
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Hybrid Genetic Algorithm-Based Random Forest Model for Intrusion Detection Approach in Internet of Medical Things
Monire Norouzi, Zeynep Aydın, Özgür Can Turna, et al.
Applied Sciences (2023) Vol. 13, Iss. 20, pp. 11145-11145
Open Access | Times Cited: 10
Monire Norouzi, Zeynep Aydın, Özgür Can Turna, et al.
Applied Sciences (2023) Vol. 13, Iss. 20, pp. 11145-11145
Open Access | Times Cited: 10
Showing 10 citing articles:
Optimization Scheme of Collaborative Intrusion Detection System Based on Blockchain Technology
Jiachen Huang, Yuling Chen, Xuewei Wang, et al.
Electronics (2025) Vol. 14, Iss. 2, pp. 261-261
Open Access
Jiachen Huang, Yuling Chen, Xuewei Wang, et al.
Electronics (2025) Vol. 14, Iss. 2, pp. 261-261
Open Access
Enhancing Intrusion Detection Systems With Advanced Machine Learning Techniques: An Ensemble and Explainable Artificial Intelligence (AI ) Approach
Mohammed Naif Alatawi
Security and Privacy (2025) Vol. 8, Iss. 1
Closed Access
Mohammed Naif Alatawi
Security and Privacy (2025) Vol. 8, Iss. 1
Closed Access
A genetic-based random ensemble forest learning for cloud-based automotive data transformation in internet of vehicle
Suja N Qureshi, Alireza Souri, Nihat İnanç, et al.
Alexandria Engineering Journal (2025) Vol. 120, pp. 74-86
Closed Access
Suja N Qureshi, Alireza Souri, Nihat İnanç, et al.
Alexandria Engineering Journal (2025) Vol. 120, pp. 74-86
Closed Access
An interpretable dimensional reduction technique with an explainable model for detecting attacks in Internet of Medical Things devices
Swati Lipsa, Ranjan Kumar Dash, Nikola Ivković
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Swati Lipsa, Ranjan Kumar Dash, Nikola Ivković
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
A Hybrid Machine Learning‐Based Data‐Centric Cybersecurity Detection in the 5G ‐Enabled IoT
Lingcheng Zeng, Yunzhu An, Heng Zhou, et al.
Security and Privacy (2024)
Open Access | Times Cited: 1
Lingcheng Zeng, Yunzhu An, Heng Zhou, et al.
Security and Privacy (2024)
Open Access | Times Cited: 1
A systematic survey on security and privacy issues of medicine supply chain: Taxonomy, framework, and research challenges
Jigna J. Hathaliya, Sudeep Tanwar
Security and Privacy (2024) Vol. 7, Iss. 4
Closed Access | Times Cited: 1
Jigna J. Hathaliya, Sudeep Tanwar
Security and Privacy (2024) Vol. 7, Iss. 4
Closed Access | Times Cited: 1
A cloud‐based hybrid intrusion detection framework using XGBoost and ADASYN‐Augmented random forest for IoMT
Arash Salehpour, Monire Norouzi, Mohammad Ali Balafar, et al.
IET Communications (2024)
Open Access | Times Cited: 1
Arash Salehpour, Monire Norouzi, Mohammad Ali Balafar, et al.
IET Communications (2024)
Open Access | Times Cited: 1
Ensuring patient safety in IoMT: A systematic literature review of behavior-based intrusion detection systems
Jordi Doménech, Isabel V. Martin-Faus, Saber Mhiri, et al.
Internet of Things (2024) Vol. 28, pp. 101420-101420
Open Access
Jordi Doménech, Isabel V. Martin-Faus, Saber Mhiri, et al.
Internet of Things (2024) Vol. 28, pp. 101420-101420
Open Access
Enhanced IoMT security framework using group teaching optimized auto-encoder for intrusion detection
Archana Manoharan, T. Manigandan
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
Archana Manoharan, T. Manigandan
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
Automated Detection of Cyber Attacks in Healthcare Systems: A Novel Scheme with Advanced Feature Extraction and Classification
Ahmad Nasayreh, Haris M. Khalid, Hamza K. Alkhateeb, et al.
Computers & Security (2024), pp. 104288-104288
Closed Access
Ahmad Nasayreh, Haris M. Khalid, Hamza K. Alkhateeb, et al.
Computers & Security (2024), pp. 104288-104288
Closed Access