OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Deep Learning Approach for SDN-Enabled Intrusion Detection System in IoT Networks
Rajasekhar Chaganti, Wael Suliman, Vinayakumar Ravi, et al.
Information (2023) Vol. 14, Iss. 1, pp. 41-41
Open Access | Times Cited: 71

Showing 1-25 of 71 citing articles:

A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis
Salman Muneer, Umer Farooq, Atifa Athar, et al.
Journal of Engineering (2024) Vol. 2024, pp. 1-16
Open Access | Times Cited: 23

Survey on Joint Paradigm of 5G and SDN Emerging Mobile Technologies: Architecture, Security, Challenges and Research Directions
Syed Hussain Ali Kazmi, Faizan Qamar, Rosilah Hassan, et al.
Wireless Personal Communications (2023) Vol. 130, Iss. 4, pp. 2753-2800
Open Access | Times Cited: 35

Deep Learning Based Hybrid Intrusion Detection Systems to Protect Satellite Networks
Ahmad Taher Azar, Esraa Shehab, Ahmed M. Mattar, et al.
Journal of Network and Systems Management (2023) Vol. 31, Iss. 4
Open Access | Times Cited: 25

Survival study on deep learning techniques for IoT enabled smart healthcare system
Ashok Kumar Munnangi, Satheeshwaran UdhayaKumar, Vinayakumar Ravi, et al.
Health and Technology (2023) Vol. 13, Iss. 2, pp. 215-228
Open Access | Times Cited: 22

A novel deep learning-based intrusion detection system for IoT DDoS security
Selman Hızal, Ünal Çavuşoğlu, Devrim Akgün
Internet of Things (2024) Vol. 28, pp. 101336-101336
Closed Access | Times Cited: 7

VBQ-Net: A Novel Vectorization-Based Boost Quantized Network Model for Maximizing the Security Level of IoT System to Prevent Intrusions
Ganeshkumar Perumal, S. Gopalakrishnan, Qaisar Abbas, et al.
Systems (2023) Vol. 11, Iss. 8, pp. 436-436
Open Access | Times Cited: 16

A Novel IDS with a Dynamic Access Control Algorithm to Detect and Defend Intrusion at IoT Nodes
Moutaz Alazab, Albara Awajan, Hadeel Alazzam, et al.
Sensors (2024) Vol. 24, Iss. 7, pp. 2188-2188
Open Access | Times Cited: 6

Deep-IDS: A Real-Time Intrusion Detector for IoT Nodes Using Deep Learning
Sandeepkumar Racherla, Prathyusha Sripathi, Nuruzzaman Faruqui, et al.
IEEE Access (2024) Vol. 12, pp. 63584-63597
Open Access | Times Cited: 6

Enhanced Network Intrusion Detection System Using PCGSO-Optimized BI-GRU Model in AI-Driven Cybersecurity
Priyan Malarvizhi Kumar, Kavya Vedantham, S. Jeeva, et al.
(2024)
Closed Access | Times Cited: 5

A Deep Learning-Based Framework for Strengthening Cybersecurity in Internet of Health Things (IoHT) Environments
Sarah A. Algethami, Sultan S. Alshamrani
Applied Sciences (2024) Vol. 14, Iss. 11, pp. 4729-4729
Open Access | Times Cited: 5

Enhanced botnet detection in IoT networks using zebra optimization and dual-channel GAN classification
Sk. Khaja Shareef, R. Krishna Chaitanya, Srinivasulu Chennupalli, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 5

Med-DDoS-SDN: A Kafka Streams-Based Distributed Approach for Protecting Healthcare SDN Environments Against DDoS Attacks
Amandeep Kaur, C. Rama Krishna, Nilesh Vishwasrao Patil
Smart innovation, systems and technologies (2025), pp. 49-60
Closed Access

A Comprehensive Review of Intrusion Detection Systems in IoT Landscape
Muhammad Kaleem, Muhammad Azhar Mushtaq, Salman Rashid, et al.
Communications in computer and information science (2025), pp. 287-302
Closed Access

Towards Robust SDN Security: A Comparative Analysis of Oversampling Techniques with ML and DL Classifiers
Aboubakr Salem Bajenaid, Maher Khemakhem, Fathy Eassa, et al.
Electronics (2025) Vol. 14, Iss. 5, pp. 995-995
Open Access

An efficient approach to detect distributed denial of service attacks for software defined internet of things combining autoencoder and extreme gradient boosting with feature selection and hyperparameter tuning optimization
Mohamed Ali Setitra, Mingyu Fan, Zine El Abidine Bensalem
Transactions on Emerging Telecommunications Technologies (2023) Vol. 34, Iss. 9
Closed Access | Times Cited: 14

An Intrusion System for Internet of Things Security Breaches Using Machine Learning Techniques
Temitope Samson Adekunle, Oluwaseyi Omotayo Alabı, Morolake Oladayo Lawrence, et al.
Artificial Intelligence and Applications (2024) Vol. 2, Iss. 3, pp. 188-194
Open Access | Times Cited: 4

Energy optimization using adaptive control algorithm to enhance the performance of SDN_IOT environment
I. Varalakshmi, M. Thenmozhi
Discover Internet of Things (2025) Vol. 5, Iss. 1
Open Access

Addressing security challenges in industry 4.0: AVA-MA approach for strengthening SDN-IoT network security
R. Uma Mageswari, Zafar Ali Khan N, Gowthul Alam M M, et al.
Computers & Security (2024) Vol. 144, pp. 103907-103907
Closed Access | Times Cited: 3

An efficient intrusion detection systems in fog computing using forward selection and BiLSTM
Fadi Abu Zwayed, Mohammed Anbar, Selvakumar Manickam, et al.
Bulletin of Electrical Engineering and Informatics (2024) Vol. 13, Iss. 4, pp. 2586-2603
Open Access | Times Cited: 3

Software defined networking for internet of things: review, techniques, challenges, and future directions
Mahmood A. Al-Shareeda, Abeer Abdullah Alsadhan, H. H. Qasim, et al.
Bulletin of Electrical Engineering and Informatics (2023) Vol. 13, Iss. 1, pp. 638-647
Open Access | Times Cited: 9

A Consistent Augmented Stacking Polynomial Optimized Tool (ASPOT) for Improving Security of Cloud-IoT Systems
Divya Ramachandran, R. Chithambaramani, S. Sankar Ganesh, et al.
Journal of Advanced Research in Applied Sciences and Engineering Technology (2024) Vol. 37, Iss. 1, pp. 16-36
Open Access | Times Cited: 2

Detection of Cyber Attack in IoT Based Model Using ANN Model with Genetic Algorithm
Animesh Srivastava, Hemendra Shanker Sharma, Rishikesh Rawat, et al.
(2024), pp. 1198-1201
Closed Access | Times Cited: 2

An Intelligent Big Data Security Framework Based on AEFS-KENN Algorithms for the Detection of Cyber-Attacks from Smart Grid Systems
Sankaramoorthy Muthubalaji, Naresh Kumar Muniyaraj, Sarvade Pedda Venkata Subba Rao, et al.
Big Data Mining and Analytics (2024) Vol. 7, Iss. 2, pp. 399-418
Open Access | Times Cited: 2

Enhancing Cyberattack Detection Using Dimensionality Reduction With Hybrid Deep Learning on Internet of Things Environment
Salahaldeen Duraibi, Abdullah Mujawib Alashjaee
IEEE Access (2024) Vol. 12, pp. 84752-84762
Open Access | Times Cited: 2

Page 1 - Next Page

Scroll to top