
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Challenges of Malware Detection in the IoT and a Review of Artificial Immune System Approaches
Hadeel Alrubayyi, Gokop Goteng, Mona Jaber, et al.
Journal of Sensor and Actuator Networks (2021) Vol. 10, Iss. 4, pp. 61-61
Open Access | Times Cited: 22
Hadeel Alrubayyi, Gokop Goteng, Mona Jaber, et al.
Journal of Sensor and Actuator Networks (2021) Vol. 10, Iss. 4, pp. 61-61
Open Access | Times Cited: 22
Showing 22 citing articles:
IoT Intrusion Detection Using Machine Learning with a Novel High Performing Feature Selection Method
Khalid Albulayhi, Qasem Abu Al‐Haija, Suliman A. Alsuhibany, et al.
Applied Sciences (2022) Vol. 12, Iss. 10, pp. 5015-5015
Open Access | Times Cited: 118
Khalid Albulayhi, Qasem Abu Al‐Haija, Suliman A. Alsuhibany, et al.
Applied Sciences (2022) Vol. 12, Iss. 10, pp. 5015-5015
Open Access | Times Cited: 118
ELBA-IoT: An Ensemble Learning Model for Botnet Attack Detection in IoT Networks
Qasem Abu Al‐Haija, Muawya N. Al Dalaien
Journal of Sensor and Actuator Networks (2022) Vol. 11, Iss. 1, pp. 18-18
Open Access | Times Cited: 97
Qasem Abu Al‐Haija, Muawya N. Al Dalaien
Journal of Sensor and Actuator Networks (2022) Vol. 11, Iss. 1, pp. 18-18
Open Access | Times Cited: 97
Detection of Real-Time Malicious Intrusions and Attacks in IoT Empowered Cybersecurity Infrastructures
Irfan Ali Kandhro, Sultan M. Alanazi, Fayyaz Ali, et al.
IEEE Access (2023) Vol. 11, pp. 9136-9148
Open Access | Times Cited: 50
Irfan Ali Kandhro, Sultan M. Alanazi, Fayyaz Ali, et al.
IEEE Access (2023) Vol. 11, pp. 9136-9148
Open Access | Times Cited: 50
Static Multi Feature-Based Malware Detection Using Multi SPP-net in Smart IoT Environments
Jueun Jeon, Byeonghui Jeong, Seungyeon Baek, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 2487-2500
Closed Access | Times Cited: 13
Jueun Jeon, Byeonghui Jeong, Seungyeon Baek, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 2487-2500
Closed Access | Times Cited: 13
Security Threats and Promising Solutions Arising from the Intersection of AI and IoT: A Study of IoMT and IoET Applications
Hadeel Alrubayyi, Moudy Sharaf Alshareef, Zunaira Nadeem, et al.
Future Internet (2024) Vol. 16, Iss. 3, pp. 85-85
Open Access | Times Cited: 10
Hadeel Alrubayyi, Moudy Sharaf Alshareef, Zunaira Nadeem, et al.
Future Internet (2024) Vol. 16, Iss. 3, pp. 85-85
Open Access | Times Cited: 10
SVM-based malware classification through deep learning method
Jiawei Shi, Wancheng Wang, Meng Zhang, et al.
(2025), pp. 82-82
Closed Access
Jiawei Shi, Wancheng Wang, Meng Zhang, et al.
(2025), pp. 82-82
Closed Access
IoT and machine learning for enabling sustainable development goals
Mona Jaber
Frontiers in Communications and Networks (2023) Vol. 4
Open Access | Times Cited: 9
Mona Jaber
Frontiers in Communications and Networks (2023) Vol. 4
Open Access | Times Cited: 9
Detection of Android Malware in the Internet of Things through the K-Nearest Neighbor Algorithm
Himanshi Babbar, Shalli Rani, Dipak Kumar Sah, et al.
Sensors (2023) Vol. 23, Iss. 16, pp. 7256-7256
Open Access | Times Cited: 9
Himanshi Babbar, Shalli Rani, Dipak Kumar Sah, et al.
Sensors (2023) Vol. 23, Iss. 16, pp. 7256-7256
Open Access | Times Cited: 9
Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection Techniques and Recommended Prevention Approach
Omar Alshamsi, Khaled Shaalan, Usman Javed Butt
Information (2024) Vol. 15, Iss. 10, pp. 631-631
Open Access | Times Cited: 3
Omar Alshamsi, Khaled Shaalan, Usman Javed Butt
Information (2024) Vol. 15, Iss. 10, pp. 631-631
Open Access | Times Cited: 3
Application of Artificial Immune Systems in Advanced Manufacturing
Rui Pinto, Gil Gonçalves
Array (2022) Vol. 15, pp. 100238-100238
Closed Access | Times Cited: 13
Rui Pinto, Gil Gonçalves
Array (2022) Vol. 15, pp. 100238-100238
Closed Access | Times Cited: 13
Energy-aware Theft Detection based on IoT Energy Consumption Data
Zunaira Nadeem, Zeeshan Aslam, Mona Jaber, et al.
2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring) (2023), pp. 1-6
Open Access | Times Cited: 3
Zunaira Nadeem, Zeeshan Aslam, Mona Jaber, et al.
2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring) (2023), pp. 1-6
Open Access | Times Cited: 3
AIS for Malware Detection in a Realistic IoT System: Challenges and Opportunities
Hadeel Alrubayyi, Gokop Goteng, Mona Jaber
Network (2023) Vol. 3, Iss. 4, pp. 522-537
Open Access | Times Cited: 2
Hadeel Alrubayyi, Gokop Goteng, Mona Jaber
Network (2023) Vol. 3, Iss. 4, pp. 522-537
Open Access | Times Cited: 2
Malware detection for IoT devices using hybrid system of whitelist and machine learning based on lightweight flow data
Masataka Nakahara, Norihiro Okui, Yasuaki Kobayashi, et al.
Enterprise Information Systems (2022) Vol. 17, Iss. 9
Closed Access | Times Cited: 3
Masataka Nakahara, Norihiro Okui, Yasuaki Kobayashi, et al.
Enterprise Information Systems (2022) Vol. 17, Iss. 9
Closed Access | Times Cited: 3
Multi-agent reinforcement learning based algorithm detection of malware-infected nodes in IoT networks
Marcos Severt, Roberto Casado‐Vara, A. Martı́n del Rey, et al.
Logic Journal of IGPL (2024)
Closed Access
Marcos Severt, Roberto Casado‐Vara, A. Martı́n del Rey, et al.
Logic Journal of IGPL (2024)
Closed Access
Using K-means to Analyze Out-of-Bound Unusual Network Traffic and to Predict Data Theft Malware on a Hospital Network
Zixuan Pu, Youlang Tong, Qing Ji, et al.
(2024)
Open Access
Zixuan Pu, Youlang Tong, Qing Ji, et al.
(2024)
Open Access
Artificial Immune System Algorithms for Optimizing Nanoparticle Design in Targeted Drug Delivery
Ashish Kumar, Vivek Verma
(2024), pp. 169-183
Closed Access
Ashish Kumar, Vivek Verma
(2024), pp. 169-183
Closed Access
Synergistic Approaches to Enhance IoT Intrusion Detection: Balancing Features through Combined Learning
Chokkapu Narayanarao, Venkateswara Rao Mandapati, Bhaskara Rao Boddu
Informatics and Automation (2024) Vol. 23, Iss. 6, pp. 1845-1868
Open Access
Chokkapu Narayanarao, Venkateswara Rao Mandapati, Bhaskara Rao Boddu
Informatics and Automation (2024) Vol. 23, Iss. 6, pp. 1845-1868
Open Access
Enhancing resilience in IoT cybersecurity: the roles of obfuscation and diversification techniques for improving the multilayered cybersecurity of IoT systems
Sampsa Rauti, Samuli Laato
Data & Policy (2024) Vol. 6
Open Access
Sampsa Rauti, Samuli Laato
Data & Policy (2024) Vol. 6
Open Access
A Comparative Performance Analysis of Various Antivirus Software
Una Drakulić, Edin Mujčić
Lecture notes in networks and systems (2023), pp. 423-430
Closed Access
Una Drakulić, Edin Mujčić
Lecture notes in networks and systems (2023), pp. 423-430
Closed Access
Machine Learning in IoT Networking and Communications
Mona Jaber
Journal of Sensor and Actuator Networks (2022) Vol. 11, Iss. 3, pp. 37-37
Open Access
Mona Jaber
Journal of Sensor and Actuator Networks (2022) Vol. 11, Iss. 3, pp. 37-37
Open Access
ATLAS: A Practical Attack Detection and Live Malware Analysis System for IoT Threat Intelligence
Yan Lin Aung, Martín Ochoa, Jianying Zhou
Lecture notes in computer science (2022), pp. 319-338
Closed Access
Yan Lin Aung, Martín Ochoa, Jianying Zhou
Lecture notes in computer science (2022), pp. 319-338
Closed Access
Sequential Embedding-based Attentive (SEA) classifier for malware classification
Muhammad Ahmed, Anam Qureshi, Jawwad Ahmed Shamsi, et al.
(2022), pp. 28-35
Open Access
Muhammad Ahmed, Anam Qureshi, Jawwad Ahmed Shamsi, et al.
(2022), pp. 28-35
Open Access