OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

An Ensemble Learning Based Intrusion Detection Model for Industrial IoT Security
Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, et al.
Big Data Mining and Analytics (2023) Vol. 6, Iss. 3, pp. 273-287
Open Access | Times Cited: 43

Showing 1-25 of 43 citing articles:

Clustered Federated Learning With Adaptive Local Differential Privacy on Heterogeneous IoT Data
Zaobo He, Lintao Wang, Zhipeng Cai
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 1, pp. 137-146
Closed Access | Times Cited: 41

Recent endeavors in machine learning-powered intrusion detection systems for the Internet of Things
D. Manivannan
Journal of Network and Computer Applications (2024) Vol. 229, pp. 103925-103925
Closed Access | Times Cited: 8

Malicious detection model with artificial neural network in IoT-based smart farming security
Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, et al.
Cluster Computing (2024) Vol. 27, Iss. 6, pp. 7307-7322
Closed Access | Times Cited: 7

Enhancing network intrusion detection: a dual-ensemble approach with CTGAN-balanced data and weak classifiers
Mohammad Reza Abbaszadeh Bavil Soflaei, Arash Salehpour, Karim Samadzamini
The Journal of Supercomputing (2024) Vol. 80, Iss. 11, pp. 16301-16333
Closed Access | Times Cited: 7

DDoS attacks in Industrial IoT: A survey
Shubhankar Chaudhary, Pramod Kumar Mishra
Computer Networks (2023) Vol. 236, pp. 110015-110015
Closed Access | Times Cited: 19

STFNIoT:Lightweight IoT Intrusion Detection Based on Explainable Analysis Using Spatiotemporal Fusion Networks
Hanlin Chen, Huan Liu, Wenjun Yang
Research Square (Research Square) (2025)
Closed Access

A crossover-integrated Marine Predator Algorithm for feature selection in intrusion detection systems within IoT environments
Sharif Naser Makhadmeh, F.M.A. Salam, Mohammed Awad, et al.
Internet of Things (2025), pp. 101536-101536
Closed Access

MAGRU-IDS: A Multi-Head Attention-Based Gated Recurrent Unit for Intrusion Detection in IIoT Networks
Safi Ullah, Wadii Boulila, Anis Koubâa, et al.
IEEE Access (2023) Vol. 11, pp. 114590-114601
Open Access | Times Cited: 13

Intrusion detection based on ensemble learning for big data classification
Farah Jemili, Rahma Meddeb, Ouajdi Korbaa
Cluster Computing (2023) Vol. 27, Iss. 3, pp. 3771-3798
Closed Access | Times Cited: 13

A Novel Intelligence System for Hybrid Crop Suitable Landform Prediction Using Machine Learning Techniques and IoT
Senthil G. A, R. Prabha, S. Sridevi, et al.
Algorithms for intelligent systems (2024), pp. 1-17
Closed Access | Times Cited: 4

Federated transfer learning for intrusion detection system in industrial iot 4.0
N Malathy, Shree Harish Kumar G, Ram D. Sriram, et al.
Multimedia Tools and Applications (2024) Vol. 83, Iss. 19, pp. 57913-57941
Closed Access | Times Cited: 3

A novel federated learning aggregation algorithm for AIoT intrusion detection
Yidong Jia, Fuhong Lin, Yan Sun
IET Communications (2024) Vol. 18, Iss. 7, pp. 429-436
Open Access | Times Cited: 3

Explainable and Data-Efficient Deep Learning for Enhanced Attack Detection in IIoT Ecosystem
Danish Attique, Hao Wang, Ping Wang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 24, pp. 38976-38986
Closed Access | Times Cited: 3

A Consistent Augmented Stacking Polynomial Optimized Tool (ASPOT) for Improving Security of Cloud-IoT Systems
Divya Ramachandran, R. Chithambaramani, S. Sankar Ganesh, et al.
Journal of Advanced Research in Applied Sciences and Engineering Technology (2024) Vol. 37, Iss. 1, pp. 16-36
Open Access | Times Cited: 2

Risk Assessment and Security of Industrial Internet of Things Network Using Advance Machine Learning
Geetanjali Bhoi, Rajat Kumar Sahu, Etuari Oram, et al.
Intelligent systems reference library (2024), pp. 267-285
Closed Access | Times Cited: 2

A Whale Optimization Algorithm Feature Selection Model for IoT Detecting Intrusion in Environments
Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, et al.
Lecture notes in networks and systems (2024), pp. 413-419
Closed Access | Times Cited: 1

Majority Voting Ensemble Classifier for Detecting Keylogging Attack on Internet of Things
Yahya Alhaj Maz, Mohammed Anbar, Selvakumar Manickam, et al.
IEEE Access (2024) Vol. 12, pp. 19860-19871
Open Access | Times Cited: 1

Internet of Things data intrusion detection under GRU-LSTM algorithm
Chao He
(2024), pp. 25-25
Closed Access | Times Cited: 1

Scalable Implementation of Random Forests for Big Data Classification on Cloud Infrastructure
Mohan Raparthi, Monika Soni, Vipin Tiwari, et al.
Algorithms for intelligent systems (2024), pp. 493-512
Closed Access | Times Cited: 1

MFT: A novel memory flow transformer efficient intrusion detection method
Xuefeng Jiang, Liuquan Xu, Yu Li, et al.
Computers & Security (2024) Vol. 148, pp. 104174-104174
Closed Access | Times Cited: 1

Intrusion Detection: A Comparison Study of Machine Learning Models Using Unbalanced Dataset
Sunday Adeola Ajagbe, Joseph Bamidele Awotunde, Héctor Flórez
SN Computer Science (2024) Vol. 5, Iss. 8
Open Access | Times Cited: 1

A Systematic Survey of Machine Learning and Deep Learning Models Used in Industrial Internet of Things Security
Ersin Enes Eryılmaz, Sedat Akleylek, Yankı Ertek, et al.
MANAS Journal of Engineering (2024) Vol. 12, Iss. 1, pp. 1-28
Open Access

A feature selection model using binary FOX optimization and v-shaped transfer function for network IDS
Babita Majhi, Prastavana
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 6, pp. 3556-3570
Closed Access

Deep Learning Model for Intrusion Detection Based on Weighted Cross Entropy Loss Function and OBiLSTM
Yong Ding, Shuai Xu, Xinyong Peng, et al.
Research Square (Research Square) (2024)
Open Access

Page 1 - Next Page

Scroll to top