OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

An Efficient Intrusion Detection Framework for Industrial Internet of Things Security
Samah Alshathri, Ayman El‐Sayed, Walid El‐Shafai, et al.
Computer Systems Science and Engineering (2023) Vol. 46, Iss. 1, pp. 819-834
Open Access | Times Cited: 10

Showing 10 citing articles:

The development of a model for the threat detection system with the use of machine learning and neural network methods
Olga Ussatova, Aidana Zhumabekova, Vladislav Karyukin, et al.
International Journal of Innovative Research and Scientific Studies (2024) Vol. 7, Iss. 3, pp. 863-877
Open Access | Times Cited: 2

Next-gen security in IIoT: integrating intrusion detection systems with machine learning for industry 4.0 resilience
Lahcen Idouglid, Said Tkatek, Khalid El Fayq, et al.
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2024) Vol. 14, Iss. 3, pp. 3512-3512
Open Access | Times Cited: 2

Enhanced Metaheuristics with Machine Learning Enabled Cyberattack Detection Model
Ahmed S. Almasoud
Intelligent Automation & Soft Computing (2023) Vol. 37, Iss. 3, pp. 2849-2863
Open Access | Times Cited: 4

Internet of Medical Things Security Frameworks for Risk Assessment and Management: A Scoping Review
Katerina Svandova, Zdeněk Smutný
Journal of Multidisciplinary Healthcare (2024) Vol. Volume 17, pp. 2281-2301
Open Access

iKern: Advanced Intrusion Detection and Prevention at the Kernel Level Using eBPF
Hassan Jalil Hadi, Mubashir Adnan, Yue Cao, et al.
Technologies (2024) Vol. 12, Iss. 8, pp. 122-122
Open Access

Towards Very-High Interaction Honeypots for ICS: a Proof of Concept
Francesco Blefari, Carmelo Felicetti, Francesco Aurelio Pironti, et al.
(2024), pp. 176-182
Closed Access

An Enhancement Multi-Objective Resource Allocation Algorithm in Fog Environment
Nirmeen A. El-Bahnasawy, Amal El-Nattat, Ayman El‐Sayed, et al.
(2023), pp. 1-6
Closed Access

Page 1

Scroll to top