OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

An Intrusion Detection System for Drone Swarming Utilizing Timed Probabilistic Automata
S. Venkatraman, V. Maria Anu
Drones (2023) Vol. 7, Iss. 4, pp. 248-248
Open Access | Times Cited: 24

Showing 24 citing articles:

State-of-the-Art and Future Research Challenges in UAV Swarms
Sadaf Javed, Ali Hassan, Rizwan Ahmad, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 11, pp. 19023-19045
Closed Access | Times Cited: 29

Distributed Machine Learning for UAV Swarms: Computing, Sensing, and Semantics
Yahao Ding, Zhaohui Yang, Quoc‐Viet Pham, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 5, pp. 7447-7473
Open Access | Times Cited: 24

Data Security and Privacy Concerns in Drone Operations
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 236-290
Closed Access | Times Cited: 13

Increasing Operational Resiliency of UAV Swarms: An Agent-Focused Search and Rescue Framework
Abhishek Phadke, F. Antonio Medrano
Aerospace Research Communications (2024) Vol. 1
Open Access | Times Cited: 10

Future Trends and Emerging Threats in Drone Cybersecurity
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 148-195
Closed Access | Times Cited: 7

Designing UAV Swarm Experiments: A Simulator Selection and Experiment Design Process
Abhishek Phadke, F. Antonio Medrano, Chandra N. Sekharan, et al.
Sensors (2023) Vol. 23, Iss. 17, pp. 7359-7359
Open Access | Times Cited: 18

Enhanced Network Metric Prediction for Machine Learning-Based Cyber Security of a Software-Defined UAV Relay Network
Dennis Agnew, Álvaro Del Águila, Janise McNair
IEEE Access (2024) Vol. 12, pp. 54202-54219
Open Access | Times Cited: 6

A PUF-Based Secure Authentication and Key Agreement Scheme for the Internet of Drones
Jihye Choi, Seunghwan Son, Deokkyu Kwon, et al.
Sensors (2025) Vol. 25, Iss. 3, pp. 982-982
Open Access

Blockchain Application in UAV Swarm Security
Faisal Rehman, Junaid Akbar, Mubashir Mehmood
Apress eBooks (2025), pp. 333-360
Closed Access

Machine learning approaches to intrusion detection in unmanned aerial vehicles (UAVs)
Raghad A. AL-Syouf, Raed Bani-Hani, Omar Y. Al-Jarrah
Neural Computing and Applications (2024) Vol. 36, Iss. 29, pp. 18009-18041
Closed Access | Times Cited: 2

Improving intrusion detection using LSTM-RNN to protect drones’ networks
Mohamed Gamal, Mohamed Elhamahmy, Sanaa Taha, et al.
Egyptian Informatics Journal (2024) Vol. 27, pp. 100501-100501
Open Access | Times Cited: 1

Improving Intrusion Detection in UAV Communication Using an LSTM-SMOTE Classification Method
Abdulrahman M. Abdulghani, Mokhles M. Abdulghani, Wilbur L. Walters, et al.
Journal of Cyber Security (2022) Vol. 4, Iss. 4, pp. 287-298
Open Access | Times Cited: 5

Detecting Unbalanced Network Traffic Intrusions With Deep Learning
S. Pavithra, K. Venkata Vikas
IEEE Access (2024) Vol. 12, pp. 74096-74107
Open Access

Radial Basis Function Neural Networks (RBFNN) for Secure Intrusion Detection in the Internet of Drones (IoD)
Nek Muhammad, Abdul Hakeem, Israr Ahmed, et al.
Proceedings of the Bulgarian Academy of Sciences (2024) Vol. 77, Iss. 8
Open Access

CatBoost-based Intrusion Detection Method for the Physical Layer of Smart Agriculture
Zizhong Wei, Fanggang Ning, Kai Jiang, et al.
ITM Web of Conferences (2024) Vol. 60, pp. 00009-00009
Open Access

IDS-DEEP: a strategy for selecting the best IDS for Drones with heterogeneous EmbEdded Platforms
Louis Morge-Rollet, Camélia Slimani, Laurent Lemarchand, et al.
(2024), pp. 138-147
Closed Access

Exploring the Benefits of Reinforcement Learning for Autonomous Drone Navigation and Control
Ahshanul Haque, Md Naseef-Ur-Rahman Chowdhury
International Journal of Advanced Networking and Applications (2023) Vol. 15, Iss. 01, pp. 5808-5814
Open Access | Times Cited: 1

Optimal Rescue Sequences in Disastrous Incidents
Rabeaeh Kiaghadi
Lecture notes in computer science (2023), pp. 534-539
Closed Access | Times Cited: 1

Assessing Lifespan of Lithium-Ion Rechargeable Batteries through Hybrid CNN-LSTM-DNN Method
S. Prince Mary, M. D. Anto Praveena, J. Albert Mayan, et al.
(2023), pp. 325-329
Closed Access | Times Cited: 1

Flying Watchdog-Based Guard Patrol with Check Point Data Verification
Endrowednes Kuantama, Avishkar Seth, Alice James, et al.
Future Internet (2023) Vol. 15, Iss. 10, pp. 340-340
Open Access

Page 1

Scroll to top