OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Threat Analysis and Distributed Denial of Service (DDoS) Attack Recognition in the Internet of Things (IoT)
Mohammed Hasan Ali, Mustafa Musa Jaber, Sura Khalil, et al.
Electronics (2022) Vol. 11, Iss. 3, pp. 494-494
Open Access | Times Cited: 75

Showing 1-25 of 75 citing articles:

Deep Learning for Intrusion Detection and Security of Internet of Things (IoT): Current Analysis, Challenges, and Possible Solutions
Amjad Rehman, Muhammad Kashif, Rutvij H. Jhaveri, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-13
Open Access | Times Cited: 92

Wireless Body Area Network (WBAN): A Survey on Architecture, Technologies, Energy Consumption, and Security Challenges
Mohammad Yaghoubi, Khandakar Ahmed, Yuan Miao
Journal of Sensor and Actuator Networks (2022) Vol. 11, Iss. 4, pp. 67-67
Open Access | Times Cited: 67

Intrusion detection approach for cloud and IoT environments using deep learning and Capuchin Search Algorithm
Mohamed Abd Elaziz, Mohammed A. A. Al‐qaness, Abdelghani Dahou, et al.
Advances in Engineering Software (2023) Vol. 176, pp. 103402-103402
Closed Access | Times Cited: 57

Machine-Learning-Based IoT–Edge Computing Healthcare Solutions
Abdulrahman K. Alnaim, Ahmed M. Alwakeel
Electronics (2023) Vol. 12, Iss. 4, pp. 1027-1027
Open Access | Times Cited: 55

Intrusion Detection in Healthcare 4.0 Internet of Things Systems via Metaheuristics Optimized Machine Learning
Nikola Savanović, Ana Toskovic, Aleksandar Petrović, et al.
Sustainability (2023) Vol. 15, Iss. 16, pp. 12563-12563
Open Access | Times Cited: 53

AI-Driven Cloud Security: Examining the Impact of User Behavior Analysis on Threat Detection
Samuel Oladiipo Olabanji, Yewande Alice Marquis, Chinasa Susan Adigwe, et al.
Asian Journal of Research in Computer Science (2024) Vol. 17, Iss. 3, pp. 57-74
Open Access | Times Cited: 45

Collaborative threat intelligence: Enhancing IoT security through blockchain and machine learning integration
Ahsan Nazir, Jingsha He, Nafei Zhu, et al.
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 2, pp. 101939-101939
Open Access | Times Cited: 16

Signature-based intrusion detection using machine learning and deep learning approaches empowered with fuzzy clustering
Usama Ahmed, Mohammad Nazir, Amna Sarwar, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access | Times Cited: 2

Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions
Esra Altulaihan, Mohammed Amin Almaiah, Ahmed Aljughaiman
Electronics (2022) Vol. 11, Iss. 20, pp. 3330-3330
Open Access | Times Cited: 52

DDoS attacks detection using machine learning and deep learning techniques: analysis and comparison
Mahmood A. Al-Shareeda, Selvakumar Manickam, Murtaja Ali Saare
Bulletin of Electrical Engineering and Informatics (2022) Vol. 12, Iss. 2, pp. 930-939
Open Access | Times Cited: 49

Deep learning in distributed denial-of-service attacks detection method for Internet of Things networks
Firas Mohammed Aswad, Ali Mohammed Saleh Ahmed, Nafea Ali Majeed Alhammadi, et al.
Journal of Intelligent Systems (2023) Vol. 32, Iss. 1
Open Access | Times Cited: 27

SDN and application layer DDoS attacks detection in IoT devices by attention‐based Bi‐LSTM‐CNN
Ishaani Priyadarshini, Pinaki Mohanty, Ahmed Alkhayyat, et al.
Transactions on Emerging Telecommunications Technologies (2023) Vol. 34, Iss. 11
Closed Access | Times Cited: 24

GEMLIDS-MIOT: A Green Effective Machine Learning Intrusion Detection System based on Federated Learning for Medical IoT network security hardening
Iacovos Ioannou, Prabagarane Nagaradjane, Pelin Angın, et al.
Computer Communications (2024) Vol. 218, pp. 209-239
Closed Access | Times Cited: 7

Automatic decision tree-based NIDPS ruleset generation for DoS/DDoS attacks
Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, et al.
Journal of Information Security and Applications (2024) Vol. 82, pp. 103736-103736
Open Access | Times Cited: 7

Light Weighted CNN Model to Detect DDoS Attack over Distributed Scenario
Harish Kumar, Yassine Aoudni, Geovanny Genaro Reiván Ortiz, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-10
Open Access | Times Cited: 32

Anomaly detection in Internet of medical Things with Blockchain from the perspective of deep neural network
Jun Wang, Hanlei Jin, Junxiao Chen, et al.
Information Sciences (2022) Vol. 617, pp. 133-149
Closed Access | Times Cited: 29

Machine Learning-Based Adaptive Synthetic Sampling Technique for Intrusion Detection
Mohammed Zakariah, Salman A. AlQahtani, Mabrook Al‐Rakhami
Applied Sciences (2023) Vol. 13, Iss. 11, pp. 6504-6504
Open Access | Times Cited: 18

An improved long short term memory network for intrusion detection
Asmaa Ahmed Awad, Ahmed F. Ali, Tarek Gaber
PLoS ONE (2023) Vol. 18, Iss. 8, pp. e0284795-e0284795
Open Access | Times Cited: 15

Model Design of Intrusion Detection System on Web Server Using Machine Learning Based
Agus Tedyyana, Osman Ghazali, Onno W. Purbo
(2024)
Open Access | Times Cited: 6

An intelligent forecasting system in Internet of Agriculture Things sensor network
Rashmita Sahu, Priyanka Tripathi
Ad Hoc Networks (2025), pp. 103752-103752
Closed Access

An Overview of the Security Challenges in IoT Environment
Souhayla Dargaoui, Mourade Azrour, Ahmed El Allaoui, et al.
Environmental science and engineering (2023), pp. 151-160
Closed Access | Times Cited: 14

Improve the Security of Industrial Control System: A Fine-Grained Classification Method for DoS Attacks on Modbus/TCP
Hao Zhang, Yuandong Min, Sannyuya Liu, et al.
Mobile Networks and Applications (2023) Vol. 28, Iss. 2, pp. 839-852
Closed Access | Times Cited: 13

Reducing the False Negative Rate in Deep Learning Based Network Intrusion Detection Systems
Jovana Mijalkovic, Angelo Spognardi
Algorithms (2022) Vol. 15, Iss. 8, pp. 258-258
Open Access | Times Cited: 19

Page 1 - Next Page

Scroll to top