
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Study on Heuristic Algorithms Combined With LR on a DNN-Based IDS Model to Detect IoT Attacks
Trần Thị Thanh Thủy, Luong Duc Thuan, Nguyen Hong Duc, et al.
MENDEL (2023) Vol. 29, Iss. 1, pp. 62-70
Open Access | Times Cited: 7
Trần Thị Thanh Thủy, Luong Duc Thuan, Nguyen Hong Duc, et al.
MENDEL (2023) Vol. 29, Iss. 1, pp. 62-70
Open Access | Times Cited: 7
Showing 7 citing articles:
The impact of artificial intelligence on organisational cyber security: An outcome of a systematic literature review
Irshaad Jada, Thembekile O. Mayayise
Data and Information Management (2023) Vol. 8, Iss. 2, pp. 100063-100063
Open Access | Times Cited: 29
Irshaad Jada, Thembekile O. Mayayise
Data and Information Management (2023) Vol. 8, Iss. 2, pp. 100063-100063
Open Access | Times Cited: 29
Risk Management and Cybersecurity in Transportation and Warehousing
Azeem Khan, N. Z. Jhanjhi, Haji Abdul Hafidz bin Haji Omar, et al.
Advances in logistics, operations, and management science book series (2023), pp. 1-35
Closed Access | Times Cited: 9
Azeem Khan, N. Z. Jhanjhi, Haji Abdul Hafidz bin Haji Omar, et al.
Advances in logistics, operations, and management science book series (2023), pp. 1-35
Closed Access | Times Cited: 9
Hybrid Data-Driven Learning-Based Internet of Things Network Intrusion Detection Model
Oyeniyi Akeem Alimi
2022 IEEE World AI IoT Congress (AIIoT) (2024), pp. 496-501
Closed Access
Oyeniyi Akeem Alimi
2022 IEEE World AI IoT Congress (AIIoT) (2024), pp. 496-501
Closed Access
A Hybrid Extreme Gradient Boosting and Long Short-Term Memory Algorithm for Cyber Threats Detection
Reham Amin, Ghada Eltaweel, Ahmed F. Ali, et al.
MENDEL (2023) Vol. 29, Iss. 2, pp. 307-322
Open Access | Times Cited: 1
Reham Amin, Ghada Eltaweel, Ahmed F. Ali, et al.
MENDEL (2023) Vol. 29, Iss. 2, pp. 307-322
Open Access | Times Cited: 1
Detecting Outliers Using Modified Recursive PCA Algorithm For Dynamic Streaming Data
Yasi Dani, Agus Yodi Gunawan, Masayu Leylia Khodra, et al.
MENDEL (2023) Vol. 29, Iss. 2, pp. 237-244
Open Access
Yasi Dani, Agus Yodi Gunawan, Masayu Leylia Khodra, et al.
MENDEL (2023) Vol. 29, Iss. 2, pp. 237-244
Open Access
A Study on the Efficiency of ML-Based IDS with Dimensional Reduction Methods for Industry IoT
Duc - Thuan Luong, Minh - Hoang Nguyen, Hong - Duc Nguyen, et al.
2022 RIVF International Conference on Computing and Communication Technologies (RIVF) (2023), pp. 481-486
Closed Access
Duc - Thuan Luong, Minh - Hoang Nguyen, Hong - Duc Nguyen, et al.
2022 RIVF International Conference on Computing and Communication Technologies (RIVF) (2023), pp. 481-486
Closed Access
A Hybrid Deep Learning Model for Intrusion Detection System in the Internet of Things Environment
Vandana Choudhary, Sarvesh Tanwar, Tanupriya Choudhury
(2023), pp. 682-689
Closed Access
Vandana Choudhary, Sarvesh Tanwar, Tanupriya Choudhury
(2023), pp. 682-689
Closed Access