
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Anomaly Detection for Industrial Internet of Things Cyberattacks
Rehab Alanazi, Ahamed Aljuhani
Computer Systems Science and Engineering (2022) Vol. 44, Iss. 3, pp. 2361-2378
Open Access | Times Cited: 27
Rehab Alanazi, Ahamed Aljuhani
Computer Systems Science and Engineering (2022) Vol. 44, Iss. 3, pp. 2361-2378
Open Access | Times Cited: 27
Showing 1-25 of 27 citing articles:
A Comprehensive Survey of Cybersecurity Threats, Attacks, and Effective Countermeasures in Industrial Internet of Things
Abdullah Alnajim, Shabana Habib, Muhammad Islam, et al.
Technologies (2023) Vol. 11, Iss. 6, pp. 161-161
Open Access | Times Cited: 15
Abdullah Alnajim, Shabana Habib, Muhammad Islam, et al.
Technologies (2023) Vol. 11, Iss. 6, pp. 161-161
Open Access | Times Cited: 15
A Deep-Learning-Integrated Blockchain Framework for Securing Industrial IoT
Ahamed Aljuhani, Prabhat Kumar, Rehab Alanazi, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 5, pp. 7817-7827
Closed Access | Times Cited: 12
Ahamed Aljuhani, Prabhat Kumar, Rehab Alanazi, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 5, pp. 7817-7827
Closed Access | Times Cited: 12
Securing the Internet of Things in Logistics
Syed Nizam Ud Din, Syeda Mariam Muzammal, Ruqia Bibi, et al.
Advances in logistics, operations, and management science book series (2024), pp. 133-165
Closed Access | Times Cited: 4
Syed Nizam Ud Din, Syeda Mariam Muzammal, Ruqia Bibi, et al.
Advances in logistics, operations, and management science book series (2024), pp. 133-165
Closed Access | Times Cited: 4
Towards a generalized hybrid deep learning model with optimized hyperparameters for malicious traffic detection in the Industrial Internet of Things
Bilal Babayiğit, Mohammed Abubaker
Engineering Applications of Artificial Intelligence (2023) Vol. 128, pp. 107515-107515
Closed Access | Times Cited: 11
Bilal Babayiğit, Mohammed Abubaker
Engineering Applications of Artificial Intelligence (2023) Vol. 128, pp. 107515-107515
Closed Access | Times Cited: 11
Self-Supervised Variational Graph Autoencoder for System-Level Anomaly Detection
Le Zhang, Wei Cheng, Ji Xing, et al.
IEEE Transactions on Instrumentation and Measurement (2023) Vol. 72, pp. 1-11
Closed Access | Times Cited: 9
Le Zhang, Wei Cheng, Ji Xing, et al.
IEEE Transactions on Instrumentation and Measurement (2023) Vol. 72, pp. 1-11
Closed Access | Times Cited: 9
Numerical Feature Selection and Hyperbolic Tangent Feature Scaling in Machine Learning-Based Detection of Anomalies in the Computer Network Behavior
Danijela Protić, Miomir Stanković, Radomir Prodanović, et al.
Electronics (2023) Vol. 12, Iss. 19, pp. 4158-4158
Open Access | Times Cited: 7
Danijela Protić, Miomir Stanković, Radomir Prodanović, et al.
Electronics (2023) Vol. 12, Iss. 19, pp. 4158-4158
Open Access | Times Cited: 7
Anomaly-based threat detection in smart health using machine learning
Meher Tabassum, Saba Mahmood, Amal Bukhari, et al.
BMC Medical Informatics and Decision Making (2024) Vol. 24, Iss. 1
Open Access | Times Cited: 2
Meher Tabassum, Saba Mahmood, Amal Bukhari, et al.
BMC Medical Informatics and Decision Making (2024) Vol. 24, Iss. 1
Open Access | Times Cited: 2
Intelligent Intrusion Detection for Industrial Internet of Things Using Clustering Techniques
Noura Alenezi, Ahamed Aljuhani
Computer Systems Science and Engineering (2023) Vol. 46, Iss. 3, pp. 2899-2915
Open Access | Times Cited: 6
Noura Alenezi, Ahamed Aljuhani
Computer Systems Science and Engineering (2023) Vol. 46, Iss. 3, pp. 2899-2915
Open Access | Times Cited: 6
DeepRoughNetID: A Robust Framework for Network Anomaly Intrusion Detection with High Detection Rates
M. Nalini, B. Yamini, P. Sinthia, et al.
IETE Journal of Research (2024) Vol. 70, Iss. 9, pp. 7137-7148
Closed Access | Times Cited: 1
M. Nalini, B. Yamini, P. Sinthia, et al.
IETE Journal of Research (2024) Vol. 70, Iss. 9, pp. 7137-7148
Closed Access | Times Cited: 1
Variance‐driven security optimisation in industrial IoT sensors
Hardik Gupta, Sunil K. Singh, Sudhakar Kumar, et al.
IET Networks (2024)
Open Access | Times Cited: 1
Hardik Gupta, Sunil K. Singh, Sudhakar Kumar, et al.
IET Networks (2024)
Open Access | Times Cited: 1
IDS-Chain: A Collaborative Intrusion Detection Framework Empowered Blockchain for Internet of Medical Things
Ahamed Aljuhani
(2022), pp. 57-62
Closed Access | Times Cited: 5
Ahamed Aljuhani
(2022), pp. 57-62
Closed Access | Times Cited: 5
Anomaly Detection of Water Pollution Prevention Ecosystem Based on Artificial Intelligence
Jeongwon Kim
Water Pollution Prevention and Control Project (2023) Vol. 4, Iss. 2
Open Access | Times Cited: 2
Jeongwon Kim
Water Pollution Prevention and Control Project (2023) Vol. 4, Iss. 2
Open Access | Times Cited: 2
AI-Driven Threat Detection and Response Systems for Secure National Infrastructure Networks: A Comprehensive Review
Akinkunle Akinloye., Sunday Anwansedo, Oladayo Tosin Akinwande
International Journal of Latest Technology in Engineering Management & Applied Science (2024) Vol. 13, Iss. 7, pp. 82-92
Closed Access
Akinkunle Akinloye., Sunday Anwansedo, Oladayo Tosin Akinwande
International Journal of Latest Technology in Engineering Management & Applied Science (2024) Vol. 13, Iss. 7, pp. 82-92
Closed Access
Abnormal behavior detection in industrial control systems based on CNN
Jingzhao Chen, Bin Liu, Haowen Zuo
Alexandria Engineering Journal (2024) Vol. 107, pp. 643-651
Closed Access
Jingzhao Chen, Bin Liu, Haowen Zuo
Alexandria Engineering Journal (2024) Vol. 107, pp. 643-651
Closed Access
Towards a Minimum Universal Features Set for IoT DDoS Attack Detection
Osama Ebrahem, Salah Dowaji, Suhel Alhammoud
Research Square (Research Square) (2024)
Closed Access
Osama Ebrahem, Salah Dowaji, Suhel Alhammoud
Research Square (Research Square) (2024)
Closed Access
Attention-Based Hybrid Deep Learning Model for Intrusion Detection in IIoT Networks
Safi Ullah, Wadii Boulila, Anis Koubâa, et al.
Procedia Computer Science (2024) Vol. 246, pp. 3323-3332
Open Access
Safi Ullah, Wadii Boulila, Anis Koubâa, et al.
Procedia Computer Science (2024) Vol. 246, pp. 3323-3332
Open Access
Intrusion Detection in IIoT Using Machine Learning
Aissétou Ba, Mehdi Adda
Procedia Computer Science (2024) Vol. 251, pp. 265-272
Open Access
Aissétou Ba, Mehdi Adda
Procedia Computer Science (2024) Vol. 251, pp. 265-272
Open Access
AI-Driven Threat Detection in Cloud Environments
V. Jyothsna, E. Sandhya, K. K. Baseer, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 261-284
Closed Access
V. Jyothsna, E. Sandhya, K. K. Baseer, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 261-284
Closed Access
WGAN-DL-IDS: An Efficient Framework for Intrusion Detection System Using WGAN, Random Forest, and Deep Learning Approaches
Shehla Gul, Sobia Arshad, Sanay Muhammad Umar Saeed, et al.
Computers (2024) Vol. 14, Iss. 1, pp. 4-4
Open Access
Shehla Gul, Sobia Arshad, Sanay Muhammad Umar Saeed, et al.
Computers (2024) Vol. 14, Iss. 1, pp. 4-4
Open Access
Digital transformation and visual knowledge map analysis of intelligent factory for sensor information of Internet of Things
Honglv Wang, Dingke Shi, Chengting Zhang, et al.
Intelligent Decision Technologies (2024) Vol. 18, Iss. 4, pp. 3437-3451
Closed Access
Honglv Wang, Dingke Shi, Chengting Zhang, et al.
Intelligent Decision Technologies (2024) Vol. 18, Iss. 4, pp. 3437-3451
Closed Access
Eco-Friendly Intrusion Detection: Evaluating Energy Costs of Learning
Júlio Corona, Mário Antunes, Rui L. Aguiar
(2023), pp. 1-6
Closed Access | Times Cited: 1
Júlio Corona, Mário Antunes, Rui L. Aguiar
(2023), pp. 1-6
Closed Access | Times Cited: 1
Cybersecurity for Industrial IoT, Threats, Vulnerabilities, and Solutions: A Brief Review
Andrea Sánchez-Zumba, Diego Ávila-Pesantez
Lecture notes in networks and systems (2023), pp. 1101-1112
Closed Access
Andrea Sánchez-Zumba, Diego Ávila-Pesantez
Lecture notes in networks and systems (2023), pp. 1101-1112
Closed Access
CTSF: An Intrusion Detection Framework for Industrial Internet Based on Enhanced Feature Extraction and Decision Optimization Approach
Guangzhao Chai, Shiming Li, Yu Yang, et al.
Sensors (2023) Vol. 23, Iss. 21, pp. 8793-8793
Open Access
Guangzhao Chai, Shiming Li, Yu Yang, et al.
Sensors (2023) Vol. 23, Iss. 21, pp. 8793-8793
Open Access
Detecting the Anomaly Attacks in Industrial IoT using Hybrid Feature Selection Based Modified Convolutional Neural Network
Sreekanth Rallapalli, Vikas Tiwari, Vidya Sagar S D, et al.
(2023), pp. 1-7
Closed Access
Sreekanth Rallapalli, Vikas Tiwari, Vidya Sagar S D, et al.
(2023), pp. 1-7
Closed Access
Ensemble Learning Approach for Intrusion Detection Systems in Industrial Internet of Things
Mudhafar Nuaimi, Lamia Chaari Fourati, Bassem Ben Hamed
(2023) Vol. 2, pp. 1-7
Closed Access
Mudhafar Nuaimi, Lamia Chaari Fourati, Bassem Ben Hamed
(2023) Vol. 2, pp. 1-7
Closed Access