OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Hybrid Deep Learning Model with Self-Improved Optimization Algorithm for Detection of Security Attacks in IoT Environment
Amit Sagu, Nasib Singh Gill, Preeti Gulia, et al.
Future Internet (2022) Vol. 14, Iss. 10, pp. 301-301
Open Access | Times Cited: 19

Showing 19 citing articles:

False data injection attack in smart grid cyber physical system: Issues, challenges, and future direction
A.K.M. Ahasan Habib, Mohammad Kamrul Hasan, Ahmed Alkhayyat, et al.
Computers & Electrical Engineering (2023) Vol. 107, pp. 108638-108638
Closed Access | Times Cited: 59

DeepLG SecNet: utilizing deep LSTM and GRU with secure network for enhanced intrusion detection in IoT environments
N. Manikandan, K. Pradeep, Gobalakrishnan Natesan, et al.
Cluster Computing (2024) Vol. 27, Iss. 4, pp. 5459-5471
Closed Access | Times Cited: 16

Security Concepts in Emerging 6G Communication: Threats, Countermeasures, Authentication Techniques and Research Directions
Syed Hussain Ali Kazmi, Rosilah Hassan, Faizan Qamar, et al.
Symmetry (2023) Vol. 15, Iss. 6, pp. 1147-1147
Open Access | Times Cited: 31

Design of Metaheuristic Optimization Algorithms for Deep Learning Model for Secure IoT Environment
Amit Sagu, Nasib Singh Gill, Preeti Gulia, et al.
Sustainability (2023) Vol. 15, Iss. 3, pp. 2204-2204
Open Access | Times Cited: 25

Global Digital Convergence: Impact of Cybersecurity, Business Transparency, Economic Transformation, and AML Efficiency
Aleksandra Kuzior, Tetiana Anatoliivna Vasylieva, Оlha Кuzmenko, et al.
Journal of Open Innovation Technology Market and Complexity (2022) Vol. 8, Iss. 4, pp. 195-195
Open Access | Times Cited: 31

Design of an Intrusion Detection Model for IoT-Enabled Smart Home
Deepti Rani, Nasib Singh Gill, Preeti Gulia, et al.
IEEE Access (2023), pp. 1-1
Open Access | Times Cited: 19

A big data analytics for DDOS attack detection using optimized ensemble framework in Internet of Things
Ijaz Ahmad, Zhong Wan, Ashfaq Ahmad
Internet of Things (2023) Vol. 23, pp. 100825-100825
Closed Access | Times Cited: 13

An AI-IoT hybrid algorithm for enhancing mentcare information system security
Methaq Talib Gaata, Yasmin Makki Mohialden, Nadia Mahmood Hussien
AIP conference proceedings (2025) Vol. 3264, pp. 030023-030023
Closed Access

DDoS Attack Detection using Back Propagation Neural Network Optimized by Bacterial Colony Optimization
M. Arunadevi, Vanlin Sathya
International journal of intelligent engineering and systems (2023) Vol. 16, Iss. 5, pp. 301-312
Open Access | Times Cited: 5

Advancing Fake Profile Detection: A Machine Learning Perspective
Bharti Goyal, Nasib Singh Gill, Preeti Gulia
(2024), pp. 1-8
Closed Access | Times Cited: 1

Preserving Users’ Sensitive Data in Physical and Virtual World Using Machine Learning: A Strategy
Nasib Singh Gill, Preeti Gulia, Amit Sagu, et al.
(2023), pp. 18-23
Closed Access | Times Cited: 3

Securing IoT Environment by Deploying Federated Deep Learning Models
Saleh Alghamdi, Aiiad Albeshri
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 4
Open Access

A comprehensive analysis of threat vectors in software-defined networking
Seema Dahiya, Harkesh Sehrawat, Seema Kharb, et al.
Multimedia Tools and Applications (2024) Vol. 83, Iss. 39, pp. 86791-86832
Closed Access

A Survey of Intrusion Detection Systems Based On Deep Learning for IoT Data
Mehrnaz Moudi, Ali Soleimani, A. Nia
Journal of Information Systems and Telecommunication (JIST) (2024) Vol. 12, Iss. 47, pp. 197-207
Closed Access

Hybrid Deep Learning based Attack Detection and Classification Model on IoT Environment
Jaya Dipti Lal, Shahnawaz Ayoub, Prashant D Hakim, et al.
(2023), pp. 1-5
Closed Access

Machine Learning Approach for Securing of IoT Environment
Amit Sagu, Nasib Singh Gill, Preeti Gulia, et al.
Lecture notes in networks and systems (2023), pp. 849-858
Closed Access

Page 1

Scroll to top