
Kerntechnik (2024)
Closed Access | Times Cited: 1

DWFed: A statistical- heterogeneity-based dynamic weighted model aggregation algorithm for federated learning
Aiguo Chen, Yang Fu, Lingfu Wang, et al.
Frontiers in Neurorobotics (2022) Vol. 16
Open Access | Times Cited: 5



Вісник Черкаського державного технологічного університету (2024) Vol. 28, Iss. 4
Open Access

Machine learning-based lightweight block ciphers for resource-constrained internet of things networks: a review
Mahendra Shridhar Naik, Madhavi Mallam, S Chaitra
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2024) Vol. 14, Iss. 3, pp. 2896-2896
Open Access

Evaluating Machine Learning Models for Attack Detection in GPS Datasets
Md. Afroz, Emmanuel Nyakwende, Birendra Goswami
Algorithms for intelligent systems (2024), pp. 217-230
Closed Access

Novel Ransomware Detection Exploiting Uncertainty and Calibration Quality Measures Using Deep Learning
Mazen Gazzan, Frederick T. Sheldon
Information (2024) Vol. 15, Iss. 5, pp. 262-262
Open Access

Silencing eavesdroppers: SVM unveiling physical layer threats
G. Poovarasan, S. Vidhya, G. Singaravel
i-manager s Journal on Information Technology (2024) Vol. 13, Iss. 1, pp. 42-42
Closed Access

Malware Detection and Classification for Internet of Things Using Self-Attention Based Long Short-Term Memory
K. Sudhakar, Saif O. Husain, Dhivakar Babu, et al.
(2024), pp. 1-5
Closed Access

Enhancing IoT Security through Machine Learning-Driven Anomaly Detection
Usama Tahir, Muhammad Kamran Abid, Muhammad Fuzail, et al.
VFAST Transactions on Software Engineering (2024) Vol. 12, Iss. 2, pp. 01-13
Open Access

Integration of Distributed Intrusion Detection Systems in IoT Infrastructure
Christian Ildegard Bimenyimana, Thierry Nsabimana, Ghislain Vlavonou, et al.
Lecture notes in networks and systems (2024), pp. 115-123
Closed Access

Security of the IoT Ecosystem: Current and Future Directions
Tuhin Shukla, Nishchol Mishra
Lecture notes in electrical engineering (2024), pp. 211-226
Closed Access

Page 1 - Next Page

Scroll to top