
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Fog-Assisted Deep-Learning-Empowered Intrusion Detection System for RPL-Based Resource-Constrained Smart Industries
Danish Attique, Hao Wang, Ping Wang
Sensors (2022) Vol. 22, Iss. 23, pp. 9416-9416
Open Access | Times Cited: 7
Danish Attique, Hao Wang, Ping Wang
Sensors (2022) Vol. 22, Iss. 23, pp. 9416-9416
Open Access | Times Cited: 7
Showing 7 citing articles:
A lightweight intrusion detection method for IoT based on deep learning and dynamic quantization
Zhendong Wang, Hui Chen, Shuxin Yang, et al.
PeerJ Computer Science (2023) Vol. 9, pp. e1569-e1569
Open Access | Times Cited: 27
Zhendong Wang, Hui Chen, Shuxin Yang, et al.
PeerJ Computer Science (2023) Vol. 9, pp. e1569-e1569
Open Access | Times Cited: 27
Botnet‐based IoT network traffic analysis using deep learning
N. Joychandra Singh, Nazrul Hoque, Kh. Robindro Singh, et al.
Security and Privacy (2023) Vol. 7, Iss. 2
Closed Access | Times Cited: 21
N. Joychandra Singh, Nazrul Hoque, Kh. Robindro Singh, et al.
Security and Privacy (2023) Vol. 7, Iss. 2
Closed Access | Times Cited: 21
Intrusion Detection in IoT Systems Using Denoising Autoencoder
Fatma S. Alrayes, Mohammed Zakariah, Syed Umar Amin, et al.
IEEE Access (2024) Vol. 12, pp. 122401-122425
Open Access | Times Cited: 3
Fatma S. Alrayes, Mohammed Zakariah, Syed Umar Amin, et al.
IEEE Access (2024) Vol. 12, pp. 122401-122425
Open Access | Times Cited: 3
Machine Learning-Based Intrusion Detection for Rare-Class Network Attacks
Yu Yang, Yuheng Gu, Yu Yan
Electronics (2023) Vol. 12, Iss. 18, pp. 3911-3911
Open Access | Times Cited: 8
Yu Yang, Yuheng Gu, Yu Yan
Electronics (2023) Vol. 12, Iss. 18, pp. 3911-3911
Open Access | Times Cited: 8
Deep Learning-Based Intrusion Detection for Rare Class Network Attacks
Yang Yu, Yuheng Gu, Yu Yan
(2023)
Open Access | Times Cited: 2
Yang Yu, Yuheng Gu, Yu Yan
(2023)
Open Access | Times Cited: 2
A Bibliometric Analysis of Research on Techniques for Network Communications Security
Ismaeel A. Sikiru, Michel Dossou
(2023), pp. 257-262
Closed Access | Times Cited: 1
Ismaeel A. Sikiru, Michel Dossou
(2023), pp. 257-262
Closed Access | Times Cited: 1
RPL Routing Metrics for 5G Networks: Systematic Review in IIoT
Mario Armando Bonilla Brito, Daladier Jabba
(2023), pp. 1-6
Closed Access
Mario Armando Bonilla Brito, Daladier Jabba
(2023), pp. 1-6
Closed Access