
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Enhanced Cyber Attack Detection Process for Internet of Health Things (IoHT) Devices Using Deep Neural Network
Kedalu Poornachary Vijayakumar, K. Pradeep, A. Balasundaram, et al.
Processes (2023) Vol. 11, Iss. 4, pp. 1072-1072
Open Access | Times Cited: 20
Kedalu Poornachary Vijayakumar, K. Pradeep, A. Balasundaram, et al.
Processes (2023) Vol. 11, Iss. 4, pp. 1072-1072
Open Access | Times Cited: 20
Showing 20 citing articles:
Stacking Ensemble Deep Learning for Real-Time Intrusion Detection in IoMT Environments
Easa Alalwany, Bader Alsharif, Yazeed Alotaibi, et al.
Sensors (2025) Vol. 25, Iss. 3, pp. 624-624
Open Access | Times Cited: 1
Easa Alalwany, Bader Alsharif, Yazeed Alotaibi, et al.
Sensors (2025) Vol. 25, Iss. 3, pp. 624-624
Open Access | Times Cited: 1
A review of Machine Learning (ML)-based IoT security in healthcare: A dataset perspective
Euclides Carlos Pinto Neto, Sajjad Dadkhah, Somayeh Sadeghi, et al.
Computer Communications (2023) Vol. 213, pp. 61-77
Closed Access | Times Cited: 17
Euclides Carlos Pinto Neto, Sajjad Dadkhah, Somayeh Sadeghi, et al.
Computer Communications (2023) Vol. 213, pp. 61-77
Closed Access | Times Cited: 17
A Deep Learning-Based Framework for Strengthening Cybersecurity in Internet of Health Things (IoHT) Environments
Sarah A. Algethami, Sultan S. Alshamrani
Applied Sciences (2024) Vol. 14, Iss. 11, pp. 4729-4729
Open Access | Times Cited: 5
Sarah A. Algethami, Sultan S. Alshamrani
Applied Sciences (2024) Vol. 14, Iss. 11, pp. 4729-4729
Open Access | Times Cited: 5
Feature efficiency in IoMT security: A comprehensive framework for threat detection with DNN and ML
Merve Pınar, A. Aktas, Eyüp Emre Ülkü
Computers in Biology and Medicine (2025) Vol. 186, pp. 109603-109603
Closed Access
Merve Pınar, A. Aktas, Eyüp Emre Ülkü
Computers in Biology and Medicine (2025) Vol. 186, pp. 109603-109603
Closed Access
A comprehensive framework for cyber threat detection: leveraging AI, NLP, and malware analysis
Nachaat Mohamed
International Journal of Information Technology (2025)
Closed Access
Nachaat Mohamed
International Journal of Information Technology (2025)
Closed Access
A Sustainable W-RLG Model for Attack Detection in Healthcare IoT Systems
Brij B. Gupta, Akshat Gaurav, Razaz Waheeb Attar, et al.
Sustainability (2024) Vol. 16, Iss. 8, pp. 3103-3103
Open Access | Times Cited: 3
Brij B. Gupta, Akshat Gaurav, Razaz Waheeb Attar, et al.
Sustainability (2024) Vol. 16, Iss. 8, pp. 3103-3103
Open Access | Times Cited: 3
LW-PWECC: Cryptographic Framework of Attack Detection and Secure Data Transmission in IoT
J Ranjith, K. Mahantesh, C N Abhilash
Journal of Robotics and Control (JRC) (2024) Vol. 5, Iss. 1, pp. 228-238
Open Access | Times Cited: 2
J Ranjith, K. Mahantesh, C N Abhilash
Journal of Robotics and Control (JRC) (2024) Vol. 5, Iss. 1, pp. 228-238
Open Access | Times Cited: 2
Deep Convolutional Neural Network for Active Intrusion Detection and Protect data from Passive Intrusion by Pascal Triangle
Abdulrahman Saad Alqahtani
Wireless Personal Communications (2024)
Closed Access | Times Cited: 1
Abdulrahman Saad Alqahtani
Wireless Personal Communications (2024)
Closed Access | Times Cited: 1
Unveiling the core of IoT: comprehensive review on data security challenges and mitigation strategies
Kawalpreet Kaur, Amanpreet Kaur, Yonis Gulzar, et al.
Frontiers in Computer Science (2024) Vol. 6
Open Access | Times Cited: 1
Kawalpreet Kaur, Amanpreet Kaur, Yonis Gulzar, et al.
Frontiers in Computer Science (2024) Vol. 6
Open Access | Times Cited: 1
Cybersecurity in Internet of Medical Vehicles: State-of-the-Art Analysis, Research Challenges and Future Perspectives
Chidambar Rao Bhukya, Prabhat Thakur, Bhavesh Raju Mudhivarthi, et al.
Sensors (2023) Vol. 23, Iss. 19, pp. 8107-8107
Open Access | Times Cited: 2
Chidambar Rao Bhukya, Prabhat Thakur, Bhavesh Raju Mudhivarthi, et al.
Sensors (2023) Vol. 23, Iss. 19, pp. 8107-8107
Open Access | Times Cited: 2
A Lightweight Convolutional Neural Network based network intrusion detection and classification method for Social Internet of Things
G. Murugesan, P. Maheswaravenkatesh
Research Square (Research Square) (2024)
Open Access
G. Murugesan, P. Maheswaravenkatesh
Research Square (Research Square) (2024)
Open Access
Intelligent Biometric Authentication-Based Intrusion Detection in Medical Cyber Physical System Using Deep Learning
Pandit Byomakesha Dash, Pooja Puspita Priyadarshani, Meltem Kurt Pehli̇vanoğlu
Intelligent systems reference library (2024), pp. 345-375
Closed Access
Pandit Byomakesha Dash, Pooja Puspita Priyadarshani, Meltem Kurt Pehli̇vanoğlu
Intelligent systems reference library (2024), pp. 345-375
Closed Access
Securing Healthcare Systems Integrating AI for Cybersecurity Solutions and Privacy Preservation
M. Diviya, R. Bhuvaneswari, M. Prabu, et al.
Advances in healthcare information systems and administration book series (2024), pp. 330-344
Closed Access
M. Diviya, R. Bhuvaneswari, M. Prabu, et al.
Advances in healthcare information systems and administration book series (2024), pp. 330-344
Closed Access
Artificial intelligence and cybercrime: implications for individuals and the healthcare sector
Scott Monteith, Tasha Glenn, John Geddes, et al.
The British Journal of Psychiatry (2024), pp. 1-3
Closed Access
Scott Monteith, Tasha Glenn, John Geddes, et al.
The British Journal of Psychiatry (2024), pp. 1-3
Closed Access
Ensuring patient safety in IoMT: A systematic literature review of behavior-based intrusion detection systems
Jordi Doménech, Isabel V. Martin-Faus, Saber Mhiri, et al.
Internet of Things (2024) Vol. 28, pp. 101420-101420
Open Access
Jordi Doménech, Isabel V. Martin-Faus, Saber Mhiri, et al.
Internet of Things (2024) Vol. 28, pp. 101420-101420
Open Access
An Effective Deep Learning-Based Intrusion Detection System for the Healthcare Environment
Balaji Karnam, S. Satheesh Kumar, Vivek Duraivelu, et al.
International Journal of Computational Intelligence and Applications (2024)
Closed Access
Balaji Karnam, S. Satheesh Kumar, Vivek Duraivelu, et al.
International Journal of Computational Intelligence and Applications (2024)
Closed Access
Design of Machine-Learning Framework for Cyber Attack Detection in Internet of Healthcare Things (IoHT): Critical Analysis
SURBHI SURBHI, Nupa Ram Chouhan, Neeraj Dahiya
(2024), pp. 59-71
Closed Access
SURBHI SURBHI, Nupa Ram Chouhan, Neeraj Dahiya
(2024), pp. 59-71
Closed Access
Cyber-Attack Detection in Healthcare Systems Based on Modified -Recurrent Neural Network Approach
Pradeep Chintale, Thomas Sure, Fardin Quazi, et al.
Communications in computer and information science (2024), pp. 213-224
Closed Access
Pradeep Chintale, Thomas Sure, Fardin Quazi, et al.
Communications in computer and information science (2024), pp. 213-224
Closed Access
Cross ML for Io(H)T Network Traffic Classification: A New Approach Towards Standardization
Emmanuel Song Shombot, Gilles Dusserre, Robert Bešťák, et al.
(2024), pp. 282-288
Closed Access
Emmanuel Song Shombot, Gilles Dusserre, Robert Bešťák, et al.
(2024), pp. 282-288
Closed Access
Rényi Differential Privacy Analysis of Graph-Based Federated Learning Under Internet of Health Things
Mohamed Amjath, Shagufta Henna
(2023), pp. 1-5
Closed Access
Mohamed Amjath, Shagufta Henna
(2023), pp. 1-5
Closed Access