
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Towards an Explainable Universal Feature Set for IoT Intrusion Detection
Mohammed M. Alani, Ali Miri
Sensors (2022) Vol. 22, Iss. 15, pp. 5690-5690
Open Access | Times Cited: 31
Mohammed M. Alani, Ali Miri
Sensors (2022) Vol. 22, Iss. 15, pp. 5690-5690
Open Access | Times Cited: 31
Showing 1-25 of 31 citing articles:
An explainable efficient flow-based Industrial IoT intrusion detection system
Mohammed M. Alani
Computers & Electrical Engineering (2023) Vol. 108, pp. 108732-108732
Closed Access | Times Cited: 25
Mohammed M. Alani
Computers & Electrical Engineering (2023) Vol. 108, pp. 108732-108732
Closed Access | Times Cited: 25
VBQ-Net: A Novel Vectorization-Based Boost Quantized Network Model for Maximizing the Security Level of IoT System to Prevent Intrusions
Ganeshkumar Perumal, S. Gopalakrishnan, Qaisar Abbas, et al.
Systems (2023) Vol. 11, Iss. 8, pp. 436-436
Open Access | Times Cited: 16
Ganeshkumar Perumal, S. Gopalakrishnan, Qaisar Abbas, et al.
Systems (2023) Vol. 11, Iss. 8, pp. 436-436
Open Access | Times Cited: 16
HYRIDE: HYbrid and Robust Intrusion DEtection Approach for Enhancing Cybersecurity in Industry 4.0
Shubham Srivastav, Amit K. Shukla, Sandeep Kumar, et al.
Internet of Things (2025), pp. 101492-101492
Open Access
Shubham Srivastav, Amit K. Shukla, Sandeep Kumar, et al.
Internet of Things (2025), pp. 101492-101492
Open Access
Explainable artificial intelligence models in intrusion detection systems
Samed Al, Şeref Sağıroğlu
Engineering Applications of Artificial Intelligence (2025) Vol. 144, pp. 110145-110145
Closed Access
Samed Al, Şeref Sağıroğlu
Engineering Applications of Artificial Intelligence (2025) Vol. 144, pp. 110145-110145
Closed Access
Hybrid CNN–BiLSTM–DNN Approach for Detecting Cybersecurity Threats in IoT Networks
Bright Agbor Agbor, Bliss Utibe-Abasi Stephen, Philip Asuquo, et al.
Computers (2025) Vol. 14, Iss. 2, pp. 58-58
Open Access
Bright Agbor Agbor, Bliss Utibe-Abasi Stephen, Philip Asuquo, et al.
Computers (2025) Vol. 14, Iss. 2, pp. 58-58
Open Access
MA_BiRAE - Malware analysis and detection technique using adversarial learning and deep learning
Surbhi Prakash, Amar Kumar Mohapatra
Journal of Information Security and Applications (2025) Vol. 90, pp. 104009-104009
Closed Access
Surbhi Prakash, Amar Kumar Mohapatra
Journal of Information Security and Applications (2025) Vol. 90, pp. 104009-104009
Closed Access
ARP-PROBE: An ARP spoofing detector for Internet of Things networks using explainable deep learning
Mohammed M. Alani, Ali Ismail Awad, Ezedin Barka
Internet of Things (2023) Vol. 23, pp. 100861-100861
Closed Access | Times Cited: 11
Mohammed M. Alani, Ali Ismail Awad, Ezedin Barka
Internet of Things (2023) Vol. 23, pp. 100861-100861
Closed Access | Times Cited: 11
XRecon: An Explainbale IoT Reconnaissance Attack Detection System Based on Ensemble Learning
Mohammed M. Alani, Ernesto Damiani
Sensors (2023) Vol. 23, Iss. 11, pp. 5298-5298
Open Access | Times Cited: 10
Mohammed M. Alani, Ernesto Damiani
Sensors (2023) Vol. 23, Iss. 11, pp. 5298-5298
Open Access | Times Cited: 10
International Journal on Cybernetics & Informatics
Vishal Karanam
International Journal on Cybernetics & Informatics (2024)
Open Access | Times Cited: 3
Vishal Karanam
International Journal on Cybernetics & Informatics (2024)
Open Access | Times Cited: 3
HH-NIDS: Heterogeneous Hardware-Based Network Intrusion Detection Framework for IoT Security
Duc‐Minh Ngo, Dominic Lightbody, Andriy Temko, et al.
Future Internet (2022) Vol. 15, Iss. 1, pp. 9-9
Open Access | Times Cited: 11
Duc‐Minh Ngo, Dominic Lightbody, Andriy Temko, et al.
Future Internet (2022) Vol. 15, Iss. 1, pp. 9-9
Open Access | Times Cited: 11
MAC Protocol Based IoT Network Intrusion Detection Using Improved Efficient Shuffle Bidirectional COOT Channel Attention Network
Nanavath Kiran Singh Nayak, Budhaditya Bhattacharyya
IEEE Access (2023) Vol. 11, pp. 77385-77402
Open Access | Times Cited: 6
Nanavath Kiran Singh Nayak, Budhaditya Bhattacharyya
IEEE Access (2023) Vol. 11, pp. 77385-77402
Open Access | Times Cited: 6
A novel hybrid optimization enabled robust CNN algorithm for an IoT network intrusion detection approach
Ahmed Bahaa, Abdalla Sayed, Laila Elfangary, et al.
PLoS ONE (2022) Vol. 17, Iss. 12, pp. e0278493-e0278493
Open Access | Times Cited: 9
Ahmed Bahaa, Abdalla Sayed, Laila Elfangary, et al.
PLoS ONE (2022) Vol. 17, Iss. 12, pp. e0278493-e0278493
Open Access | Times Cited: 9
Traffic Classification of IoT Devices by Utilizing Spike Neural Network Learning Approach
Ahmed R. Zarzoor, Nadia Adnan Shiltagh Al-Jamali, Ibtesam R. K. Al-Saedi
Mathematical Modelling and Engineering Problems (2023) Vol. 10, Iss. 2, pp. 639-646
Open Access | Times Cited: 4
Ahmed R. Zarzoor, Nadia Adnan Shiltagh Al-Jamali, Ibtesam R. K. Al-Saedi
Mathematical Modelling and Engineering Problems (2023) Vol. 10, Iss. 2, pp. 639-646
Open Access | Times Cited: 4
GDE model: A variable intrusion detection model for few-shot attack
Yu Yan, Yu Yang, Fang Shen, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 10, pp. 101796-101796
Open Access | Times Cited: 4
Yu Yan, Yu Yang, Fang Shen, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 10, pp. 101796-101796
Open Access | Times Cited: 4
Network Attack Detection on IoT Devices Using 2D-CNN Models
Duc‐Minh Ngo, Dominic Lightbody, Andriy Temko, et al.
Lecture notes on data engineering and communications technologies (2023), pp. 237-247
Closed Access | Times Cited: 4
Duc‐Minh Ngo, Dominic Lightbody, Andriy Temko, et al.
Lecture notes on data engineering and communications technologies (2023), pp. 237-247
Closed Access | Times Cited: 4
From Bytes to Insights: A Systematic Literature Review on Unraveling IDS Datasets for Enhanced Cybersecurity Understanding
Akbar Khanan, Yasir Abdelgadir Mohamed, Abdul Hakim H. M. Mohamed, et al.
IEEE Access (2024) Vol. 12, pp. 59289-59317
Open Access | Times Cited: 1
Akbar Khanan, Yasir Abdelgadir Mohamed, Abdul Hakim H. M. Mohamed, et al.
IEEE Access (2024) Vol. 12, pp. 59289-59317
Open Access | Times Cited: 1
Cybersecurity Analytics: Toward an Efficient ML-Based Network Intrusion Detection System (NIDS)
Tariq Mouatassim, Hassan El Ghazi, Khadija Bouzaachane, et al.
Lecture notes in computer science (2024), pp. 267-284
Closed Access | Times Cited: 1
Tariq Mouatassim, Hassan El Ghazi, Khadija Bouzaachane, et al.
Lecture notes in computer science (2024), pp. 267-284
Closed Access | Times Cited: 1
IoT-Traffic Networks Effective Features Based on NSGA-II Technique
Sahar Jasim Mohammed, Mohammed Sami Mohammed, Nihad Mahmoud Nasir
Journal of Internet Services and Information Security (2024) Vol. 14, Iss. 2, pp. 247-267
Open Access | Times Cited: 1
Sahar Jasim Mohammed, Mohammed Sami Mohammed, Nihad Mahmoud Nasir
Journal of Internet Services and Information Security (2024) Vol. 14, Iss. 2, pp. 247-267
Open Access | Times Cited: 1
An Efficient Flow-Based Anomaly Detection System for Enhanced Security in IoT Networks
Ibrahim Mutambik
Sensors (2024) Vol. 24, Iss. 22, pp. 7408-7408
Open Access | Times Cited: 1
Ibrahim Mutambik
Sensors (2024) Vol. 24, Iss. 22, pp. 7408-7408
Open Access | Times Cited: 1
Evaluating Feature Relevance XAI in Network Intrusion Detection
Julian Tritscher, M. Wolf, Andreas Hotho, et al.
Communications in computer and information science (2023), pp. 483-497
Closed Access | Times Cited: 3
Julian Tritscher, M. Wolf, Andreas Hotho, et al.
Communications in computer and information science (2023), pp. 483-497
Closed Access | Times Cited: 3
Comparative Analysis of State-of-the-Art Attack Detection Models
Priyanka Kumari, Veenu Mangat, Anshul Kumar Singh
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2023)
Closed Access | Times Cited: 2
Priyanka Kumari, Veenu Mangat, Anshul Kumar Singh
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2023)
Closed Access | Times Cited: 2
Comparative Analysis of Various Feature Extraction Methods on IoT 2023
M. Vergin Raja Sarobin, J Ranjith, D Ashwath, et al.
Procedia Computer Science (2024) Vol. 233, pp. 670-681
Open Access
M. Vergin Raja Sarobin, J Ranjith, D Ashwath, et al.
Procedia Computer Science (2024) Vol. 233, pp. 670-681
Open Access
Optimizing Feature Selection in Intrusion Detection Using Fisher Score Algorithm: An Analytical Study
Ganesh Rathod, Vikrant Sabnis, Jay Kumar Jain
Research Square (Research Square) (2024)
Open Access
Ganesh Rathod, Vikrant Sabnis, Jay Kumar Jain
Research Square (Research Square) (2024)
Open Access
Feature Engineering Considerations in IoT: A Case Study
Jean-Marie Kuate Fotso, Ismael Abbo, Franklin Tchakounté, et al.
(2024), pp. 97-107
Closed Access
Jean-Marie Kuate Fotso, Ismael Abbo, Franklin Tchakounté, et al.
(2024), pp. 97-107
Closed Access
Improving IoT Botnet Attack Detection using Machine Learning: Comparative Analysis of Feature Selection Methods and Classifiers in Intrusion Detection Systems
Ganesh Rathod, Vikrant Sabnis, Jay Kumar Jain
(2024), pp. 1-8
Closed Access
Ganesh Rathod, Vikrant Sabnis, Jay Kumar Jain
(2024), pp. 1-8
Closed Access