OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Showing 1-25 of 88 citing articles:

Survey on Intrusion Detection Systems Based on Machine Learning Techniques for the Protection of Critical Infrastructure
Andrea Pinto, Luis-Carlos Herrera, Yezid Donoso, et al.
Sensors (2023) Vol. 23, Iss. 5, pp. 2415-2415
Open Access | Times Cited: 62

Detection of Real-Time Malicious Intrusions and Attacks in IoT Empowered Cybersecurity Infrastructures
Irfan Ali Kandhro, Sultan M. Alanazi, Fayyaz Ali, et al.
IEEE Access (2023) Vol. 11, pp. 9136-9148
Open Access | Times Cited: 49

Enhancing intrusion detection in IoT networks using machine learning-based feature selection and ensemble models
Ayoob Almotairi, Samer Atawneh, Osama A. Khashan, et al.
Systems Science & Control Engineering (2024) Vol. 12, Iss. 1
Open Access | Times Cited: 16

DANTD: A Deep Abnormal Network Traffic Detection Model for Security of Industrial Internet of Things Using High-Order Features
Guolong Shi, Xinyi Shen, Fuke Xiao, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 24, pp. 21143-21153
Closed Access | Times Cited: 29

A survey on federated learning for security and privacy in healthcare applications
Kristtopher K. Coelho, Michele Nogueira, Alex Borges Vieira, et al.
Computer Communications (2023) Vol. 207, pp. 113-127
Closed Access | Times Cited: 22

IoT-PRIDS: Leveraging packet representations for intrusion detection in IoT networks
Alireza Zohourian, Sajjad Dadkhah, Heather Molyneaux, et al.
Computers & Security (2024) Vol. 146, pp. 104034-104034
Open Access | Times Cited: 12

Exploring Edge TPU for Network Intrusion Detection in IoT
Seyedehfaezeh Hosseininoorbin, Siamak Layeghy, Mohanad Sarhan, et al.
Journal of Parallel and Distributed Computing (2023)
Closed Access | Times Cited: 18

Detecting Cyber Threats With a Graph-Based NIDPS
Brendan Ooi Tze Wen, Najihah Syahriza, Nicholas Chan Wei Xian, et al.
Advances in logistics, operations, and management science book series (2023), pp. 36-74
Closed Access | Times Cited: 16

SmartSentry: Cyber Threat Intelligence in Industrial IoT
Sapna Sadhwani, Urvi Kavan Modi, Raja Muthalagu, et al.
IEEE Access (2024) Vol. 12, pp. 34720-34740
Open Access | Times Cited: 5

Advancements in training and deployment strategies for AI-based intrusion detection systems in IoT: a systematic literature review
S Kumar Reddy Mallidi, Rajeswara Rao Ramisetty
Discover Internet of Things (2025) Vol. 5, Iss. 1
Open Access

An Extensive Review of Machine Learning and Deep Learning Techniques on Network Intrusion Detection for IoT
Supongmen Walling, Sibesh Lodh
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 2
Closed Access

HIDS-RPL: A Hybrid Deep Learning-Based Intrusion Detection System for RPL in Internet of Medical Thing Networks
Abdelwahed Berguiga, Ahlem Harchay, Ayman Massaoudi
IEEE Access (2025) Vol. 13, pp. 38404-38429
Open Access

Evaluation of contemporary intrusion detection systems for internet of things environment
Vandana Choudhary, Sarvesh Tanwar, Tanupriya Choudhury
Multimedia Tools and Applications (2023) Vol. 83, Iss. 3, pp. 7541-7581
Closed Access | Times Cited: 10

Embedded machine learning of IoT streams to promote early detection of unsafe environments
Eduardo Illueca Fernández, Antonio J. Jara, Jesualdo Tomás Fernández‐Breis
Internet of Things (2024) Vol. 25, pp. 101128-101128
Open Access | Times Cited: 3

Optimal Deep Learning Based Intruder Identification in Industrial Internet of Things Environment
Khaled M. Alalayah, Fatma S. Alrayes, Jaber S. Alzahrani, et al.
Computer Systems Science and Engineering (2023) Vol. 46, Iss. 3, pp. 3121-3139
Open Access | Times Cited: 9

Optimization algorithms in security and privacy-preserving data disturbance for collaborative edge computing social IoT deep learning architectures
Mythili Boopathi, Sachin Kumar Gupta, A. N. Mohammed Zabeeulla, et al.
Soft Computing (2023)
Open Access | Times Cited: 8

Computer Network Virus Defense with Data Mining-based Active Protection
Xiaohong Li, Yang Li, Hong He
Scalable Computing Practice and Experience (2024) Vol. 25, Iss. 1, pp. 45-54
Open Access | Times Cited: 2

A Consistent Augmented Stacking Polynomial Optimized Tool (ASPOT) for Improving Security of Cloud-IoT Systems
Divya Ramachandran, R. Chithambaramani, S. Sankar Ganesh, et al.
Journal of Advanced Research in Applied Sciences and Engineering Technology (2024) Vol. 37, Iss. 1, pp. 16-36
Open Access | Times Cited: 2

Adaptive Marine Predator Optimization Algorithm (AOMA)-Deep Supervised Learning Classification (DSLC) Based IDS Framework for MANET Security
M. Sahaya Sheela, A. Gnana Soundari, Aditya Mudigonda, et al.
Intelligent and Converged Networks (2024) Vol. 5, Iss. 1, pp. 1-18
Open Access | Times Cited: 2

Comparative Analysis of Machine Learning Models for Intrusion Detection in Internet of Things Networks Using the RT-IoT2022 Dataset
Gregorius Airlangga
MALCOM Indonesian Journal of Machine Learning and Computer Science (2024) Vol. 4, Iss. 2, pp. 656-662
Open Access | Times Cited: 2

CVS-FLN: a novel IoT-IDS model based on metaheuristic feature selection and neural network classification model
R. Geetha, A. Jegatheesan, Rajesh Kumar Dhanaraj, et al.
Multimedia Tools and Applications (2024) Vol. 83, Iss. 39, pp. 86557-86591
Closed Access | Times Cited: 2

Using Machine Learning Algorithms in Intrusion Detection Systems: A Review
Mazin S. Mohammed, Hasanien Ali Talib
Tikrit Journal of Pure Science (2024) Vol. 29, Iss. 3, pp. 63-74
Open Access | Times Cited: 2

A Bibliometric Review of Intrusion Detection Research in IoT: Evolution, Collaboration, and Emerging Trends
Nikolaj Goranin, Simran Kaur Hora, Antanas Čenys
Electronics (2024) Vol. 13, Iss. 16, pp. 3210-3210
Open Access | Times Cited: 2

Implementing Machine Learning-based Autonomic Cyber Defense for IoT-enabled Healthcare Devices
M. Manimaran, Murali Dhar M S, Roger Pedro Norabuena Figueroa, et al.
Journal of Artificial Intelligence and Technology (2023)
Open Access | Times Cited: 6

Network Security System in Mobile Edge Computing-to-IoMT Networks Using Distributed Approach
Eric Gyamfi, James Adu Ansere, Mohsin Kamal
Advances in information security (2023), pp. 171-191
Closed Access | Times Cited: 5

Page 1 - Next Page

Scroll to top