
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An Intelligent System to Detect Advanced Persistent Threats in Industrial Internet of Things (I-IoT)
Safdar Hussain Javed, Maaz Bin Ahmad, Muhammad Asif, et al.
Electronics (2022) Vol. 11, Iss. 5, pp. 742-742
Open Access | Times Cited: 45
Safdar Hussain Javed, Maaz Bin Ahmad, Muhammad Asif, et al.
Electronics (2022) Vol. 11, Iss. 5, pp. 742-742
Open Access | Times Cited: 45
Showing 1-25 of 45 citing articles:
The intersection of Artificial Intelligence and cybersecurity: Challenges and opportunities
Adewale Daniel Sontan, Segun Victor Samuel
World Journal of Advanced Research and Reviews (2024) Vol. 21, Iss. 2, pp. 1720-1736
Open Access | Times Cited: 31
Adewale Daniel Sontan, Segun Victor Samuel
World Journal of Advanced Research and Reviews (2024) Vol. 21, Iss. 2, pp. 1720-1736
Open Access | Times Cited: 31
Securing modern power systems: Implementing comprehensive strategies to enhance resilience and reliability against cyber-attacks
Sobhy M. Abdelkader, Jeremiah Amissah, Sammy Kinga, et al.
Results in Engineering (2024) Vol. 23, pp. 102647-102647
Open Access | Times Cited: 28
Sobhy M. Abdelkader, Jeremiah Amissah, Sammy Kinga, et al.
Results in Engineering (2024) Vol. 23, pp. 102647-102647
Open Access | Times Cited: 28
Navigating the nexus of security and privacy in modern financial technologies
Florence Olweny
GSC Advanced Research and Reviews (2024) Vol. 18, Iss. 2, pp. 167-197
Open Access | Times Cited: 18
Florence Olweny
GSC Advanced Research and Reviews (2024) Vol. 18, Iss. 2, pp. 167-197
Open Access | Times Cited: 18
CICIoV2024: Advancing realistic IDS approaches against DoS and spoofing attack in IoV CAN bus
Euclides Carlos Pinto Neto, Hamideh Taslimasa, Sajjad Dadkhah, et al.
Internet of Things (2024) Vol. 26, pp. 101209-101209
Open Access | Times Cited: 15
Euclides Carlos Pinto Neto, Hamideh Taslimasa, Sajjad Dadkhah, et al.
Internet of Things (2024) Vol. 26, pp. 101209-101209
Open Access | Times Cited: 15
A performance overview of machine learning-based defense strategies for advanced persistent threats in industrial control systems
Muhammad Imran, Hafeez Ur Rehman Siddiqui, Ali Raza, et al.
Computers & Security (2023) Vol. 134, pp. 103445-103445
Closed Access | Times Cited: 25
Muhammad Imran, Hafeez Ur Rehman Siddiqui, Ali Raza, et al.
Computers & Security (2023) Vol. 134, pp. 103445-103445
Closed Access | Times Cited: 25
Application of internet of things in healthcare domain
Khaled H. Almotairi
Deleted Journal (2022) Vol. 14, Iss. 1, pp. 1-12
Open Access | Times Cited: 29
Khaled H. Almotairi
Deleted Journal (2022) Vol. 14, Iss. 1, pp. 1-12
Open Access | Times Cited: 29
APT Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System
Safdar Hussain Javed, Maaz Bin Ahmad, Muhammad Asif, et al.
IEEE Access (2023) Vol. 11, pp. 74000-74020
Open Access | Times Cited: 16
Safdar Hussain Javed, Maaz Bin Ahmad, Muhammad Asif, et al.
IEEE Access (2023) Vol. 11, pp. 74000-74020
Open Access | Times Cited: 16
Advanced Persistent Threats and Their Defense Methods in Industrial Internet of Things: A Survey
Chenquan Gan, Jiabin Lin, Da-Wen Huang, et al.
Mathematics (2023) Vol. 11, Iss. 14, pp. 3115-3115
Open Access | Times Cited: 16
Chenquan Gan, Jiabin Lin, Da-Wen Huang, et al.
Mathematics (2023) Vol. 11, Iss. 14, pp. 3115-3115
Open Access | Times Cited: 16
Advanced Persistent Threat
Indra Kumari, Minho Lee
(2023), pp. 123-144
Closed Access | Times Cited: 16
Indra Kumari, Minho Lee
(2023), pp. 123-144
Closed Access | Times Cited: 16
Exploration of Mobile Device Behavior for Mitigating Advanced Persistent Threats (APT): A Systematic Literature Review and Conceptual Framework
Thulfiqar Jabar, Manmeet Mahinderjit Singh
Sensors (2022) Vol. 22, Iss. 13, pp. 4662-4662
Open Access | Times Cited: 25
Thulfiqar Jabar, Manmeet Mahinderjit Singh
Sensors (2022) Vol. 22, Iss. 13, pp. 4662-4662
Open Access | Times Cited: 25
IIoT Malware Detection Using Edge Computing and Deep Learning for Cybersecurity in Smart Factories
Ho-myung Kim, Kyungho Lee
Applied Sciences (2022) Vol. 12, Iss. 15, pp. 7679-7679
Open Access | Times Cited: 25
Ho-myung Kim, Kyungho Lee
Applied Sciences (2022) Vol. 12, Iss. 15, pp. 7679-7679
Open Access | Times Cited: 25
Machine Learning Techniques for Cyberattack Prevention in IoT Systems: A Comparative Perspective of Cybersecurity and Cyberdefense in Colombia
Emanuel Ortiz-Ruiz, Juan Ramón Bermejo Higuera, Juan Antonio Sicilia Montalvo, et al.
Electronics (2024) Vol. 13, Iss. 5, pp. 824-824
Open Access | Times Cited: 5
Emanuel Ortiz-Ruiz, Juan Ramón Bermejo Higuera, Juan Antonio Sicilia Montalvo, et al.
Electronics (2024) Vol. 13, Iss. 5, pp. 824-824
Open Access | Times Cited: 5
EMERGING TRENDS IN CYBERSECURITY FOR CRITICAL INFRASTRUCTURE PROTECTION: A COMPREHENSIVE REVIEW
Sontan Adewale Daniel, Samuel Segun Victor
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 3, pp. 576-593
Open Access | Times Cited: 5
Sontan Adewale Daniel, Samuel Segun Victor
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 3, pp. 576-593
Open Access | Times Cited: 5
Leveraging Random Forest for Intelligent IoT Systems in Industrial Environments
N. P. Ponnuviji, Almas Begum, T. Gnanasekaran, et al.
Communications in computer and information science (2025), pp. 46-57
Closed Access
N. P. Ponnuviji, Almas Begum, T. Gnanasekaran, et al.
Communications in computer and information science (2025), pp. 46-57
Closed Access
IoT cloud security in digital transformation
Yacine Atif, Sujith Samuel Mathew
Elsevier eBooks (2025), pp. 219-251
Closed Access
Yacine Atif, Sujith Samuel Mathew
Elsevier eBooks (2025), pp. 219-251
Closed Access
Evaluation of contemporary intrusion detection systems for internet of things environment
Vandana Choudhary, Sarvesh Tanwar, Tanupriya Choudhury
Multimedia Tools and Applications (2023) Vol. 83, Iss. 3, pp. 7541-7581
Closed Access | Times Cited: 10
Vandana Choudhary, Sarvesh Tanwar, Tanupriya Choudhury
Multimedia Tools and Applications (2023) Vol. 83, Iss. 3, pp. 7541-7581
Closed Access | Times Cited: 10
A systematic literature review for APT detection and Effective Cyber Situational Awareness (ECSA) conceptual model
Duraid T. Salim, Manmeet Mahinderjit Singh, Pantea Keikhosrokiani
Heliyon (2023) Vol. 9, Iss. 7, pp. e17156-e17156
Open Access | Times Cited: 9
Duraid T. Salim, Manmeet Mahinderjit Singh, Pantea Keikhosrokiani
Heliyon (2023) Vol. 9, Iss. 7, pp. e17156-e17156
Open Access | Times Cited: 9
Brain Tumor Detection using Decision-Based Fusion Empowered with Fuzzy Logic
Aqsa Tahir, Muhammad Asif, Maaz Bin Ahmad, et al.
Mathematical Problems in Engineering (2022) Vol. 2022, pp. 1-13
Open Access | Times Cited: 13
Aqsa Tahir, Muhammad Asif, Maaz Bin Ahmad, et al.
Mathematical Problems in Engineering (2022) Vol. 2022, pp. 1-13
Open Access | Times Cited: 13
A Systematic Literature Review and a Conceptual Framework Proposition for Advanced Persistent Threats (APT) Detection for Mobile Devices Using Artificial Intelligence Techniques
Amjed Ahmed Al-Kadhimi, Manmeet Mahinderjit Singh, Mohd Nor Akmal Khalid
Applied Sciences (2023) Vol. 13, Iss. 14, pp. 8056-8056
Open Access | Times Cited: 7
Amjed Ahmed Al-Kadhimi, Manmeet Mahinderjit Singh, Mohd Nor Akmal Khalid
Applied Sciences (2023) Vol. 13, Iss. 14, pp. 8056-8056
Open Access | Times Cited: 7
A Fine-Grained System Driven of Attacks Over Several New Representation Techniques Using Machine Learning
Mohammed A. Al Ghamdi
IEEE Access (2023) Vol. 11, pp. 96615-96625
Open Access | Times Cited: 7
Mohammed A. Al Ghamdi
IEEE Access (2023) Vol. 11, pp. 96615-96625
Open Access | Times Cited: 7
L-IDS: A Multi-Layered Approach to Ransomware Detection in IoT
Farhad Mofidi, Sena G Hounsinou, Gedare Bloom
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) (2024), pp. 0387-0396
Closed Access | Times Cited: 2
Farhad Mofidi, Sena G Hounsinou, Gedare Bloom
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) (2024), pp. 0387-0396
Closed Access | Times Cited: 2
Securing IIoT operations with recurrent federated network-based enhanced local search grasshopper
Madini O. Alassafi
Neural Computing and Applications (2024) Vol. 36, Iss. 25, pp. 15893-15906
Closed Access | Times Cited: 2
Madini O. Alassafi
Neural Computing and Applications (2024) Vol. 36, Iss. 25, pp. 15893-15906
Closed Access | Times Cited: 2
E-APTDetect: Early Advanced Persistent Threat Detection in Critical Infrastructures with Dynamic Attestation
Béla Genge, Piroska Haller, Adrian-Silviu Roman
Applied Sciences (2023) Vol. 13, Iss. 6, pp. 3409-3409
Open Access | Times Cited: 6
Béla Genge, Piroska Haller, Adrian-Silviu Roman
Applied Sciences (2023) Vol. 13, Iss. 6, pp. 3409-3409
Open Access | Times Cited: 6
IoT-Traffic Networks Effective Features Based on NSGA-II Technique
Sahar Jasim Mohammed, Mohammed Sami Mohammed, Nihad Mahmoud Nasir
Journal of Internet Services and Information Security (2024) Vol. 14, Iss. 2, pp. 247-267
Open Access | Times Cited: 1
Sahar Jasim Mohammed, Mohammed Sami Mohammed, Nihad Mahmoud Nasir
Journal of Internet Services and Information Security (2024) Vol. 14, Iss. 2, pp. 247-267
Open Access | Times Cited: 1
Cyberatttack Detection and Classification in IIoT systems using XGBoost and Gaussian Naïve Bayes: A Comparative Study
Mordi Alenazi, Shailendra Mishra
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 4, pp. 15074-15082
Open Access | Times Cited: 1
Mordi Alenazi, Shailendra Mishra
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 4, pp. 15074-15082
Open Access | Times Cited: 1