
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
IMIDS: An Intelligent Intrusion Detection System against Cyber Threats in IoT
Kim-Hung Le, Minh-Huy Nguyen, Trong-Dat Tran, et al.
Electronics (2022) Vol. 11, Iss. 4, pp. 524-524
Open Access | Times Cited: 70
Kim-Hung Le, Minh-Huy Nguyen, Trong-Dat Tran, et al.
Electronics (2022) Vol. 11, Iss. 4, pp. 524-524
Open Access | Times Cited: 70
Showing 1-25 of 70 citing articles:
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Amit Kumar Balyan, Sachin Ahuja, Umesh Kumar Lilhore, et al.
Sensors (2022) Vol. 22, Iss. 16, pp. 5986-5986
Open Access | Times Cited: 187
Amit Kumar Balyan, Sachin Ahuja, Umesh Kumar Lilhore, et al.
Sensors (2022) Vol. 22, Iss. 16, pp. 5986-5986
Open Access | Times Cited: 187
Cyber Threats Detection in Smart Environments Using SDN-Enabled DNN-LSTM Hybrid Framework
Mohammad Al Razib, Danish Javeed, Muhammad Taimoor Khan, et al.
IEEE Access (2022) Vol. 10, pp. 53015-53026
Open Access | Times Cited: 80
Mohammad Al Razib, Danish Javeed, Muhammad Taimoor Khan, et al.
IEEE Access (2022) Vol. 10, pp. 53015-53026
Open Access | Times Cited: 80
Intrusion Detection System Using Feature Extraction with Machine Learning Algorithms in IoT
Dhiaa Musleh, Meera Alotaibi, Fahd Alhaidari, et al.
Journal of Sensor and Actuator Networks (2023) Vol. 12, Iss. 2, pp. 29-29
Open Access | Times Cited: 66
Dhiaa Musleh, Meera Alotaibi, Fahd Alhaidari, et al.
Journal of Sensor and Actuator Networks (2023) Vol. 12, Iss. 2, pp. 29-29
Open Access | Times Cited: 66
A new two-phase intrusion detection system with Naïve Bayes machine learning for data classification and elliptic envelop method for anomaly detection
Monika Vishwakarma, Nishtha Kesswani
Decision Analytics Journal (2023) Vol. 7, pp. 100233-100233
Open Access | Times Cited: 52
Monika Vishwakarma, Nishtha Kesswani
Decision Analytics Journal (2023) Vol. 7, pp. 100233-100233
Open Access | Times Cited: 52
Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions
Esra Altulaihan, Mohammed Amin Almaiah, Ahmed Aljughaiman
Electronics (2022) Vol. 11, Iss. 20, pp. 3330-3330
Open Access | Times Cited: 53
Esra Altulaihan, Mohammed Amin Almaiah, Ahmed Aljughaiman
Electronics (2022) Vol. 11, Iss. 20, pp. 3330-3330
Open Access | Times Cited: 53
A Survey of Internet of Things and Cyber-Physical Systems: Standards, Algorithms, Applications, Security, Challenges, and Future Directions
Kwok Tai Chui, Brij B. Gupta, Jiaqi Liu, et al.
Information (2023) Vol. 14, Iss. 7, pp. 388-388
Open Access | Times Cited: 22
Kwok Tai Chui, Brij B. Gupta, Jiaqi Liu, et al.
Information (2023) Vol. 14, Iss. 7, pp. 388-388
Open Access | Times Cited: 22
The good, the bad, and the algorithm: The impact of generative AI on cybersecurity
Luigi Coppolino, Salvatore D’Antonio, Giovanni Mazzeo, et al.
Neurocomputing (2025) Vol. 623, pp. 129406-129406
Open Access | Times Cited: 1
Luigi Coppolino, Salvatore D’Antonio, Giovanni Mazzeo, et al.
Neurocomputing (2025) Vol. 623, pp. 129406-129406
Open Access | Times Cited: 1
Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree
Surjeet Dalal, Umesh Kumar Lilhore, Neetu Faujdar, et al.
Journal of Cloud Computing Advances Systems and Applications (2023) Vol. 12, Iss. 1
Open Access | Times Cited: 17
Surjeet Dalal, Umesh Kumar Lilhore, Neetu Faujdar, et al.
Journal of Cloud Computing Advances Systems and Applications (2023) Vol. 12, Iss. 1
Open Access | Times Cited: 17
IIoT Malware Detection Using Edge Computing and Deep Learning for Cybersecurity in Smart Factories
Ho-myung Kim, Kyungho Lee
Applied Sciences (2022) Vol. 12, Iss. 15, pp. 7679-7679
Open Access | Times Cited: 25
Ho-myung Kim, Kyungho Lee
Applied Sciences (2022) Vol. 12, Iss. 15, pp. 7679-7679
Open Access | Times Cited: 25
A distributed SDN-based intrusion detection system for IoT using optimized forests
Ke Luo
PLoS ONE (2023) Vol. 18, Iss. 8, pp. e0290694-e0290694
Open Access | Times Cited: 14
Ke Luo
PLoS ONE (2023) Vol. 18, Iss. 8, pp. e0290694-e0290694
Open Access | Times Cited: 14
Novel Hybrid Deep Learning based Cyber Security Threat Detection Model with Optimization Algorithm
S. Markkandeyan, A. Dennis Ananth, M. Rajakumaran, et al.
Cyber Security and Applications (2024), pp. 100075-100075
Open Access | Times Cited: 4
S. Markkandeyan, A. Dennis Ananth, M. Rajakumaran, et al.
Cyber Security and Applications (2024), pp. 100075-100075
Open Access | Times Cited: 4
DLIIoT: A Deep Learning based Intelligent Attack Detection in IoT Networks using Cooja Simulator
Hanjabam Barun Sharma, Jasbir Singh Manhas, Vinod Sharma
Journal of Scientific Research (2025) Vol. 17, Iss. 1, pp. 177-193
Open Access
Hanjabam Barun Sharma, Jasbir Singh Manhas, Vinod Sharma
Journal of Scientific Research (2025) Vol. 17, Iss. 1, pp. 177-193
Open Access
PictureGuard: Enhancing Software-Defined Networking–Internet of Things Security with Novel Image-Based Authentication and Artificial Intelligence-Powered Two-Stage Intrusion Detection
Hazem Hatamleh, As’ad Mahmoud As’ad Alnaser, Said S. Saloum, et al.
Technologies (2025) Vol. 13, Iss. 2, pp. 55-55
Open Access
Hazem Hatamleh, As’ad Mahmoud As’ad Alnaser, Said S. Saloum, et al.
Technologies (2025) Vol. 13, Iss. 2, pp. 55-55
Open Access
IoT Applications and Cyber Threats: Mitigation Strategies for a Secure Future
Pratik Kumar Swain, Lal Mohan Pattnaik, Suneeta Satpathy
(2025), pp. 403-428
Closed Access
Pratik Kumar Swain, Lal Mohan Pattnaik, Suneeta Satpathy
(2025), pp. 403-428
Closed Access
A Comprehensive Review of Intrusion Detection Systems in IoT Landscape
Muhammad Kaleem, Muhammad Azhar Mushtaq, Salman Rashid, et al.
Communications in computer and information science (2025), pp. 287-302
Closed Access
Muhammad Kaleem, Muhammad Azhar Mushtaq, Salman Rashid, et al.
Communications in computer and information science (2025), pp. 287-302
Closed Access
Optimizing Intrusion Detection for IoT : A Systematic Review of Machine Learning and Deep Learning Approaches With Feature Selection and Data Balancing
S Kumar Reddy Mallidi, Rajeswara Rao Ramisetty
Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery (2025) Vol. 15, Iss. 2
Closed Access
S Kumar Reddy Mallidi, Rajeswara Rao Ramisetty
Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery (2025) Vol. 15, Iss. 2
Closed Access
Intrusion Detection Model for IoT Using Recurrent Kernel Convolutional Neural Network
C. U. Om Kumar, Suguna Marappan, R. M. Bhavadharini, et al.
Wireless Personal Communications (2022) Vol. 129, Iss. 2, pp. 783-812
Closed Access | Times Cited: 19
C. U. Om Kumar, Suguna Marappan, R. M. Bhavadharini, et al.
Wireless Personal Communications (2022) Vol. 129, Iss. 2, pp. 783-812
Closed Access | Times Cited: 19
Attack prevention in IoT through hybrid optimization mechanism and deep learning framework
Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, et al.
Measurement Sensors (2022) Vol. 24, pp. 100431-100431
Open Access | Times Cited: 16
Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, et al.
Measurement Sensors (2022) Vol. 24, pp. 100431-100431
Open Access | Times Cited: 16
Evaluation of contemporary intrusion detection systems for internet of things environment
Vandana Choudhary, Sarvesh Tanwar, Tanupriya Choudhury
Multimedia Tools and Applications (2023) Vol. 83, Iss. 3, pp. 7541-7581
Closed Access | Times Cited: 10
Vandana Choudhary, Sarvesh Tanwar, Tanupriya Choudhury
Multimedia Tools and Applications (2023) Vol. 83, Iss. 3, pp. 7541-7581
Closed Access | Times Cited: 10
A systematic literature review of recent lightweight detection approaches leveraging machine and deep learning mechanisms in Internet of Things networks
Ghada AL Mukhaini, Mohammed Anbar, Selvakumar Manickam, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 36, Iss. 1, pp. 101866-101866
Open Access | Times Cited: 8
Ghada AL Mukhaini, Mohammed Anbar, Selvakumar Manickam, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 36, Iss. 1, pp. 101866-101866
Open Access | Times Cited: 8
Dynamic behavioral profiling for anomaly detection in software-defined IoT networks: A machine learning approach
P. Senthilraja, Kanmani Palaniappan, Brindha Duraipandi, et al.
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 4, pp. 2450-2469
Closed Access | Times Cited: 2
P. Senthilraja, Kanmani Palaniappan, Brindha Duraipandi, et al.
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 4, pp. 2450-2469
Closed Access | Times Cited: 2
IoT Security Detection and Evaluation for Smart Cyber Infrastructures Using LSTMs with Attention Mechanism
Sanjaikanth E Vadakkethil Somanathan Pillai, Kiran Polimetla, Chidurala Sai Prakash, et al.
(2024) Vol. 136, pp. 1-5
Closed Access | Times Cited: 2
Sanjaikanth E Vadakkethil Somanathan Pillai, Kiran Polimetla, Chidurala Sai Prakash, et al.
(2024) Vol. 136, pp. 1-5
Closed Access | Times Cited: 2
Securing IoT network with hybrid evolutionary lion intrusion detection system: a composite motion optimisation algorithm for feature selection and ensemble classification
Anuvelavan Subramaniam, Sureshkumar Chelladurai, Stanly Kumar Ande, et al.
Journal of Experimental & Theoretical Artificial Intelligence (2024), pp. 1-23
Closed Access | Times Cited: 2
Anuvelavan Subramaniam, Sureshkumar Chelladurai, Stanly Kumar Ande, et al.
Journal of Experimental & Theoretical Artificial Intelligence (2024), pp. 1-23
Closed Access | Times Cited: 2
Transfer Learning Approach for Detecting Keylogging Attack on the Internet of Things
Yahya Alhaj Maz, Mohamad Anbar, Selvakumar Manickam, et al.
(2024), pp. 1-8
Closed Access | Times Cited: 2
Yahya Alhaj Maz, Mohamad Anbar, Selvakumar Manickam, et al.
(2024), pp. 1-8
Closed Access | Times Cited: 2
Deep Complex Gated Recurrent Networks-Based IoT Network Intrusion Detection Systems
Engy El-Shafeiy, Walaa M. Elsayed, Haitham Elwahsh, et al.
Sensors (2024) Vol. 24, Iss. 18, pp. 5933-5933
Open Access | Times Cited: 2
Engy El-Shafeiy, Walaa M. Elsayed, Haitham Elwahsh, et al.
Sensors (2024) Vol. 24, Iss. 18, pp. 5933-5933
Open Access | Times Cited: 2