OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Enhanced Cyber Attack Detection Process for Internet of Health Things (IoHT) Devices Using Deep Neural Network
Kedalu Poornachary Vijayakumar, K. Pradeep, A. Balasundaram, et al.
Processes (2023) Vol. 11, Iss. 4, pp. 1072-1072
Open Access | Times Cited: 20

Showing 20 citing articles:

Stacking Ensemble Deep Learning for Real-Time Intrusion Detection in IoMT Environments
Easa Alalwany, Bader Alsharif, Yazeed Alotaibi, et al.
Sensors (2025) Vol. 25, Iss. 3, pp. 624-624
Open Access | Times Cited: 1

A review of Machine Learning (ML)-based IoT security in healthcare: A dataset perspective
Euclides Carlos Pinto Neto, Sajjad Dadkhah, Somayeh Sadeghi, et al.
Computer Communications (2023) Vol. 213, pp. 61-77
Closed Access | Times Cited: 17

A Deep Learning-Based Framework for Strengthening Cybersecurity in Internet of Health Things (IoHT) Environments
Sarah A. Algethami, Sultan S. Alshamrani
Applied Sciences (2024) Vol. 14, Iss. 11, pp. 4729-4729
Open Access | Times Cited: 5

Feature efficiency in IoMT security: A comprehensive framework for threat detection with DNN and ML
Merve Pınar, A. Aktas, Eyüp Emre Ülkü
Computers in Biology and Medicine (2025) Vol. 186, pp. 109603-109603
Closed Access

A comprehensive framework for cyber threat detection: leveraging AI, NLP, and malware analysis
Nachaat Mohamed
International Journal of Information Technology (2025)
Closed Access

A Sustainable W-RLG Model for Attack Detection in Healthcare IoT Systems
Brij B. Gupta, Akshat Gaurav, Razaz Waheeb Attar, et al.
Sustainability (2024) Vol. 16, Iss. 8, pp. 3103-3103
Open Access | Times Cited: 3

LW-PWECC: Cryptographic Framework of Attack Detection and Secure Data Transmission in IoT
J Ranjith, K. Mahantesh, C N Abhilash
Journal of Robotics and Control (JRC) (2024) Vol. 5, Iss. 1, pp. 228-238
Open Access | Times Cited: 2

Deep Convolutional Neural Network for Active Intrusion Detection and Protect data from Passive Intrusion by Pascal Triangle
Abdulrahman Saad Alqahtani
Wireless Personal Communications (2024)
Closed Access | Times Cited: 1

Unveiling the core of IoT: comprehensive review on data security challenges and mitigation strategies
Kawalpreet Kaur, Amanpreet Kaur, Yonis Gulzar, et al.
Frontiers in Computer Science (2024) Vol. 6
Open Access | Times Cited: 1

Cybersecurity in Internet of Medical Vehicles: State-of-the-Art Analysis, Research Challenges and Future Perspectives
Chidambar Rao Bhukya, Prabhat Thakur, Bhavesh Raju Mudhivarthi, et al.
Sensors (2023) Vol. 23, Iss. 19, pp. 8107-8107
Open Access | Times Cited: 2

Intelligent Biometric Authentication-Based Intrusion Detection in Medical Cyber Physical System Using Deep Learning
Pandit Byomakesha Dash, Pooja Puspita Priyadarshani, Meltem Kurt Pehli̇vanoğlu
Intelligent systems reference library (2024), pp. 345-375
Closed Access

Securing Healthcare Systems Integrating AI for Cybersecurity Solutions and Privacy Preservation
M. Diviya, R. Bhuvaneswari, M. Prabu, et al.
Advances in healthcare information systems and administration book series (2024), pp. 330-344
Closed Access

Artificial intelligence and cybercrime: implications for individuals and the healthcare sector
Scott Monteith, Tasha Glenn, John Geddes, et al.
The British Journal of Psychiatry (2024), pp. 1-3
Closed Access

Ensuring patient safety in IoMT: A systematic literature review of behavior-based intrusion detection systems
Jordi Doménech, Isabel V. Martin-Faus, Saber Mhiri, et al.
Internet of Things (2024) Vol. 28, pp. 101420-101420
Open Access

An Effective Deep Learning-Based Intrusion Detection System for the Healthcare Environment
Balaji Karnam, S. Satheesh Kumar, Vivek Duraivelu, et al.
International Journal of Computational Intelligence and Applications (2024)
Closed Access

Cyber-Attack Detection in Healthcare Systems Based on Modified -Recurrent Neural Network Approach
Pradeep Chintale, Thomas Sure, Fardin Quazi, et al.
Communications in computer and information science (2024), pp. 213-224
Closed Access

Cross ML for Io(H)T Network Traffic Classification: A New Approach Towards Standardization
Emmanuel Song Shombot, Gilles Dusserre, Robert Bešťák, et al.
(2024), pp. 282-288
Closed Access

Page 1

Scroll to top