
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Comprehensive Survey on Machine Learning‐Based Intrusion Detection Systems for Secure Communication in Internet of Things
S. V. N. Santhosh Kumar, M. Selvi, A. Kannan
Computational Intelligence and Neuroscience (2023) Vol. 2023, Iss. 1
Open Access | Times Cited: 65
S. V. N. Santhosh Kumar, M. Selvi, A. Kannan
Computational Intelligence and Neuroscience (2023) Vol. 2023, Iss. 1
Open Access | Times Cited: 65
Showing 1-25 of 65 citing articles:
Current trends in AI and ML for cybersecurity: A state-of-the-art survey
Nachaat Mohamed
Cogent Engineering (2023) Vol. 10, Iss. 2
Open Access | Times Cited: 46
Nachaat Mohamed
Cogent Engineering (2023) Vol. 10, Iss. 2
Open Access | Times Cited: 46
A comprehensive survey on cyber deception techniques to improve honeypot performance
Amir Javadpour, Forough Ja’fari, Tarik Taleb, et al.
Computers & Security (2024) Vol. 140, pp. 103792-103792
Open Access | Times Cited: 25
Amir Javadpour, Forough Ja’fari, Tarik Taleb, et al.
Computers & Security (2024) Vol. 140, pp. 103792-103792
Open Access | Times Cited: 25
Signature-based intrusion detection using machine learning and deep learning approaches empowered with fuzzy clustering
Usama Ahmed, Mohammad Nazir, Amna Sarwar, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access | Times Cited: 2
Usama Ahmed, Mohammad Nazir, Amna Sarwar, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access | Times Cited: 2
Machine learning and metaheuristic optimization algorithms for feature selection and botnet attack detection
Mahdieh Maazalahi, Soodeh Hosseini
Knowledge and Information Systems (2025)
Closed Access | Times Cited: 1
Mahdieh Maazalahi, Soodeh Hosseini
Knowledge and Information Systems (2025)
Closed Access | Times Cited: 1
Toward Enhanced Attack Detection and Explanation in Intrusion Detection System-Based IoT Environment Data
Thi-Thu-Huong Le, Rini Wisnu Wardhani, Dedy Septono Catur Putranto, et al.
IEEE Access (2023) Vol. 11, pp. 131661-131676
Open Access | Times Cited: 20
Thi-Thu-Huong Le, Rini Wisnu Wardhani, Dedy Septono Catur Putranto, et al.
IEEE Access (2023) Vol. 11, pp. 131661-131676
Open Access | Times Cited: 20
VBQ-Net: A Novel Vectorization-Based Boost Quantized Network Model for Maximizing the Security Level of IoT System to Prevent Intrusions
Ganeshkumar Perumal, S. Gopalakrishnan, Qaisar Abbas, et al.
Systems (2023) Vol. 11, Iss. 8, pp. 436-436
Open Access | Times Cited: 16
Ganeshkumar Perumal, S. Gopalakrishnan, Qaisar Abbas, et al.
Systems (2023) Vol. 11, Iss. 8, pp. 436-436
Open Access | Times Cited: 16
A Novel IDS with a Dynamic Access Control Algorithm to Detect and Defend Intrusion at IoT Nodes
Moutaz Alazab, Albara Awajan, Hadeel Alazzam, et al.
Sensors (2024) Vol. 24, Iss. 7, pp. 2188-2188
Open Access | Times Cited: 6
Moutaz Alazab, Albara Awajan, Hadeel Alazzam, et al.
Sensors (2024) Vol. 24, Iss. 7, pp. 2188-2188
Open Access | Times Cited: 6
Generative AI for Secure Physical Layer Communications: A Survey
Changyuan Zhao, Hongyang Du, Dusit Niyato, et al.
IEEE Transactions on Cognitive Communications and Networking (2024) Vol. 11, Iss. 1, pp. 3-26
Open Access | Times Cited: 5
Changyuan Zhao, Hongyang Du, Dusit Niyato, et al.
IEEE Transactions on Cognitive Communications and Networking (2024) Vol. 11, Iss. 1, pp. 3-26
Open Access | Times Cited: 5
Intrusion detection system model: a white-box decision tree with feature selection optimization
W. K. Wong, Filbert H. Juwono, Sivaraman Eswaran, et al.
Neural Computing and Applications (2025)
Closed Access
W. K. Wong, Filbert H. Juwono, Sivaraman Eswaran, et al.
Neural Computing and Applications (2025)
Closed Access
Advancements in training and deployment strategies for AI-based intrusion detection systems in IoT: a systematic literature review
S Kumar Reddy Mallidi, Rajeswara Rao Ramisetty
Discover Internet of Things (2025) Vol. 5, Iss. 1
Open Access
S Kumar Reddy Mallidi, Rajeswara Rao Ramisetty
Discover Internet of Things (2025) Vol. 5, Iss. 1
Open Access
Hybrid Convolutional Neural Network for Robust Attack Detection in Wireless Sensor Networks
S. Prasad, Rifat Hussain, Adam Amril Jaharadak, et al.
Internet Technology Letters (2025)
Closed Access
S. Prasad, Rifat Hussain, Adam Amril Jaharadak, et al.
Internet Technology Letters (2025)
Closed Access
IoT Intrusion Detection System Based on Machine Learning
Bayi Xu, Lei Sun, Xiuqing Mao, et al.
Electronics (2023) Vol. 12, Iss. 20, pp. 4289-4289
Open Access | Times Cited: 13
Bayi Xu, Lei Sun, Xiuqing Mao, et al.
Electronics (2023) Vol. 12, Iss. 20, pp. 4289-4289
Open Access | Times Cited: 13
Iot traffic-based DDoS attacks detection mechanisms: A comprehensive review
Praveen Shukla, C. Rama Krishna, Nilesh Vishwasrao Patil
The Journal of Supercomputing (2023) Vol. 80, Iss. 7, pp. 9986-10043
Closed Access | Times Cited: 13
Praveen Shukla, C. Rama Krishna, Nilesh Vishwasrao Patil
The Journal of Supercomputing (2023) Vol. 80, Iss. 7, pp. 9986-10043
Closed Access | Times Cited: 13
LAPEP—Lightweight Authentication Protocol with Enhanced Privacy for effective secured communication in vehicular ad-hoc network
S. Jayashree, S. V. N. Santhosh Kumar
Wireless Networks (2023) Vol. 30, Iss. 1, pp. 151-178
Closed Access | Times Cited: 12
S. Jayashree, S. V. N. Santhosh Kumar
Wireless Networks (2023) Vol. 30, Iss. 1, pp. 151-178
Closed Access | Times Cited: 12
Enhancing ınternet security: a novel ML approach for intrusion detection using RS2FS and cascaded SVM/ANFIS
S. Gomathi, Khushbu Kumari
International Journal of Machine Learning and Cybernetics (2025)
Closed Access
S. Gomathi, Khushbu Kumari
International Journal of Machine Learning and Cybernetics (2025)
Closed Access
Adaptive Machine Learning-Based Intrusion Detection Systems for IoT Era
Rahul Vadisetty
Lecture notes in networks and systems (2025), pp. 251-273
Closed Access
Rahul Vadisetty
Lecture notes in networks and systems (2025), pp. 251-273
Closed Access
Application of deep reinforcement learning for intrusion detection in Internet of Things: A systematic review
Saeid Jamshidi, Amin Nikanjam, Kawser Wazed Nafi, et al.
Internet of Things (2025), pp. 101531-101531
Closed Access
Saeid Jamshidi, Amin Nikanjam, Kawser Wazed Nafi, et al.
Internet of Things (2025), pp. 101531-101531
Closed Access
Lightweight and Efficient Post Quantum Key Encapsulation Mechanism Based on Q-Problem
Mostefa Kara, Konstantinos Κarampidis, Spyros Panagiotakis, et al.
Electronics (2025) Vol. 14, Iss. 4, pp. 728-728
Open Access
Mostefa Kara, Konstantinos Κarampidis, Spyros Panagiotakis, et al.
Electronics (2025) Vol. 14, Iss. 4, pp. 728-728
Open Access
Deep Reinforcement Learning for intrusion detection in Internet of Things: Best practices, lessons learnt, and open challenges
Jesús F. Cevallos M., Alessandra Rizzardi, Sabrina Sicari, et al.
Computer Networks (2023) Vol. 236, pp. 110016-110016
Closed Access | Times Cited: 12
Jesús F. Cevallos M., Alessandra Rizzardi, Sabrina Sicari, et al.
Computer Networks (2023) Vol. 236, pp. 110016-110016
Closed Access | Times Cited: 12
Guarding Digital Health: Deep Learning for Attack Detection in Medical IoT
K Vaisakhkrishnan, G. V. Ashok, Parimarjan Mishra, et al.
Procedia Computer Science (2024) Vol. 235, pp. 2498-2507
Open Access | Times Cited: 3
K Vaisakhkrishnan, G. V. Ashok, Parimarjan Mishra, et al.
Procedia Computer Science (2024) Vol. 235, pp. 2498-2507
Open Access | Times Cited: 3
Intelligent fuzzy logic based intrusion detection system for effective detection of black hole attack in WSN
A Binthiya, Selvi Ravindran
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 4, pp. 1813-1829
Closed Access | Times Cited: 3
A Binthiya, Selvi Ravindran
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 4, pp. 1813-1829
Closed Access | Times Cited: 3
NERO: NEural algorithmic reasoning for zeRO-day attack detection in the IoT: A hybrid approach
Jesús F. Cevallos M., Alessandra Rizzardi, Sabrina Sicari, et al.
Computers & Security (2024) Vol. 142, pp. 103898-103898
Open Access | Times Cited: 3
Jesús F. Cevallos M., Alessandra Rizzardi, Sabrina Sicari, et al.
Computers & Security (2024) Vol. 142, pp. 103898-103898
Open Access | Times Cited: 3
Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection Techniques and Recommended Prevention Approach
Omar Alshamsi, Khaled Shaalan, Usman Javed Butt
Information (2024) Vol. 15, Iss. 10, pp. 631-631
Open Access | Times Cited: 3
Omar Alshamsi, Khaled Shaalan, Usman Javed Butt
Information (2024) Vol. 15, Iss. 10, pp. 631-631
Open Access | Times Cited: 3
Prediction of middle box-based attacks in Internet of Healthcare Things using ranking subsets and convolutional neural network
Harun Bangali, Paul Rodrigues, V. Pandimurugan, et al.
Wireless Networks (2023) Vol. 30, Iss. 3, pp. 1493-1511
Closed Access | Times Cited: 7
Harun Bangali, Paul Rodrigues, V. Pandimurugan, et al.
Wireless Networks (2023) Vol. 30, Iss. 3, pp. 1493-1511
Closed Access | Times Cited: 7
Investigating Routing Protocol Attacks on Low Power and Lossy IoT Networks
Usha Kiran, Poonam Maurya, Himanshu Sharma
SN Computer Science (2024) Vol. 5, Iss. 4
Closed Access | Times Cited: 2
Usha Kiran, Poonam Maurya, Himanshu Sharma
SN Computer Science (2024) Vol. 5, Iss. 4
Closed Access | Times Cited: 2