
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Machine and Deep Learning for IoT Security and Privacy: Applications, Challenges, and Future Directions
Subrato Bharati, Prajoy Podder
Security and Communication Networks (2022) Vol. 2022, pp. 1-41
Open Access | Times Cited: 42
Subrato Bharati, Prajoy Podder
Security and Communication Networks (2022) Vol. 2022, pp. 1-41
Open Access | Times Cited: 42
Showing 1-25 of 42 citing articles:
A Comprehensive Survey on the Requirements, Applications, and Future Challenges for Access Control Models in IoT: The State of the Art
Mohammad Shamim Ahsan, Al‐Sakib Khan Pathan
IoT (2025) Vol. 6, Iss. 1, pp. 9-9
Open Access | Times Cited: 1
Mohammad Shamim Ahsan, Al‐Sakib Khan Pathan
IoT (2025) Vol. 6, Iss. 1, pp. 9-9
Open Access | Times Cited: 1
Progression and Challenges of IoT in Healthcare: A Short Review
Shamimur Rahman, Sifat Ibtisum, Priya Podder, et al.
International Journal of Computer Applications (2023) Vol. 185, Iss. 37, pp. 9-15
Open Access | Times Cited: 21
Shamimur Rahman, Sifat Ibtisum, Priya Podder, et al.
International Journal of Computer Applications (2023) Vol. 185, Iss. 37, pp. 9-15
Open Access | Times Cited: 21
Empowering blockchain with SmartNIC: Enhancing performance, security, and scalability
Rahmanul Hoque, Md. Maniruzzaman, Daniel Lucky Michael, et al.
World Journal of Advanced Research and Reviews (2024) Vol. 22, Iss. 1, pp. 151-162
Open Access | Times Cited: 8
Rahmanul Hoque, Md. Maniruzzaman, Daniel Lucky Michael, et al.
World Journal of Advanced Research and Reviews (2024) Vol. 22, Iss. 1, pp. 151-162
Open Access | Times Cited: 8
A Secure Hybrid Deep Learning Technique for Anomaly Detection in IIoT Edge Computing
Bharath Konatham, Tabassum Simra, Fathi Amsaad, et al.
(2024)
Open Access | Times Cited: 7
Bharath Konatham, Tabassum Simra, Fathi Amsaad, et al.
(2024)
Open Access | Times Cited: 7
Machine Learning Techniques for Cyberattack Prevention in IoT Systems: A Comparative Perspective of Cybersecurity and Cyberdefense in Colombia
Emanuel Ortiz-Ruiz, Juan Ramón Bermejo Higuera, Juan Antonio Sicilia Montalvo, et al.
Electronics (2024) Vol. 13, Iss. 5, pp. 824-824
Open Access | Times Cited: 5
Emanuel Ortiz-Ruiz, Juan Ramón Bermejo Higuera, Juan Antonio Sicilia Montalvo, et al.
Electronics (2024) Vol. 13, Iss. 5, pp. 824-824
Open Access | Times Cited: 5
Security and Privacy of Future Wireless Communication Systems
Abdulwaheed Musa, Abdullateef Ola Adebayo, Peace Oluwasijibomi Balogun, et al.
(2025), pp. 23-57
Closed Access
Abdulwaheed Musa, Abdullateef Ola Adebayo, Peace Oluwasijibomi Balogun, et al.
(2025), pp. 23-57
Closed Access
Enhancing Internet of Things security using performance gradient boosting for network intrusion detection systems
Muhammad Ahmed, Yasser AbdelSatar, Raed Alotaibi, et al.
Alexandria Engineering Journal (2025) Vol. 116, pp. 472-482
Closed Access
Muhammad Ahmed, Yasser AbdelSatar, Raed Alotaibi, et al.
Alexandria Engineering Journal (2025) Vol. 116, pp. 472-482
Closed Access
A Comprehensive Analysis of the Machine Learning Algorithms in IoT IDS Systems
Erdal ÖZDOĞAN
IEEE Access (2024) Vol. 12, pp. 46785-46811
Open Access | Times Cited: 3
Erdal ÖZDOĞAN
IEEE Access (2024) Vol. 12, pp. 46785-46811
Open Access | Times Cited: 3
Integration of artificial intelligence technologies in data engineering: Challenges and prospects in the modern information environment
Vasyl Nesterov
Вісник Черкаського державного технологічного університету (2023) Vol. 28, Iss. 4, pp. 82-92
Open Access | Times Cited: 7
Vasyl Nesterov
Вісник Черкаського державного технологічного університету (2023) Vol. 28, Iss. 4, pp. 82-92
Open Access | Times Cited: 7
BlockDLO: Blockchain computing with deep learning orchestration for secure data communication in IoT Environment
M. Kokila, K. Srinivasa Reddy
IEEE Access (2024) Vol. 12, pp. 134521-134540
Open Access | Times Cited: 2
M. Kokila, K. Srinivasa Reddy
IEEE Access (2024) Vol. 12, pp. 134521-134540
Open Access | Times Cited: 2
Deep hashing with multilayer CNN-based biometric authentication for identifying individuals in transportation security
Subba Reddy Borra, B. Premalatha, G. Divya, et al.
Journal of Transportation Security (2024) Vol. 17, Iss. 1
Closed Access | Times Cited: 1
Subba Reddy Borra, B. Premalatha, G. Divya, et al.
Journal of Transportation Security (2024) Vol. 17, Iss. 1
Closed Access | Times Cited: 1
A critical analysis of the role of artificial intelligence and machine learning in enhancing nuclear waste management
Thiagarajan Chenniappan, Yuvarajan Devarajan
Kerntechnik (2024)
Closed Access | Times Cited: 1
Thiagarajan Chenniappan, Yuvarajan Devarajan
Kerntechnik (2024)
Closed Access | Times Cited: 1
DWFed: A statistical- heterogeneity-based dynamic weighted model aggregation algorithm for federated learning
Aiguo Chen, Yang Fu, Lingfu Wang, et al.
Frontiers in Neurorobotics (2022) Vol. 16
Open Access | Times Cited: 5
Aiguo Chen, Yang Fu, Lingfu Wang, et al.
Frontiers in Neurorobotics (2022) Vol. 16
Open Access | Times Cited: 5
The State-of-The-Art Access Control Models in Iot: A Survey on the Requirements, Scale, and Future Challenges
Mohammad Shamim Ahsan, Al‐Sakib Khan Pathan
(2024)
Closed Access
Mohammad Shamim Ahsan, Al‐Sakib Khan Pathan
(2024)
Closed Access
Human-Centric Enterprise Security: Advancing Access Control through AI-Driven Administration
Amina Mariam, Ahmed Berrada
Authorea (Authorea) (2024)
Open Access
Amina Mariam, Ahmed Berrada
Authorea (Authorea) (2024)
Open Access
Human-Centric Enterprise Security: Advancing Access Control through AI-Driven Administration
Amina Mariam, Ahmed Berrada, Sora Nakamura
(2024)
Open Access
Amina Mariam, Ahmed Berrada, Sora Nakamura
(2024)
Open Access
Machine learning-based lightweight block ciphers for resource-constrained internet of things networks: a review
Mahendra Shridhar Naik, Madhavi Mallam, S Chaitra
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2024) Vol. 14, Iss. 3, pp. 2896-2896
Open Access
Mahendra Shridhar Naik, Madhavi Mallam, S Chaitra
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2024) Vol. 14, Iss. 3, pp. 2896-2896
Open Access
Evaluating Machine Learning Models for Attack Detection in GPS Datasets
Md. Afroz, Emmanuel Nyakwende, Birendra Goswami
Algorithms for intelligent systems (2024), pp. 217-230
Closed Access
Md. Afroz, Emmanuel Nyakwende, Birendra Goswami
Algorithms for intelligent systems (2024), pp. 217-230
Closed Access
Novel Ransomware Detection Exploiting Uncertainty and Calibration Quality Measures Using Deep Learning
Mazen Gazzan, Frederick T. Sheldon
Information (2024) Vol. 15, Iss. 5, pp. 262-262
Open Access
Mazen Gazzan, Frederick T. Sheldon
Information (2024) Vol. 15, Iss. 5, pp. 262-262
Open Access
Silencing eavesdroppers: SVM unveiling physical layer threats
G. Poovarasan, S. Vidhya, G. Singaravel
i-manager s Journal on Information Technology (2024) Vol. 13, Iss. 1, pp. 42-42
Closed Access
G. Poovarasan, S. Vidhya, G. Singaravel
i-manager s Journal on Information Technology (2024) Vol. 13, Iss. 1, pp. 42-42
Closed Access
Malware Detection and Classification for Internet of Things Using Self-Attention Based Long Short-Term Memory
K. Sudhakar, Saif O. Husain, Dhivakar Babu, et al.
(2024), pp. 1-5
Closed Access
K. Sudhakar, Saif O. Husain, Dhivakar Babu, et al.
(2024), pp. 1-5
Closed Access
Enhancing IoT Security through Machine Learning-Driven Anomaly Detection
Usama Tahir, Muhammad Kamran Abid, Muhammad Fuzail, et al.
VFAST Transactions on Software Engineering (2024) Vol. 12, Iss. 2, pp. 01-13
Open Access
Usama Tahir, Muhammad Kamran Abid, Muhammad Fuzail, et al.
VFAST Transactions on Software Engineering (2024) Vol. 12, Iss. 2, pp. 01-13
Open Access
Integration of Distributed Intrusion Detection Systems in IoT Infrastructure
Christian Ildegard Bimenyimana, Thierry Nsabimana, Ghislain Vlavonou, et al.
Lecture notes in networks and systems (2024), pp. 115-123
Closed Access
Christian Ildegard Bimenyimana, Thierry Nsabimana, Ghislain Vlavonou, et al.
Lecture notes in networks and systems (2024), pp. 115-123
Closed Access
Security of the IoT Ecosystem: Current and Future Directions
Tuhin Shukla, Nishchol Mishra
Lecture notes in electrical engineering (2024), pp. 211-226
Closed Access
Tuhin Shukla, Nishchol Mishra
Lecture notes in electrical engineering (2024), pp. 211-226
Closed Access