OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Industrial Internet of Things Intrusion Detection Method Using Machine Learning and Optimization Techniques
Tarek Gaber, Joseph Bamidele Awotunde, Sakinat Oluwabukonla Folorunso, et al.
Wireless Communications and Mobile Computing (2023) Vol. 2023, pp. 1-15
Open Access | Times Cited: 27

Showing 1-25 of 27 citing articles:

An Enhanced Internet of Medical Things Data Communication Based on Blockchain and Cryptography for Smart Healthcare Applications
Joseph Bamidele Awotunde, Yousef Farhaoui, Agbotiname Lucky Imoize, et al.
Lecture notes in networks and systems (2024), pp. 305-313
Closed Access | Times Cited: 29

An end-to-end learning approach for enhancing intrusion detection in Industrial-Internet of Things
Karima Hassini, Safae Khalis, Omar Habibi, et al.
Knowledge-Based Systems (2024) Vol. 294, pp. 111785-111785
Closed Access | Times Cited: 15

Signature-based intrusion detection using machine learning and deep learning approaches empowered with fuzzy clustering
Usama Ahmed, Mohammad Nazir, Amna Sarwar, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access | Times Cited: 2

Meta-IDS: Meta-Learning-Based Smart Intrusion Detection System for Internet of Medical Things (IoMT) Network
Umer Zukaib, Xiaohui Cui, Chengliang Zheng, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 13, pp. 23080-23095
Closed Access | Times Cited: 8

Optimizing XGBoost hyperparameters using the dragonfly algorithm for enhanced cyber attack detection in the internet of healthcare things (IoHT)
SURBHI SURBHI, Nupa Ram Chauhan, Neeraj Dahiya
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access

Deep GraphSAGE enhancements for intrusion detection: Analyzing attention mechanisms and GCN integration
Samia Saidane, Francesco Telch, Kussai Shahin, et al.
Journal of Information Security and Applications (2025) Vol. 90, pp. 104013-104013
Open Access

STID-Net: Optimizing Intrusion Detection in IoT with Gradient Descent
H. James Deva Koresh, D. Usha Nandini, Kalaichelvi Nallusamy, et al.
Sensors (2025) Vol. 25, Iss. 6, pp. 1852-1852
Open Access

Next-generation IIoT security: Comprehensive comparative analysis of CNN-based approaches
Huiyao Dong, Igor Kotenko, Dmitry Levshun
Knowledge-Based Systems (2025), pp. 113337-113337
Closed Access

A novel intrusion detection system for internet of things devices and data
Ajay Kaushik, H. S. Al‐Raweshidy
Wireless Networks (2023) Vol. 30, Iss. 1, pp. 285-294
Open Access | Times Cited: 13

IoT Intrusion Detection System Based on Machine Learning
Bayi Xu, Lei Sun, Xiuqing Mao, et al.
Electronics (2023) Vol. 12, Iss. 20, pp. 4289-4289
Open Access | Times Cited: 12

Systematic literature review on intrusion detection systems: Research trends, algorithms, methods, datasets, and limitations
M. Issa, Mohammad Aljanabi, Hassan Mohamed Muhi-Aldeen
Journal of Intelligent Systems (2024) Vol. 33, Iss. 1
Open Access | Times Cited: 4

Ensuring Intrusion Detection for IoT Services Through an Improved CNN
Sunday Adeola Ajagbe, Joseph Bamidele Awotunde, Héctor Flórez
SN Computer Science (2023) Vol. 5, Iss. 1
Closed Access | Times Cited: 10

Network Attack Classification with a Shallow Neural Network for Internet and Internet of Things (IoT) Traffic
Jörg Ehmer, Yvon Savaria, Bertrand Granado, et al.
Electronics (2024) Vol. 13, Iss. 16, pp. 3318-3318
Open Access | Times Cited: 3

A hybrid approach using support vector machine rule-based system: detecting cyber threats in internet of things
M. Wasim Abbas Ashraf, Arvind R. Singh, A. Pandian, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 3

A two stage lightweight approach for intrusion detection in Internet of Things
Zeyu Li, Wenbin Yao
Expert Systems with Applications (2024) Vol. 257, pp. 124965-124965
Closed Access | Times Cited: 2

A hybrid Ant Lion Optimization algorithm based lightweight deep learning framework for cyber attack detection in IoT environment
Brij B. Gupta, Akshat Gaurav, Razaz Waheeb Attar, et al.
Computers & Electrical Engineering (2024) Vol. 122, pp. 109944-109944
Closed Access | Times Cited: 2

Federated Deep Learning for Intrusion Detection in Consumer-Centric Internet of Things
Segun I. Popoola, Agbotiname Lucky Imoize, Mohammad Hammoudeh, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 1, pp. 1610-1622
Open Access | Times Cited: 5

An Optimized Machine Learning Model for the Detection of Man-in-the-Middle Attack in Mobile Edge Computing
Ramahlapane Lerato Moila, Mthulisi Velempini
2021 IST-Africa Conference (IST-Africa) (2024), pp. 1-12
Closed Access | Times Cited: 1

A Comparative Study of Lightweight Machine Learning Techniques for Cyber-Attacks Detection in Blockchain-Enabled Industrial Supply Chain
Shereen Ismail, Salah Dandan, Diana W. Dawoud, et al.
IEEE Access (2024) Vol. 12, pp. 102481-102491
Open Access | Times Cited: 1

IoT Intrusion Detection Enhancement: Data Preprocessing and Dolphin POD-Optimized Deep RNN
Mohsin Ali, Jitendra Choudhary, Srinivasa Rao D, et al.
International Journal of Electronics and Communication Engineering (2024) Vol. 11, Iss. 6, pp. 137-147
Open Access | Times Cited: 1

Intrusion Detection: A Comparison Study of Machine Learning Models Using Unbalanced Dataset
Sunday Adeola Ajagbe, Joseph Bamidele Awotunde, Héctor Flórez
SN Computer Science (2024) Vol. 5, Iss. 8
Open Access | Times Cited: 1

A Survey on Intrusion Detection System in IoT Networks
Md. Mahbubur Rahman, Shaharia Al Shakil, Maimunah Mustakim
Cyber Security and Applications (2024) Vol. 3, pp. 100082-100082
Open Access | Times Cited: 1

IoT-assisted Human Activity Recognition Using Bat Optimization Algorithm with Ensemble Voting Classifier for Disabled Persons
Nabil Sharaf Almalki, Mrim M. Alnfiai, Fahd N. Al‐Wesabi, et al.
Deleted Journal (2024) Vol. 3, Iss. 2
Open Access

Page 1 - Next Page

Scroll to top