OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

An Ensemble Tree-Based Model for Intrusion Detection in Industrial Internet of Things Networks
Joseph Bamidele Awotunde, Sakinat Oluwabukonla Folorunso, Agbotiname Lucky Imoize, et al.
Applied Sciences (2023) Vol. 13, Iss. 4, pp. 2479-2479
Open Access | Times Cited: 48

Showing 1-25 of 48 citing articles:

A stacking ensemble of deep learning models for IoT intrusion detection
Riccardo Lazzarini, Huaglory Tianfield, Vassilis Charissis
Knowledge-Based Systems (2023) Vol. 279, pp. 110941-110941
Open Access | Times Cited: 76

Review of artificial intelligence for enhancing intrusion detection in the internet of things
Mohamed Saied, Shawkat K. Guirguis, Magda M. Madbouly
Engineering Applications of Artificial Intelligence (2023) Vol. 127, pp. 107231-107231
Closed Access | Times Cited: 53

Techniques for predicting dark web events focused on the delivery of illicit products and ordered crime
Romil Rawat, Olukayode Oki, K. Sakthidasan Sankaran, et al.
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2023) Vol. 13, Iss. 5, pp. 5354-5354
Open Access | Times Cited: 44

Energy Efficient Load-Balancing Mechanism in Integrated IoT–Fog–Cloud Environment
Meenu Vijarania, Swati Gupta, Akshat Agrawal, et al.
Electronics (2023) Vol. 12, Iss. 11, pp. 2543-2543
Open Access | Times Cited: 24

A Genetic Algorithm- and t-Test-Based System for DDoS Attack Detection in IoT Networks
Makhduma F. Saiyed, Irfan Al‐Anbagi
IEEE Access (2024) Vol. 12, pp. 25623-25641
Open Access | Times Cited: 10

Breaking Alert Fatigue: AI-Assisted SIEM Framework for Effective Incident Response
Tao Ban, Takeshi Takahashi, Samuel Ndichu, et al.
Applied Sciences (2023) Vol. 13, Iss. 11, pp. 6610-6610
Open Access | Times Cited: 21

Dragon_Pi: IoT Side-Channel Power Data Intrusion Detection Dataset and Unsupervised Convolutional Autoencoder for Intrusion Detection
Dominic Lightbody, Duc‐Minh Ngo, Andriy Temko, et al.
Future Internet (2024) Vol. 16, Iss. 3, pp. 88-88
Open Access | Times Cited: 7

Ontology-Based Layered Rule-Based Network Intrusion Detection System for Cybercrimes Detection
Femi Emmanuel Ayo, Joseph Bamidele Awotunde, Lukman Adebayo Ogundele, et al.
Knowledge and Information Systems (2024) Vol. 66, Iss. 6, pp. 3355-3392
Closed Access | Times Cited: 5

Deep Learning-Driven Defense Strategies for Mitigating DDoS Attacks in Cloud Computing Environments
Doaa Mohsin Abd Ali Afraji, Jaime Lloret, Lourdes Peñalver
Cyber Security and Applications (2025), pp. 100085-100085
Open Access

WFE-Tab: Overcoming limitations of TabPFN in IIoT-MEC environments with a weighted fusion ensemble-TabPFN model for improved IDS performance
Sergio Ruiz-Villafranca, José Roldán-Gómez, Javier Carrillo-Mondéjar, et al.
Future Generation Computer Systems (2025), pp. 107707-107707
Closed Access

CluSHAPify: Synergizing Clustering and SHAP Value Interpretations for Improved Reconnaissance Attack Detection in IIoT Networks
Saxena Arpna, Sangeeta Mittal
International Journal of Performability Engineering (2025) Vol. 21, Iss. 1, pp. 36-36
Closed Access

Fuzzy-Rule Based Optimized Hybrid Deep Learning Model for Network Intrusion Detection in SDN Enabled IoT Network
T Johnpeter, K. Sakthisudhan
Computers & Security (2025), pp. 104372-104372
Closed Access

HYRIDE: HYbrid and Robust Intrusion DEtection Approach for Enhancing Cybersecurity in Industry 4.0
Shubham Srivastav, Amit K. Shukla, Sandeep Kumar, et al.
Internet of Things (2025), pp. 101492-101492
Open Access

Intrusion Detection Framework for Internet of Things with Rule Induction for Model Explanation
Kayode S. Adewole, Andreas Jacobsson, Paul Davidsson
Sensors (2025) Vol. 25, Iss. 6, pp. 1845-1845
Open Access

A Review of Machine Learning and Transfer Learning Strategies for Intrusion Detection Systems in 5G and Beyond
Kinzah Noor, Agbotiname Lucky Imoize, Chun‐Ta Li, et al.
Mathematics (2025) Vol. 13, Iss. 7, pp. 1088-1088
Open Access

Enhancing Retail Transactions: A Data-Driven Recommendation Using Modified RFM Analysis and Association Rules Mining
Angela Hsiang-Ling Chen, Sebastian Gunawan
Applied Sciences (2023) Vol. 13, Iss. 18, pp. 10057-10057
Open Access | Times Cited: 10

A TabPFN-based intrusion detection system for the industrial internet of things
Sergio Ruiz-Villafranca, José Roldán-Gómez, Juan Manuel Castelo Gómez, et al.
The Journal of Supercomputing (2024) Vol. 80, Iss. 14, pp. 20080-20117
Open Access | Times Cited: 3

AI-Based Intrusion Detection for a Secure Internet of Things (IoT)
Reham Aljohani, Anas Bushnag, Ali Alessa
Journal of Network and Systems Management (2024) Vol. 32, Iss. 3
Closed Access | Times Cited: 3

An Intelligent Attack Detection Framework for the Internet of Autonomous Vehicles with Imbalanced Car Hacking Data
Samah Alshathri, Amged Sayed, Ezz El‐Din Hemdan
World Electric Vehicle Journal (2024) Vol. 15, Iss. 8, pp. 356-356
Open Access | Times Cited: 3

Attention-Driven Transfer Learning Model for Improved IoT Intrusion Detection
Salma Abdelhamid, Islam Hegazy, Mostafa Aref, et al.
Big Data and Cognitive Computing (2024) Vol. 8, Iss. 9, pp. 116-116
Open Access | Times Cited: 3

A new cloud-based cyber-attack detection architecture for hyper-automation process in industrial internet of things
Alireza Souri, Monire Norouzi, Yousef Alsenani
Cluster Computing (2023) Vol. 27, Iss. 3, pp. 3639-3655
Closed Access | Times Cited: 9

The development of a model for the threat detection system with the use of machine learning and neural network methods
Olga Ussatova, Aidana Zhumabekova, Vladislav Karyukin, et al.
International Journal of Innovative Research and Scientific Studies (2024) Vol. 7, Iss. 3, pp. 863-877
Open Access | Times Cited: 2

Enhancing trustworthiness among iot network nodes with ensemble deep learning-based cyber attack detection
D. Malathi, S. Razool Begum
Expert Systems with Applications (2024) Vol. 255, pp. 124528-124528
Closed Access | Times Cited: 2

Page 1 - Next Page

Scroll to top