
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Malware Detection in Internet of Things (IoT) Devices Using Deep Learning
Sharjeel Riaz, Shahzad Latif, Syed Muhammad Usman, et al.
Sensors (2022) Vol. 22, Iss. 23, pp. 9305-9305
Open Access | Times Cited: 24
Sharjeel Riaz, Shahzad Latif, Syed Muhammad Usman, et al.
Sensors (2022) Vol. 22, Iss. 23, pp. 9305-9305
Open Access | Times Cited: 24
Showing 24 citing articles:
A Multi-CPU Architecture IoT Malware Detection Approach in Cyber-Physical Power System
Xichao Zhao, Zhuofan Tang, Jie Shi, et al.
Lecture notes in electrical engineering (2025), pp. 546-553
Closed Access
Xichao Zhao, Zhuofan Tang, Jie Shi, et al.
Lecture notes in electrical engineering (2025), pp. 546-553
Closed Access
Hybrid CNN–BiLSTM–DNN Approach for Detecting Cybersecurity Threats in IoT Networks
Bright Agbor Agbor, Bliss Utibe-Abasi Stephen, Philip Asuquo, et al.
Computers (2025) Vol. 14, Iss. 2, pp. 58-58
Open Access
Bright Agbor Agbor, Bliss Utibe-Abasi Stephen, Philip Asuquo, et al.
Computers (2025) Vol. 14, Iss. 2, pp. 58-58
Open Access
A Review of the Authentication Techniques for Internet of Things Devices in Smart Cities: Opportunities, Challenges, and Future Directions
Ashwag Alotaibi, Huda Aldawghan, Ahmed Aljughaiman
Sensors (2025) Vol. 25, Iss. 6, pp. 1649-1649
Open Access
Ashwag Alotaibi, Huda Aldawghan, Ahmed Aljughaiman
Sensors (2025) Vol. 25, Iss. 6, pp. 1649-1649
Open Access
Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection Techniques and Recommended Prevention Approach
Omar Alshamsi, Khaled Shaalan, Usman Javed Butt
Information (2024) Vol. 15, Iss. 10, pp. 631-631
Open Access | Times Cited: 3
Omar Alshamsi, Khaled Shaalan, Usman Javed Butt
Information (2024) Vol. 15, Iss. 10, pp. 631-631
Open Access | Times Cited: 3
OEDL: an optimized ensemble deep learning method for the prediction of acute ischemic stroke prognoses using union features
Wei Ye, Xicheng Chen, Pengpeng Li, et al.
Frontiers in Neurology (2023) Vol. 14
Open Access | Times Cited: 5
Wei Ye, Xicheng Chen, Pengpeng Li, et al.
Frontiers in Neurology (2023) Vol. 14
Open Access | Times Cited: 5
A Survey on Artificial Intelligence-Based Cyber Security in IoT Networks
A. K. Tyagi, Aniket Singh, Amit Yadav, et al.
(2024), pp. 238-243
Closed Access | Times Cited: 1
A. K. Tyagi, Aniket Singh, Amit Yadav, et al.
(2024), pp. 238-243
Closed Access | Times Cited: 1
Malware Detection Using Deep Learning Approaches
Ahmad Shah, Liqaa Nawaf
(2024)
Open Access | Times Cited: 1
Ahmad Shah, Liqaa Nawaf
(2024)
Open Access | Times Cited: 1
A comprehensive survey on deep learning‐based intrusion detection systems in Internet of Things (IoT )
Qasem Abu Al‐Haija, Ayat Droos
Expert Systems (2024)
Closed Access | Times Cited: 1
Qasem Abu Al‐Haija, Ayat Droos
Expert Systems (2024)
Closed Access | Times Cited: 1
IoT Security, Future Challenges, and Open Issues
Noshina Tariq, Tehreem Saboor, Muhammad Ashraf, et al.
Advances in logistics, operations, and management science book series (2023), pp. 116-140
Closed Access | Times Cited: 3
Noshina Tariq, Tehreem Saboor, Muhammad Ashraf, et al.
Advances in logistics, operations, and management science book series (2023), pp. 116-140
Closed Access | Times Cited: 3
Internet of Things (IoT) Security Enhancement Using XGboost Machine Learning Techniques
Dana F. Doghramachi, Siddeeq Y. Ameen
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 77, Iss. 1, pp. 717-732
Open Access | Times Cited: 2
Dana F. Doghramachi, Siddeeq Y. Ameen
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 77, Iss. 1, pp. 717-732
Open Access | Times Cited: 2
MalAware: A tabletop exercise for malware security awareness education and incident response training
Giddeon Njamngang Angafor, Iryna Yevseyeva, Λέανδρος Μαγλαράς
Internet of Things and Cyber-Physical Systems (2024) Vol. 4, pp. 280-292
Open Access
Giddeon Njamngang Angafor, Iryna Yevseyeva, Λέανδρος Μαγλαράς
Internet of Things and Cyber-Physical Systems (2024) Vol. 4, pp. 280-292
Open Access
Resampled Correlation-Based Feature Descriptors: A Novel Approach to Enhancing Malware Detection Capabilities
Albert Ankomah Dodoo, Michael Koranteng, Daniel Kwame Amissah, et al.
Research Square (Research Square) (2024)
Open Access
Albert Ankomah Dodoo, Michael Koranteng, Daniel Kwame Amissah, et al.
Research Square (Research Square) (2024)
Open Access
A Survey on SCADA’s Security, Concerns and Attacks
Tanya Singh, J.I. Sheeba, S. Pradeep Devaneyan
Communications in computer and information science (2024), pp. 440-447
Closed Access
Tanya Singh, J.I. Sheeba, S. Pradeep Devaneyan
Communications in computer and information science (2024), pp. 440-447
Closed Access
Malware Detection and Classification for Internet of Things Using Self-Attention Based Long Short-Term Memory
K. Sudhakar, Saif O. Husain, Dhivakar Babu, et al.
(2024), pp. 1-5
Closed Access
K. Sudhakar, Saif O. Husain, Dhivakar Babu, et al.
(2024), pp. 1-5
Closed Access
Graph Representation Federated Learning for Malware Detection in Internet of Health Things
Mohamed Amjath, Shagufta Henna
(2024)
Closed Access
Mohamed Amjath, Shagufta Henna
(2024)
Closed Access
Unifying RNN and KNN for Enhancing Mirai Attack Detection in IoT Networks
Ankita Kumari, Deepali Gupta, Mudita Uppal
(2024), pp. 1-5
Closed Access
Ankita Kumari, Deepali Gupta, Mudita Uppal
(2024), pp. 1-5
Closed Access
Integrating Advanced Healthcare AI into Higher Education of Smart Cities: Skin Cancer Classification with Custom Vision Transformers
Syed Muhammad Usman, Syed Nehal Hassan Shah, Nevena Dicheva, et al.
Lecture notes in civil engineering (2024), pp. 224-231
Closed Access
Syed Muhammad Usman, Syed Nehal Hassan Shah, Nevena Dicheva, et al.
Lecture notes in civil engineering (2024), pp. 224-231
Closed Access
Chaos Game Optimization with stacked LSTM sequence to sequence autoencoder for malware detection in IoT cloud environment
Moneerah Alotaibi, Ghadah Aldehim, Mashael Maashi, et al.
Alexandria Engineering Journal (2024) Vol. 112, pp. 688-700
Open Access
Moneerah Alotaibi, Ghadah Aldehim, Mashael Maashi, et al.
Alexandria Engineering Journal (2024) Vol. 112, pp. 688-700
Open Access
Graph Representation Federated Learning for Malware Detection in Internet of Health Things
Mohamed Amjath, Shagufta Henna, Upaka Rathnayake
Results in Engineering (2024), pp. 103651-103651
Open Access
Mohamed Amjath, Shagufta Henna, Upaka Rathnayake
Results in Engineering (2024), pp. 103651-103651
Open Access
Pragmatic Way of Analyzing Malware Attacks Detection in IoT Devices Using Deep Learning
Moushumi Barman, Bobby Sharma
Lecture notes in networks and systems (2023), pp. 677-691
Closed Access
Moushumi Barman, Bobby Sharma
Lecture notes in networks and systems (2023), pp. 677-691
Closed Access
Internet of Things Assisted Automated Ransomware Recognition using Harmony Search Algorithm with Deep Learning
S. Karunakaran, M. Manimaraboopathy, M. Maharajothi, et al.
(2023), pp. 475-480
Closed Access
S. Karunakaran, M. Manimaraboopathy, M. Maharajothi, et al.
(2023), pp. 475-480
Closed Access
A SURVEY ON PROMISING DATASETS AND RECENT MACHINE LEARNING APPROACHES FOR THE CLASSIFICATION OF ATTACKS IN INTERNET OF THINGS
Usman Adedayo Adeniyi, Akinyemi Moruff OYELAKIN
Journal of Information Technology and Computing (2023) Vol. 4, Iss. 2, pp. 31-38
Open Access
Usman Adedayo Adeniyi, Akinyemi Moruff OYELAKIN
Journal of Information Technology and Computing (2023) Vol. 4, Iss. 2, pp. 31-38
Open Access
Machine Learning based Malware Detection for IoT Networks
Shiva Shankar Mutupuri, Vallabhaneni Preetam, Dudugu Aditya, et al.
(2023), pp. 298-303
Closed Access
Shiva Shankar Mutupuri, Vallabhaneni Preetam, Dudugu Aditya, et al.
(2023), pp. 298-303
Closed Access
Detection and Classification of IoT Malware from MQTT Dataset
Umang Garg, Anil Dhasmana, Shreya Agrawal, et al.
(2023), pp. 1-6
Closed Access
Umang Garg, Anil Dhasmana, Shreya Agrawal, et al.
(2023), pp. 1-6
Closed Access