OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Automated Machine Learning Enabled Cybersecurity Threat Detection in Internet of Things Environment
Fadwa Alrowais, Sami Althahabi, Saud S. Alotaibi, et al.
Computer Systems Science and Engineering (2022) Vol. 45, Iss. 1, pp. 687-700
Open Access | Times Cited: 21

Showing 21 citing articles:

Enhancing IoT network security through deep learning-powered Intrusion Detection System
Shahid Allah Bakhsh, Muhammad Almas Khan, Fawad Ahmed, et al.
Internet of Things (2023) Vol. 24, pp. 100936-100936
Open Access | Times Cited: 60

A Comprehensive Survey: Evaluating the Efficiency of Artificial Intelligence and Machine Learning Techniques on Cyber Security Solutions
Merve Ozkan-Okay, Erdal Akin, Ömer Aslan, et al.
IEEE Access (2024) Vol. 12, pp. 12229-12256
Open Access | Times Cited: 46

Advancing cybersecurity: a comprehensive review of AI-driven detection techniques
A Salem, Safaa M. Azzam, O. E. Emam, et al.
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 22

Enhancing IoT Data Analysis with Machine Learning: A Comprehensive Overview
Amit Kumar Dinkar, Md. Alimul Haque, Ajay Kumar Choudhary
LatIA (2024) Vol. 2, pp. 9-9
Open Access | Times Cited: 16

Improved wolf swarm optimization with deep-learning-based movement analysis and self-regulated human activity recognition
Tamilvizhi Thanarajan, Youseef Alotaibi, Surendran Rajendran, et al.
AIMS Mathematics (2023) Vol. 8, Iss. 5, pp. 12520-12539
Open Access | Times Cited: 32

Machine Learning and IoT-Based Solutions in Industrial Applications for Smart Manufacturing: A Critical Review
Paolo Visconti, Giuseppe Rausa, Carolina Del-Valle-Soto, et al.
Future Internet (2024) Vol. 16, Iss. 11, pp. 394-394
Open Access | Times Cited: 5

Optimizing Intrusion Detection for IoT: A Systematic Review of Machine Learning and Deep Learning Approaches With Feature Selection and Data Balancing
S Kumar Reddy Mallidi, Rajeswara Rao Ramisetty
Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery (2025) Vol. 15, Iss. 2
Closed Access

Adaptive Cybersecurity Neural Networks: An Evolutionary Approach for Enhanced Attack Detection and Classification
Ahmad K. Al Hwaitat, Hussam N. Fakhouri
Applied Sciences (2024) Vol. 14, Iss. 19, pp. 9142-9142
Open Access | Times Cited: 3

SecEdge: A Novel Deep Learning Framework for Real-Time Cybersecurity in Mobile IoT Environments
Kamran Ahmad Awan, Ikram Ud Din, Ahmad Almogren, et al.
Heliyon (2024) Vol. 11, Iss. 1, pp. e40874-e40874
Closed Access | Times Cited: 2

Binary Hunter–Prey Optimization with Machine Learning—Based Cybersecurity Solution on Internet of Things Environment
Adil O. Khadidos, Zenah Mahmoud AlKubaisy, Alaa O. Khadidos, et al.
Sensors (2023) Vol. 23, Iss. 16, pp. 7207-7207
Open Access | Times Cited: 5

A Comprehensive Security Framework for Asymmetrical IoT Network Environments to Monitor and Classify Cyberattack via Machine Learning
Ali Alqahtani, Abdulaziz A. Alsulami, Nayef Alqahtani, et al.
Symmetry (2024) Vol. 16, Iss. 9, pp. 1121-1121
Open Access | Times Cited: 1

SHFW: second-order hybrid fusion weight–median algorithm based on machining learning for advanced IoT data analytics
Tianyi Tu, Ye Su, Y. A. Tang, et al.
Wireless Networks (2023) Vol. 30, Iss. 6, pp. 6055-6067
Closed Access | Times Cited: 3

Weighted salp swarm algorithm with deep learning-powered cyber-threat detection for robust network security
Maha M. Althobaiti, José Escorcia‐Gutierrez
AIMS Mathematics (2024) Vol. 9, Iss. 7, pp. 17676-17695
Open Access

Modeling of Bayesian machine learning with sparrow search algorithm for cyberattack detection in IIoT environment
Faten Khalid Karim, José Varela-Aldás, Mohamad Khairi Ishak, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access

Using and Extending These Models

(2024), pp. 193-224
Closed Access

A Multimodel Transfer-Learning-Based Car Price Prediction Model with an Automatic Fuzzy Logic Parameter Optimizer
Ping‐Huan Kuo, Sing-Yan Chen, Her‐Terng Yau
Computer Systems Science and Engineering (2023) Vol. 46, Iss. 2, pp. 1577-1596
Open Access | Times Cited: 1

Multiclass Classification for Cyber Threats Detection on Twitter
Adnan Hussein, Abdulwahab Ali Almazroi
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 77, Iss. 3, pp. 3853-3866
Open Access | Times Cited: 1

Implementation of Extreme Learning Model for Cyber Security in IoT Networks
S. Parvathi, T. Sushma, K. Anusree, et al.
(2023), pp. 374-379
Closed Access | Times Cited: 1

Machine Learning based Health Status Assessment of Super-span Suspension Bridges
Kothapali Bisen
Machine Learning Theory and Practice (2020) Vol. 1, Iss. 2
Open Access

Ship Lock Electromagnetically Remote Fault Diagnosis Mode Based on Machine Learning
Yang Yang
Machine Learning Theory and Practice (2022) Vol. 3, Iss. 1
Open Access

Page 1

Scroll to top