
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An Efficient Intrusion Detection Framework for Industrial Internet of Things Security
Samah Alshathri, Ayman El‐Sayed, Walid El‐Shafai, et al.
Computer Systems Science and Engineering (2023) Vol. 46, Iss. 1, pp. 819-834
Open Access | Times Cited: 10
Samah Alshathri, Ayman El‐Sayed, Walid El‐Shafai, et al.
Computer Systems Science and Engineering (2023) Vol. 46, Iss. 1, pp. 819-834
Open Access | Times Cited: 10
Showing 10 citing articles:
Enhancing the Internet of Medical Things (IoMT) Security with Meta-Learning: A Performance-Driven Approach for Ensemble Intrusion Detection Systems
Mousa Alalhareth, Sungchul Hong
Sensors (2024) Vol. 24, Iss. 11, pp. 3519-3519
Open Access | Times Cited: 5
Mousa Alalhareth, Sungchul Hong
Sensors (2024) Vol. 24, Iss. 11, pp. 3519-3519
Open Access | Times Cited: 5
Design of Industrial IoT Intrusion Security Detection System Based on LightGBM Feature Algorithm and Multi-layer Perception Network
Yongsheng Deng
Journal of Cyber Security and Mobility (2024), pp. 327-348
Open Access | Times Cited: 2
Yongsheng Deng
Journal of Cyber Security and Mobility (2024), pp. 327-348
Open Access | Times Cited: 2
The development of a model for the threat detection system with the use of machine learning and neural network methods
Olga Ussatova, Aidana Zhumabekova, Vladislav Karyukin, et al.
International Journal of Innovative Research and Scientific Studies (2024) Vol. 7, Iss. 3, pp. 863-877
Open Access | Times Cited: 2
Olga Ussatova, Aidana Zhumabekova, Vladislav Karyukin, et al.
International Journal of Innovative Research and Scientific Studies (2024) Vol. 7, Iss. 3, pp. 863-877
Open Access | Times Cited: 2
Next-gen security in IIoT: integrating intrusion detection systems with machine learning for industry 4.0 resilience
Lahcen Idouglid, Said Tkatek, Khalid El Fayq, et al.
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2024) Vol. 14, Iss. 3, pp. 3512-3512
Open Access | Times Cited: 2
Lahcen Idouglid, Said Tkatek, Khalid El Fayq, et al.
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2024) Vol. 14, Iss. 3, pp. 3512-3512
Open Access | Times Cited: 2
Enhanced Metaheuristics with Machine Learning Enabled Cyberattack Detection Model
Ahmed S. Almasoud
Intelligent Automation & Soft Computing (2023) Vol. 37, Iss. 3, pp. 2849-2863
Open Access | Times Cited: 4
Ahmed S. Almasoud
Intelligent Automation & Soft Computing (2023) Vol. 37, Iss. 3, pp. 2849-2863
Open Access | Times Cited: 4
Internet of Medical Things Security Frameworks for Risk Assessment and Management: A Scoping Review
Katerina Svandova, Zdeněk Smutný
Journal of Multidisciplinary Healthcare (2024) Vol. Volume 17, pp. 2281-2301
Open Access
Katerina Svandova, Zdeněk Smutný
Journal of Multidisciplinary Healthcare (2024) Vol. Volume 17, pp. 2281-2301
Open Access
iKern: Advanced Intrusion Detection and Prevention at the Kernel Level Using eBPF
Hassan Jalil Hadi, Mubashir Adnan, Yue Cao, et al.
Technologies (2024) Vol. 12, Iss. 8, pp. 122-122
Open Access
Hassan Jalil Hadi, Mubashir Adnan, Yue Cao, et al.
Technologies (2024) Vol. 12, Iss. 8, pp. 122-122
Open Access
Towards Very-High Interaction Honeypots for ICS: a Proof of Concept
Francesco Blefari, Carmelo Felicetti, Francesco Aurelio Pironti, et al.
(2024), pp. 176-182
Closed Access
Francesco Blefari, Carmelo Felicetti, Francesco Aurelio Pironti, et al.
(2024), pp. 176-182
Closed Access
Optimized Bayesian regularization-back propagation neural network using data-driven intrusion detection system in Internet of Things
A. K., Sleeman D.H., Sayyad Jilani, et al.
Smart Science (2024), pp. 1-15
Closed Access
A. K., Sleeman D.H., Sayyad Jilani, et al.
Smart Science (2024), pp. 1-15
Closed Access
An Enhancement Multi-Objective Resource Allocation Algorithm in Fog Environment
Nirmeen A. El-Bahnasawy, Amal El-Nattat, Ayman El‐Sayed, et al.
(2023), pp. 1-6
Closed Access
Nirmeen A. El-Bahnasawy, Amal El-Nattat, Ayman El‐Sayed, et al.
(2023), pp. 1-6
Closed Access