OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

IoT Intrusion Detection Using Machine Learning with a Novel High Performing Feature Selection Method
Khalid Albulayhi, Qasem Abu Al‐Haija, Suliman A. Alsuhibany, et al.
Applied Sciences (2022) Vol. 12, Iss. 10, pp. 5015-5015
Open Access | Times Cited: 115

Showing 1-25 of 115 citing articles:

Anomaly Detection IDS for Detecting DoS Attacks in IoT Networks Based on Machine Learning Algorithms
Esra Altulaihan, Mohammed Amin Almaiah, Ahmed Aljughaiman
Sensors (2024) Vol. 24, Iss. 2, pp. 713-713
Open Access | Times Cited: 33

A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis
Salman Muneer, Umer Farooq, Atifa Athar, et al.
Journal of Engineering (2024) Vol. 2024, pp. 1-16
Open Access | Times Cited: 22

Enhancing intrusion detection in IoT networks using machine learning-based feature selection and ensemble models
Ayoob Almotairi, Samer Atawneh, Osama A. Khashan, et al.
Systems Science & Control Engineering (2024) Vol. 12, Iss. 1
Open Access | Times Cited: 16

lIDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning
Chaimae Hazman, Azidine Guezzaz, Said Benkirane, et al.
Cluster Computing (2022) Vol. 26, Iss. 6, pp. 4069-4083
Closed Access | Times Cited: 62

DDoS Attack Prevention for Internet of Thing Devices Using Ethereum Blockchain Technology
Rahmeh Ibrahim, Qasem Abu Al‐Haija, Ashraf Ahmad
Sensors (2022) Vol. 22, Iss. 18, pp. 6806-6806
Open Access | Times Cited: 57

Machine Learning-Based Intrusion Detection System: An Experimental Comparison
Imran Hidayat, Muhammad Zulfiqar Ali, Arshad Ali
Journal of Computational and Cognitive Engineering (2022) Vol. 2, Iss. 2, pp. 88-97
Open Access | Times Cited: 53

Multi-objective PSO based feature selection for intrusion detection in IoT based wireless sensor networks
Shalini Subramani, M. Selvi
Optik (2022) Vol. 273, pp. 170419-170419
Closed Access | Times Cited: 40

A Deep Learning Method for Lightweight and Cross-Device IoT Botnet Detection
Marta Catillo, Antonio Pecchia, Umberto Villano
Applied Sciences (2023) Vol. 13, Iss. 2, pp. 837-837
Open Access | Times Cited: 23

Machine learning and deep learning for user authentication and authorization in cybersecurity: A state-of-the-art review
Zinniya Taffannum Pritee, Mehedi Hasan Anik, Saida Binta Alam, et al.
Computers & Security (2024) Vol. 140, pp. 103747-103747
Closed Access | Times Cited: 11

Effects of Feature Selection and Normalization on Network Intrusion Detection
Mubarak Albarka Umar, Zhanfang Chen, Khaled Shuaib, et al.
(2024)
Open Access | Times Cited: 8

Meta-IDS: Meta-Learning-Based Smart Intrusion Detection System for Internet of Medical Things (IoMT) Network
Umer Zukaib, Xiaohui Cui, Chengliang Zheng, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 13, pp. 23080-23095
Closed Access | Times Cited: 7

Effects of feature selection and normalization on network intrusion detection
Mubarak Albarka Umar, Zhanfang Chen, Khaled Shuaib, et al.
Data Science and Management (2024)
Open Access | Times Cited: 7

PDF Malware Detection Based on Optimizable Decision Trees
Qasem Abu Al‐Haija, Ammar Odeh, Hazem Qattous
Electronics (2022) Vol. 11, Iss. 19, pp. 3142-3142
Open Access | Times Cited: 33

An Intrusion Detection and Classification System for IoT Traffic with Improved Data Engineering
Abdulaziz A. Alsulami, Qasem Abu Al‐Haija, Ahmad Tayeb, et al.
Applied Sciences (2022) Vol. 12, Iss. 23, pp. 12336-12336
Open Access | Times Cited: 32

Cost-effective detection system of cross-site scripting attacks using hybrid learning approach
Qasem Abu Al‐Haija
Results in Engineering (2023) Vol. 19, pp. 101266-101266
Open Access | Times Cited: 18

Approach for Detecting Attacks on IoT Networks Based on Ensemble Feature Selection and Deep Learning Models
Shaza Dawood Ahmed Rihan, Mohammed Anbar, Basim Ahmad Alabsi
Sensors (2023) Vol. 23, Iss. 17, pp. 7342-7342
Open Access | Times Cited: 16

Feature efficiency in IoMT security: A comprehensive framework for threat detection with DNN and ML
Merve Pınar, A. Aktas, Eyüp Emre Ülkü
Computers in Biology and Medicine (2025) Vol. 186, pp. 109603-109603
Closed Access

Robust machine learning based Intrusion detection system using simple statistical techniques in feature selection
Sunil Kaushik, Akashdeep Bhardwaj, Ahmad Almogren, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access

Methodology to Improving IOT Network Security with Machine Learning Using the IOT Intrusion Dataset
Asma’a Bassam Alamareen, Malak Hamad Al-mashagbeh, Sara Abuasal, et al.
Studies in systems, decision and control (2025), pp. 913-924
Closed Access

An Extensive Review of Machine Learning and Deep Learning Techniques on Network Intrusion Detection for IoT
Supongmen Walling, Sibesh Lodh
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 2
Closed Access

Attack Detection in Smart Home IoT Networks: A Survey on Challenges, Methods and Analysis
M. Vinay Kuma Rreddy, Amit Lathigara, Muthangi Kantha Reddy
Broadband Communications, Networks and Systems (2025), pp. 310-319
Closed Access

Ensemble Feature Engineering and Deep Learning for Botnet Attacks Detection in the Internet of Things
Mir Aman Sheheryar, Sparsh Sharma
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 3
Closed Access

DeepSpoofNet: a framework for securing UAVs against GPS spoofing attacks
Aziz Ur Rehman Badar, Danish Mahmood, Adeel Iqbal, et al.
PeerJ Computer Science (2025) Vol. 11, pp. e2714-e2714
Open Access

Network Intrusion Detection Based on Feature Selection and Hybrid Metaheuristic Optimization
Reem Alkanhel, El-Sayed M. El-kenawy, Abdelaziz A. Abdelhamid, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 74, Iss. 2, pp. 2677-2693
Open Access | Times Cited: 26

SEHIDS: Self Evolving Host-Based Intrusion Detection System for IoT Networks
Mohammed Baz
Sensors (2022) Vol. 22, Iss. 17, pp. 6505-6505
Open Access | Times Cited: 25

Page 1 - Next Page

Scroll to top