
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An unsupervised generative adversarial network based-host intrusion detection system for internet of things devices
Idriss Idrissi, Mostafa Azizi, Omar Moussaoui
Indonesian Journal of Electrical Engineering and Computer Science (2022) Vol. 25, Iss. 2, pp. 1140-1140
Open Access | Times Cited: 29
Idriss Idrissi, Mostafa Azizi, Omar Moussaoui
Indonesian Journal of Electrical Engineering and Computer Science (2022) Vol. 25, Iss. 2, pp. 1140-1140
Open Access | Times Cited: 29
Showing 1-25 of 29 citing articles:
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Amit Kumar Balyan, Sachin Ahuja, Umesh Kumar Lilhore, et al.
Sensors (2022) Vol. 22, Iss. 16, pp. 5986-5986
Open Access | Times Cited: 187
Amit Kumar Balyan, Sachin Ahuja, Umesh Kumar Lilhore, et al.
Sensors (2022) Vol. 22, Iss. 16, pp. 5986-5986
Open Access | Times Cited: 187
A Review of Anomaly Detection Strategies to Detect Threats to Cyber-Physical Systems
Nicholas Jeffrey, Qing Tan, José R. Villar
Electronics (2023) Vol. 12, Iss. 15, pp. 3283-3283
Open Access | Times Cited: 54
Nicholas Jeffrey, Qing Tan, José R. Villar
Electronics (2023) Vol. 12, Iss. 15, pp. 3283-3283
Open Access | Times Cited: 54
GAN-AE: An unsupervised intrusion detection system for MQTT networks
Tej Kiran Boppana, Priyanka Bagade
Engineering Applications of Artificial Intelligence (2023) Vol. 119, pp. 105805-105805
Closed Access | Times Cited: 32
Tej Kiran Boppana, Priyanka Bagade
Engineering Applications of Artificial Intelligence (2023) Vol. 119, pp. 105805-105805
Closed Access | Times Cited: 32
Advanced AI and ML frameworks for Transforming Drug Discovery and Optimization: With Innovative insights in Polypharmacology, Drug Repurposing, Combination Therapy and Nanomedicine.
Subiya Ambreen, Mohammad Umar, Asra Noor, et al.
European Journal of Medicinal Chemistry (2024) Vol. 284, pp. 117164-117164
Closed Access | Times Cited: 6
Subiya Ambreen, Mohammad Umar, Asra Noor, et al.
European Journal of Medicinal Chemistry (2024) Vol. 284, pp. 117164-117164
Closed Access | Times Cited: 6
MAGRU-IDS: A Multi-Head Attention-Based Gated Recurrent Unit for Intrusion Detection in IIoT Networks
Safi Ullah, Wadii Boulila, Anis Koubâa, et al.
IEEE Access (2023) Vol. 11, pp. 114590-114601
Open Access | Times Cited: 13
Safi Ullah, Wadii Boulila, Anis Koubâa, et al.
IEEE Access (2023) Vol. 11, pp. 114590-114601
Open Access | Times Cited: 13
Applying Generative Machine Learning to Intrusion Detection: A Systematic Mapping Study and Review
James Halvorsen, Clemente Izurieta, Haipeng Cai, et al.
ACM Computing Surveys (2024) Vol. 56, Iss. 10, pp. 1-33
Open Access | Times Cited: 5
James Halvorsen, Clemente Izurieta, Haipeng Cai, et al.
ACM Computing Surveys (2024) Vol. 56, Iss. 10, pp. 1-33
Open Access | Times Cited: 5
One-class IoT anomaly detection system using an improved interpolated deep SVDD autoencoder with adversarial regularizer
Abdulkarim Katbi, Riadh Ksantini
Digital Signal Processing (2025), pp. 105153-105153
Closed Access
Abdulkarim Katbi, Riadh Ksantini
Digital Signal Processing (2025), pp. 105153-105153
Closed Access
Insights on the internet of things: past, present, and future directions
Tole Sutikno, Daniël Thalmann
TELKOMNIKA (Telecommunication Computing Electronics and Control) (2022) Vol. 20, Iss. 6, pp. 1399-1399
Open Access | Times Cited: 19
Tole Sutikno, Daniël Thalmann
TELKOMNIKA (Telecommunication Computing Electronics and Control) (2022) Vol. 20, Iss. 6, pp. 1399-1399
Open Access | Times Cited: 19
Forest Fires Detection using Deep Transfer Learning
Mimoun Yandouzi, Mounir GRARI, Idriss Idrissi, et al.
International Journal of Advanced Computer Science and Applications (2022) Vol. 13, Iss. 8
Open Access | Times Cited: 18
Mimoun Yandouzi, Mounir GRARI, Idriss Idrissi, et al.
International Journal of Advanced Computer Science and Applications (2022) Vol. 13, Iss. 8
Open Access | Times Cited: 18
Review on maintenance of photovoltaic systems based on deep learning and internet of things
Younes Hammoudi, Idriss Idrissi, Mohammed Boukabous, et al.
Indonesian Journal of Electrical Engineering and Computer Science (2022) Vol. 26, Iss. 2, pp. 1060-1060
Open Access | Times Cited: 17
Younes Hammoudi, Idriss Idrissi, Mohammed Boukabous, et al.
Indonesian Journal of Electrical Engineering and Computer Science (2022) Vol. 26, Iss. 2, pp. 1060-1060
Open Access | Times Cited: 17
Anomaly-Based Intrusion on IoT Networks Using AIGAN-a Generative Adversarial Network
Zhipeng Liu, Junyi Hu, Yang Liu, et al.
IEEE Access (2023) Vol. 11, pp. 91116-91132
Open Access | Times Cited: 8
Zhipeng Liu, Junyi Hu, Yang Liu, et al.
IEEE Access (2023) Vol. 11, pp. 91116-91132
Open Access | Times Cited: 8
Performance Metrics of an Intrusion Detection System Through Window-Based Deep Learning Models
Fatima Isiaka
Journal of Data Science and Intelligent Systems (2023) Vol. 2, Iss. 3, pp. 174-180
Open Access | Times Cited: 8
Fatima Isiaka
Journal of Data Science and Intelligent Systems (2023) Vol. 2, Iss. 3, pp. 174-180
Open Access | Times Cited: 8
Improving Reliability for Detecting Anomalies in the MQTT Network by Applying Correlation Analysis for Feature Selection Using Machine Learning Techniques
임란, Megat F. Zuhairi, Syed Mubashir Ali, et al.
Applied Sciences (2023) Vol. 13, Iss. 11, pp. 6753-6753
Open Access | Times Cited: 7
임란, Megat F. Zuhairi, Syed Mubashir Ali, et al.
Applied Sciences (2023) Vol. 13, Iss. 11, pp. 6753-6753
Open Access | Times Cited: 7
Evaluated bird swarm optimization based on deep belief network (EBSO-DBN) classification technique for IOT network intrusion detection
A. Biju, S. Wilfred Franklin
Automatika (2023) Vol. 65, Iss. 1, pp. 108-116
Open Access | Times Cited: 6
A. Biju, S. Wilfred Franklin
Automatika (2023) Vol. 65, Iss. 1, pp. 108-116
Open Access | Times Cited: 6
An Intrusion Detection System Using Machine Learning for Internet of Medical Things
Idriss Idrissi, Mohammed Boukabous, Mounir Grari, et al.
Lecture notes in electrical engineering (2023), pp. 641-649
Closed Access | Times Cited: 5
Idriss Idrissi, Mohammed Boukabous, Mounir Grari, et al.
Lecture notes in electrical engineering (2023), pp. 641-649
Closed Access | Times Cited: 5
A Novel Approach to Android Malware Intrusion Detection Using Zero-Shot Learning GANs
Syed Atir Raza Shirazi, Mehwish Shaikh
Sir Syed University Research Journal of Engineering & Technology (2024) Vol. 13, Iss. 2
Open Access | Times Cited: 1
Syed Atir Raza Shirazi, Mehwish Shaikh
Sir Syed University Research Journal of Engineering & Technology (2024) Vol. 13, Iss. 2
Open Access | Times Cited: 1
Bolstering IoT security with IoT device type Identification using optimized Variational Autoencoder Wasserstein Generative Adversarial Network
Jothi Shri Sankar, Saravanan Dhatchnamurthy, X. Anitha Mary, et al.
Network Computation in Neural Systems (2024) Vol. 35, Iss. 3, pp. 278-299
Closed Access | Times Cited: 1
Jothi Shri Sankar, Saravanan Dhatchnamurthy, X. Anitha Mary, et al.
Network Computation in Neural Systems (2024) Vol. 35, Iss. 3, pp. 278-299
Closed Access | Times Cited: 1
A Lightweight Deep Learning Model for Forest Fires Detection and Monitoring
Mimoun Yandouzi, Idriss Idrissi, Mohammed Boukabous, et al.
Lecture notes in electrical engineering (2023), pp. 697-705
Closed Access | Times Cited: 4
Mimoun Yandouzi, Idriss Idrissi, Mohammed Boukabous, et al.
Lecture notes in electrical engineering (2023), pp. 697-705
Closed Access | Times Cited: 4
A Review on Congestion Mitigation Techniques in Ultra-Dense Wireless Sensor Networks: State-of-the-Art Future Emerging Artificial Intelligence-Based Solutions
A. Umar, Zubair Khalid, Mohammed Ali, et al.
Applied Sciences (2023) Vol. 13, Iss. 22, pp. 12384-12384
Open Access | Times Cited: 3
A. Umar, Zubair Khalid, Mohammed Ali, et al.
Applied Sciences (2023) Vol. 13, Iss. 22, pp. 12384-12384
Open Access | Times Cited: 3
Machine learning-based intrusion detection system for detecting web attacks
Fatimetou Abdou Vadhil, Mohamed Lemine Ould Salihi, Mohamedade Farouk Nanne
IAES International Journal of Artificial Intelligence (2023) Vol. 13, Iss. 1, pp. 711-711
Open Access | Times Cited: 3
Fatimetou Abdou Vadhil, Mohamed Lemine Ould Salihi, Mohamedade Farouk Nanne
IAES International Journal of Artificial Intelligence (2023) Vol. 13, Iss. 1, pp. 711-711
Open Access | Times Cited: 3
An Integrated Multilayered Framework for IoT Security Intrusion Decisions
Hassen Sallay
Intelligent Automation & Soft Computing (2022) Vol. 36, Iss. 1, pp. 429-444
Open Access | Times Cited: 4
Hassen Sallay
Intelligent Automation & Soft Computing (2022) Vol. 36, Iss. 1, pp. 429-444
Open Access | Times Cited: 4
Intrusion Detection in Networks Using Adversarial Networks and Weighted Encoder Components
Nirbhay Kumar Chaubey, Ruby Dahiya, Venkateswaran Radhakrishnan, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 413-434
Closed Access
Nirbhay Kumar Chaubey, Ruby Dahiya, Venkateswaran Radhakrishnan, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 413-434
Closed Access
Implementing generative adversarial networks for increasing performance of transmission fault classification
Tilottama Goswami, Uponika Barman Roy, Deepthi Kalavala, et al.
Indonesian Journal of Electrical Engineering and Computer Science (2024) Vol. 34, Iss. 2, pp. 1024-1024
Open Access
Tilottama Goswami, Uponika Barman Roy, Deepthi Kalavala, et al.
Indonesian Journal of Electrical Engineering and Computer Science (2024) Vol. 34, Iss. 2, pp. 1024-1024
Open Access
IoT Security: A Comparative Analysis of Intrusion Detection Systems Based on Machine Learning, Deep Learning and Transfer Learning Techniques
H. Mahjoubi, Karima Aissaoui
(2024), pp. 35-48
Closed Access
H. Mahjoubi, Karima Aissaoui
(2024), pp. 35-48
Closed Access
Modified Buffalo Optimization with Big Data Analytics Assisted Intrusion Detection Model
R Sheeba, R. Sharmila, Ahmed Alkhayyat, et al.
Computer Systems Science and Engineering (2023) Vol. 46, Iss. 2, pp. 1415-1429
Open Access | Times Cited: 1
R Sheeba, R. Sharmila, Ahmed Alkhayyat, et al.
Computer Systems Science and Engineering (2023) Vol. 46, Iss. 2, pp. 1415-1429
Open Access | Times Cited: 1