
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Application of Machine Learning Algorithms for the Validation of a New CoAP-IoT Anomaly Detection Dataset
Laura Vigoya, Alberto Pardal, Diego Fernández, et al.
Applied Sciences (2023) Vol. 13, Iss. 7, pp. 4482-4482
Open Access | Times Cited: 13
Laura Vigoya, Alberto Pardal, Diego Fernández, et al.
Applied Sciences (2023) Vol. 13, Iss. 7, pp. 4482-4482
Open Access | Times Cited: 13
Showing 13 citing articles:
Machine Learning and Deep Learning Techniques for Internet of Things Network Anomaly Detection—Current Research Trends
Saida Hafsa Rafique, Amira Mahamat Abdallah, Nura Shifa Musa, et al.
Sensors (2024) Vol. 24, Iss. 6, pp. 1968-1968
Open Access | Times Cited: 17
Saida Hafsa Rafique, Amira Mahamat Abdallah, Nura Shifa Musa, et al.
Sensors (2024) Vol. 24, Iss. 6, pp. 1968-1968
Open Access | Times Cited: 17
A novel deep learning-based intrusion detection system for IoT DDoS security
Selman Hızal, Ünal Çavuşoğlu, Devrim Akgün
Internet of Things (2024) Vol. 28, pp. 101336-101336
Closed Access | Times Cited: 8
Selman Hızal, Ünal Çavuşoğlu, Devrim Akgün
Internet of Things (2024) Vol. 28, pp. 101336-101336
Closed Access | Times Cited: 8
Digital twin-driven prognostics and health management for industrial assets
Bin Xiao, Jingshu Zhong, Xiangyu Bao, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 7
Bin Xiao, Jingshu Zhong, Xiangyu Bao, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 7
Physical Layer Security for 6G: Towards Achieving Intelligent Native Security at Layer-1
Israt Ara, Brian Kelley
IEEE Access (2024) Vol. 12, pp. 82800-82824
Open Access | Times Cited: 5
Israt Ara, Brian Kelley
IEEE Access (2024) Vol. 12, pp. 82800-82824
Open Access | Times Cited: 5
Data Anomaly Detection in Wireless Sensor Network Using Principal Component Analysis and Decision Tree
Rahul Mishra, S. Jha
Communications in computer and information science (2025), pp. 114-124
Closed Access
Rahul Mishra, S. Jha
Communications in computer and information science (2025), pp. 114-124
Closed Access
Novel intrusion detection system based on a downsized kernel method for cybersecurity in smart agriculture
Kamel Zidi, Khaoula Ben Abdellafou, Ahamed Aljuhani, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 133, pp. 108579-108579
Closed Access | Times Cited: 3
Kamel Zidi, Khaoula Ben Abdellafou, Ahamed Aljuhani, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 133, pp. 108579-108579
Closed Access | Times Cited: 3
Modern NetFlow network dataset with labeled attacks and detection methods
Mikołaj Komisarek, Marek Pawlicki, Tomi Simic, et al.
Proceedings of the 17th International Conference on Availability, Reliability and Security (2023), pp. 1-8
Closed Access | Times Cited: 3
Mikołaj Komisarek, Marek Pawlicki, Tomi Simic, et al.
Proceedings of the 17th International Conference on Availability, Reliability and Security (2023), pp. 1-8
Closed Access | Times Cited: 3
FLOLSTM: Fuzzy logic‐driven optimized LSTM for improved malicious traffic detection in hypervisor environments
Anumukonda Naga Seshu Kumar, Rajesh Kumar Yadav, N. S. Raghava
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 20
Closed Access
Anumukonda Naga Seshu Kumar, Rajesh Kumar Yadav, N. S. Raghava
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 20
Closed Access
Integrating CNN-LSTM Networks with Statistical Filtering Techniques for Intelligent IoT Intrusion Detection
Fatemeh Imani, Masoud Kargar, Alireza Assadzadeh, et al.
(2024), pp. 189-195
Closed Access
Fatemeh Imani, Masoud Kargar, Alireza Assadzadeh, et al.
(2024), pp. 189-195
Closed Access
Influence of autoencoder latent space on classifying IoT CoAP attacks
María Teresa García-Ordás, José Aveleira‐Mata, Isaías García-Rodrígez, et al.
Logic Journal of IGPL (2024)
Closed Access
María Teresa García-Ordás, José Aveleira‐Mata, Isaías García-Rodrígez, et al.
Logic Journal of IGPL (2024)
Closed Access
Utilizing Machine Learning with Unique Pentaplet Data Structure to Enhance Data Integrity
Abdulwahab Alazeb
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 77, Iss. 3, pp. 2995-3014
Open Access | Times Cited: 1
Abdulwahab Alazeb
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 77, Iss. 3, pp. 2995-3014
Open Access | Times Cited: 1
Special Issue on Data Analysis and Artificial Intelligence for IoT
Bhanu Shrestha, Seongsoo Cho, Changho Seo
Applied Sciences (2023) Vol. 13, Iss. 11, pp. 6401-6401
Open Access
Bhanu Shrestha, Seongsoo Cho, Changho Seo
Applied Sciences (2023) Vol. 13, Iss. 11, pp. 6401-6401
Open Access
A novel and effective method based deep learning model for detecting non-technical electricity losses
Israa Mohammed Ridha Baldawi, Timur İNAN
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2023) Vol. 14, Iss. 4, pp. 2464-2464
Open Access
Israa Mohammed Ridha Baldawi, Timur İNAN
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2023) Vol. 14, Iss. 4, pp. 2464-2464
Open Access