
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Anomaly Detection Using Deep Neural Network for IoT Architecture
Zeeshan Ahmad, Adnan Shahid Khan, Kashif Nisar, et al.
Applied Sciences (2021) Vol. 11, Iss. 15, pp. 7050-7050
Open Access | Times Cited: 93
Zeeshan Ahmad, Adnan Shahid Khan, Kashif Nisar, et al.
Applied Sciences (2021) Vol. 11, Iss. 15, pp. 7050-7050
Open Access | Times Cited: 93
Showing 1-25 of 93 citing articles:
Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review
Mujaheed Abdullahi, Yahia Baashar, Hitham Alhussian, et al.
Electronics (2022) Vol. 11, Iss. 2, pp. 198-198
Open Access | Times Cited: 213
Mujaheed Abdullahi, Yahia Baashar, Hitham Alhussian, et al.
Electronics (2022) Vol. 11, Iss. 2, pp. 198-198
Open Access | Times Cited: 213
Federated deep learning for anomaly detection in the internet of things
Xiaofeng Wang, Yonghong Wang, Zahra Javaheri, et al.
Computers & Electrical Engineering (2023) Vol. 108, pp. 108651-108651
Closed Access | Times Cited: 49
Xiaofeng Wang, Yonghong Wang, Zahra Javaheri, et al.
Computers & Electrical Engineering (2023) Vol. 108, pp. 108651-108651
Closed Access | Times Cited: 49
A comparative analysis of various machine learning methods for anomaly detection in cyber attacks on IoT networks
Muhammad Muhammad Inuwa, Resul Daş
Internet of Things (2024) Vol. 26, pp. 101162-101162
Closed Access | Times Cited: 44
Muhammad Muhammad Inuwa, Resul Daş
Internet of Things (2024) Vol. 26, pp. 101162-101162
Closed Access | Times Cited: 44
CNN-CNN: Dual Convolutional Neural Network Approach for Feature Selection and Attack Detection on Internet of Things Networks
Basim Ahmad Alabsi, Mohammed Anbar, Shaza Dawood Ahmed Rihan
Sensors (2023) Vol. 23, Iss. 14, pp. 6507-6507
Open Access | Times Cited: 41
Basim Ahmad Alabsi, Mohammed Anbar, Shaza Dawood Ahmed Rihan
Sensors (2023) Vol. 23, Iss. 14, pp. 6507-6507
Open Access | Times Cited: 41
Financial fraud detection using quantum graph neural networks
Nouhaila Innan, Abhishek Sawaika, Ashim Dhor, et al.
Quantum Machine Intelligence (2024) Vol. 6, Iss. 1
Closed Access | Times Cited: 21
Nouhaila Innan, Abhishek Sawaika, Ashim Dhor, et al.
Quantum Machine Intelligence (2024) Vol. 6, Iss. 1
Closed Access | Times Cited: 21
Overview of Anomaly Detection Techniques across Different Domains: A Systematic Review
Venkatraman Umbalacheri Ramasamy
International Journal of Computational and Experimental Science and Engineering (2024) Vol. 10, Iss. 4
Open Access | Times Cited: 17
Venkatraman Umbalacheri Ramasamy
International Journal of Computational and Experimental Science and Engineering (2024) Vol. 10, Iss. 4
Open Access | Times Cited: 17
Blockchain Technology and Artificial Intelligence Based Decentralized Access Control Model to Enable Secure Interoperability for Healthcare
Sumit Kumar Rana, Sanjeev Rana, Kashif Nisar, et al.
Sustainability (2022) Vol. 14, Iss. 15, pp. 9471-9471
Open Access | Times Cited: 48
Sumit Kumar Rana, Sanjeev Rana, Kashif Nisar, et al.
Sustainability (2022) Vol. 14, Iss. 15, pp. 9471-9471
Open Access | Times Cited: 48
Network intrusion detection based on the temporal convolutional model
Ivandro Ortet Lopes, Deqing Zou, Ihsan H. Abdulqadder, et al.
Computers & Security (2023) Vol. 135, pp. 103465-103465
Closed Access | Times Cited: 24
Ivandro Ortet Lopes, Deqing Zou, Ihsan H. Abdulqadder, et al.
Computers & Security (2023) Vol. 135, pp. 103465-103465
Closed Access | Times Cited: 24
A Deep Learning Method for Lightweight and Cross-Device IoT Botnet Detection
Marta Catillo, Antonio Pecchia, Umberto Villano
Applied Sciences (2023) Vol. 13, Iss. 2, pp. 837-837
Open Access | Times Cited: 23
Marta Catillo, Antonio Pecchia, Umberto Villano
Applied Sciences (2023) Vol. 13, Iss. 2, pp. 837-837
Open Access | Times Cited: 23
Improvement of Wireless Sensor Network Lifetime via Intelligent Clustering Under Uncertainty
Laxminarayan Sahoo, Supriyan Sen, Kalishankar Tiwary, et al.
IEEE Access (2024) Vol. 12, pp. 25018-25033
Open Access | Times Cited: 7
Laxminarayan Sahoo, Supriyan Sen, Kalishankar Tiwary, et al.
IEEE Access (2024) Vol. 12, pp. 25018-25033
Open Access | Times Cited: 7
IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques
Štefan Balogh, Ondrej Gallo, Roderik Ploszek, et al.
Electronics (2021) Vol. 10, Iss. 21, pp. 2647-2647
Open Access | Times Cited: 52
Štefan Balogh, Ondrej Gallo, Roderik Ploszek, et al.
Electronics (2021) Vol. 10, Iss. 21, pp. 2647-2647
Open Access | Times Cited: 52
Deep learning algorithms for intrusion detection systems in internet of things using CIC-IDS 2017 dataset
Jinsi Jose, Deepa Jose
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2022) Vol. 13, Iss. 1, pp. 1134-1134
Open Access | Times Cited: 36
Jinsi Jose, Deepa Jose
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2022) Vol. 13, Iss. 1, pp. 1134-1134
Open Access | Times Cited: 36
Combining Unsupervised Approaches for Near Real-Time Network Traffic Anomaly Detection
Francesco Carrera, Vincenzo Dentamaro, Stefano Galantucci, et al.
Applied Sciences (2022) Vol. 12, Iss. 3, pp. 1759-1759
Open Access | Times Cited: 28
Francesco Carrera, Vincenzo Dentamaro, Stefano Galantucci, et al.
Applied Sciences (2022) Vol. 12, Iss. 3, pp. 1759-1759
Open Access | Times Cited: 28
Enhanced Cyber Attack Detection Process for Internet of Health Things (IoHT) Devices Using Deep Neural Network
Kedalu Poornachary Vijayakumar, K. Pradeep, A. Balasundaram, et al.
Processes (2023) Vol. 11, Iss. 4, pp. 1072-1072
Open Access | Times Cited: 20
Kedalu Poornachary Vijayakumar, K. Pradeep, A. Balasundaram, et al.
Processes (2023) Vol. 11, Iss. 4, pp. 1072-1072
Open Access | Times Cited: 20
Approach for Detecting Attacks on IoT Networks Based on Ensemble Feature Selection and Deep Learning Models
Shaza Dawood Ahmed Rihan, Mohammed Anbar, Basim Ahmad Alabsi
Sensors (2023) Vol. 23, Iss. 17, pp. 7342-7342
Open Access | Times Cited: 16
Shaza Dawood Ahmed Rihan, Mohammed Anbar, Basim Ahmad Alabsi
Sensors (2023) Vol. 23, Iss. 17, pp. 7342-7342
Open Access | Times Cited: 16
Coarse and fine feature selection for Network Intrusion Detection Systems (IDS ) in IoT networks
Mohammed Sayeeduddin Habeeb, Tummala Ranga Babu
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 4
Closed Access | Times Cited: 5
Mohammed Sayeeduddin Habeeb, Tummala Ranga Babu
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 4
Closed Access | Times Cited: 5
Deep Learning-driven Methods for Network-based Intrusion Detection Systems: A Systematic Review
Ramya Chinnasamy, Malliga Subramanian, V E Sathishkumar, et al.
ICT Express (2025)
Open Access
Ramya Chinnasamy, Malliga Subramanian, V E Sathishkumar, et al.
ICT Express (2025)
Open Access
Can Machine Learning Enhance Intrusion Detection to Safeguard Smart City Networks from Multi-Step Cyberattacks?
Jowaria Khan, Rana Elfakharany, Mohamed Saleem Haja Nazmudeen, et al.
Smart Cities (2025) Vol. 8, Iss. 1, pp. 13-13
Open Access
Jowaria Khan, Rana Elfakharany, Mohamed Saleem Haja Nazmudeen, et al.
Smart Cities (2025) Vol. 8, Iss. 1, pp. 13-13
Open Access
Review of filtering based feature selection for Botnet detection in the Internet of Things
Mohamed Saied, Shawkat K. Guirguis, Magda M. Madbouly
Artificial Intelligence Review (2025) Vol. 58, Iss. 4
Open Access
Mohamed Saied, Shawkat K. Guirguis, Magda M. Madbouly
Artificial Intelligence Review (2025) Vol. 58, Iss. 4
Open Access
Ensemble Feature Engineering and Deep Learning for Botnet Attacks Detection in the Internet of Things
Mir Aman Sheheryar, Sparsh Sharma
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 3
Closed Access
Mir Aman Sheheryar, Sparsh Sharma
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 3
Closed Access
Enhancing video surveillance for crime detection using anomaly detection techniques
Eerenti Chandu, K.V. Pradeep Kumar, Kamal Kumar, et al.
AIP conference proceedings (2025) Vol. 3175, pp. 020070-020070
Closed Access
Eerenti Chandu, K.V. Pradeep Kumar, Kamal Kumar, et al.
AIP conference proceedings (2025) Vol. 3175, pp. 020070-020070
Closed Access
Intrusion Detection Framework for Internet of Things with Rule Induction for Model Explanation
Kayode S. Adewole, Andreas Jacobsson, Paul Davidsson
Sensors (2025) Vol. 25, Iss. 6, pp. 1845-1845
Open Access
Kayode S. Adewole, Andreas Jacobsson, Paul Davidsson
Sensors (2025) Vol. 25, Iss. 6, pp. 1845-1845
Open Access
Network intrusion detection system: A survey on artificial intelligence‐based techniques
Mohammed Sayeeduddin Habeeb, Tummala Ranga Babu
Expert Systems (2022) Vol. 39, Iss. 9
Closed Access | Times Cited: 22
Mohammed Sayeeduddin Habeeb, Tummala Ranga Babu
Expert Systems (2022) Vol. 39, Iss. 9
Closed Access | Times Cited: 22
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
Yasir Ali, Habib Ullah Khan, Muhammad Khalid
Journal Of Big Data (2023) Vol. 10, Iss. 1
Open Access | Times Cited: 12
Yasir Ali, Habib Ullah Khan, Muhammad Khalid
Journal Of Big Data (2023) Vol. 10, Iss. 1
Open Access | Times Cited: 12
Iot traffic-based DDoS attacks detection mechanisms: A comprehensive review
Praveen Shukla, C. Rama Krishna, Nilesh Vishwasrao Patil
The Journal of Supercomputing (2023) Vol. 80, Iss. 7, pp. 9986-10043
Closed Access | Times Cited: 12
Praveen Shukla, C. Rama Krishna, Nilesh Vishwasrao Patil
The Journal of Supercomputing (2023) Vol. 80, Iss. 7, pp. 9986-10043
Closed Access | Times Cited: 12