OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

SafetyMed: A Novel IoMT Intrusion Detection System Using CNN-LSTM Hybridization
Nuruzzaman Faruqui, Mohammad Abu Yousuf, Md Whaiduzzaman, et al.
Electronics (2023) Vol. 12, Iss. 17, pp. 3541-3541
Open Access | Times Cited: 42

Showing 1-25 of 42 citing articles:

A deep learning-based novel hybrid CNN-LSTM architecture for efficient detection of threats in the IoT ecosystem
Ahsan Nazir, Jingsha He, Nafei Zhu, et al.
Ain Shams Engineering Journal (2024) Vol. 15, Iss. 7, pp. 102777-102777
Open Access | Times Cited: 19

Healthcare As a Service (HAAS): CNN-based cloud computing model for ubiquitous access to lung cancer diagnosis
Nuruzzaman Faruqui, Mohammad Abu Yousuf, Faris Kateb, et al.
Heliyon (2023) Vol. 9, Iss. 11, pp. e21520-e21520
Open Access | Times Cited: 31

An RFE/Ridge-ML/DL based anomaly intrusion detection approach for securing IoMT system
Ghita Lazrek, Kaouthar Chetioui, Younes Balboul, et al.
Results in Engineering (2024) Vol. 23, pp. 102659-102659
Open Access | Times Cited: 10

SkipGateNet: A Lightweight CNN-LSTM Hybrid Model With Learnable Skip Connections for Efficient Botnet Attack Detection in IoT
Mohammed S. Alshehri, Jawad Ahmad, Sultan Almakdi, et al.
IEEE Access (2024) Vol. 12, pp. 35521-35538
Open Access | Times Cited: 8

Hybrid deep learning-based cyberthreat detection and IoMT data authentication model in smart healthcare
Manish Kumar, Sushil Kumar Singh, Sunggon Kim
Future Generation Computer Systems (2025), pp. 107711-107711
Closed Access | Times Cited: 1

Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation
Mirza Akhi Khatun, Sanober Farheen Memon, Ciarán Eising, et al.
IEEE Access (2023) Vol. 11, pp. 145869-145896
Open Access | Times Cited: 18

Detecting lateral movement: A systematic survey
Christos Smiliotopoulos, Georgios Kambourakis, Constantinos Kolias
Heliyon (2024) Vol. 10, Iss. 4, pp. e26317-e26317
Open Access | Times Cited: 7

A Novel IDS with a Dynamic Access Control Algorithm to Detect and Defend Intrusion at IoT Nodes
Moutaz Alazab, Albara Awajan, Hadeel Alazzam, et al.
Sensors (2024) Vol. 24, Iss. 7, pp. 2188-2188
Open Access | Times Cited: 7

Deep-IDS: A Real-Time Intrusion Detector for IoT Nodes Using Deep Learning
Sandeepkumar Racherla, Prathyusha Sripathi, Nuruzzaman Faruqui, et al.
IEEE Access (2024) Vol. 12, pp. 63584-63597
Open Access | Times Cited: 6

BankNet: Real-Time Big Data Analytics for Secure Internet Banking
Kaushik Sathupadi, Sandesh Achar, Shyam Bhaskaran, et al.
Big Data and Cognitive Computing (2025) Vol. 9, Iss. 2, pp. 24-24
Open Access

Intelligent Ensemble Learning Approach for Intrusion Detection System in IoMT Environment
Pooja Puspita Priyadarshani, Pandit Byomakesha Dash
Lecture notes in networks and systems (2025), pp. 453-465
Closed Access

Velocity Paused Particle Swarm Optimization-based Intelligent Long Short-Term Memory Framework for Intrusion Detection System in Internet of Medical Things
Pandit Byomakesha Dash, H. S. Behera, Manas Ranjan Senapati, et al.
Arabian Journal for Science and Engineering (2025)
Closed Access

Multi-attention DeepCRNN: an efficient and explainable intrusion detection framework for Internet of Medical Things environments
Nikhil Sharma, Prashant Giridhar Shambharkar
Knowledge and Information Systems (2025)
Closed Access

Towards a generalized hybrid deep learning model with optimized hyperparameters for malicious traffic detection in the Industrial Internet of Things
Bilal Babayiğit, Mohammed Abubaker
Engineering Applications of Artificial Intelligence (2023) Vol. 128, pp. 107515-107515
Closed Access | Times Cited: 12

Enhancing Cybersecurity in Healthcare: Evaluating Ensemble Learning Models for Intrusion Detection in the Internet of Medical Things
Theyab Alsolami, Bader Alsharif, Mohammad Ilyas
Sensors (2024) Vol. 24, Iss. 18, pp. 5937-5937
Open Access | Times Cited: 4

Adaptive protocols for hypervisor security in cloud infrastructure using federated learning-based anomaly detection
Moutaz Alazab, Albara Awajan, Areej Obeidat, et al.
Engineering Applications of Artificial Intelligence (2025) Vol. 152, pp. 110750-110750
Closed Access

A new a flow-based approach for enhancing botnet detection using convolutional neural network and long short-term memory
Mehdi Asadi, Arash Heidari, Nima Jafari Navimipour
Knowledge and Information Systems (2025)
Open Access

Edge-Cloud Synergy for AI-Enhanced Sensor Network Data: A Real-Time Predictive Maintenance Framework
Kaushik Sathupadi, Sandesh Achar, Shyam Bhaskaran, et al.
Sensors (2024) Vol. 24, Iss. 24, pp. 7918-7918
Open Access | Times Cited: 3

DPMS: Data-Driven Promotional Management System of Universities Using Deep Learning on Social Media
Mohamed Emran Hossain, Nuruzzaman Faruqui, Imran Mahmud, et al.
Applied Sciences (2023) Vol. 13, Iss. 22, pp. 12300-12300
Open Access | Times Cited: 7

Potential Smart Grid Vulnerabilities to Cyber Attacks: Current Threats and Existing Mitigation Strategies
Bishowjit Paul, Auvizit Sarker, Sarafat Hussain Abhi, et al.
Heliyon (2024) Vol. 10, Iss. 19, pp. e37980-e37980
Open Access | Times Cited: 2

IoMT landscape: navigating current challenges and pioneering future research trends
Badraddin Alturki, Qasem Abu Al‐Haija, Rayan A. Alsemmeari, et al.
Deleted Journal (2024) Vol. 7, Iss. 1
Open Access | Times Cited: 2

An AI-Driven Based Cybersecurity System for Network Intrusion Detection System in Hybrid with EPO and CNNet-LAM
D. Anu Disney, R. Yugha, S.Bangaru Karachi, et al.
(2024), pp. 1397-1404
Closed Access | Times Cited: 1

Page 1 - Next Page

Scroll to top