OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Customised Intrusion Detection for an Industrial IoT Heterogeneous Network Based on Machine Learning Algorithms Called FTL-CID
Nasr Abosata, Saba Al–Rubaye, Gökhan İnalhan
Sensors (2022) Vol. 23, Iss. 1, pp. 321-321
Open Access | Times Cited: 21

Showing 21 citing articles:

Firefly algorithm based WSN-IoT security enhancement with machine learning for intrusion detection
M. Karthikeyan, D. Manimegalai, Karthikeyan Rajagopal
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 34

DTL-IDS: An optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm
Shahid Latif, Wadii Boulila, Anis Koubâa, et al.
Journal of Network and Computer Applications (2023) Vol. 221, pp. 103784-103784
Open Access | Times Cited: 38

Towards RPL Attacks and Mitigation Taxonomy: Systematic Literature Review Approach
Hussah Albinali, Farag Azzedin
IEEE Transactions on Network and Service Management (2024) Vol. 21, Iss. 5, pp. 5215-5238
Closed Access | Times Cited: 13

Combining Edge Computing-Assisted Internet of Things Security with Artificial Intelligence: Applications, Challenges, and Opportunities
Dulana Rupanetti, Naima Kaabouch
Applied Sciences (2024) Vol. 14, Iss. 16, pp. 7104-7104
Open Access | Times Cited: 9

Research trends in deep learning and machine learning for cloud computing security
Yehia Ibrahim Alzoubi, Alok Mishra, Ahmet E. Topcu
Artificial Intelligence Review (2024) Vol. 57, Iss. 5
Closed Access | Times Cited: 5

NFIoT-GATE-DTL IDS: Genetic algorithm-tuned ensemble of deep transfer learning for NetFlow-based intrusion detection system for internet of things
Jing Li, Hewan Chen, Mohd Shahizan Othman, et al.
Engineering Applications of Artificial Intelligence (2025) Vol. 143, pp. 110046-110046
Open Access

Advancements in training and deployment strategies for AI-based intrusion detection systems in IoT: a systematic literature review
S Kumar Reddy Mallidi, Rajeswara Rao Ramisetty
Discover Internet of Things (2025) Vol. 5, Iss. 1
Open Access

Design of a Federated Ensemble Model for Intrusion Detection in Distributed IIoT Networks for Enhancing Cybersecurity
Ayushi Chahal, Preeti Gulia, Nasib Singh Gill, et al.
Journal of Industrial Information Integration (2025), pp. 100800-100800
Closed Access

Mitigating Denial of Service Attacks in RPL-Based IoT Environments: Trust-Based Approach
Farag Azzedin
IEEE Access (2023) Vol. 11, pp. 129077-129089
Open Access | Times Cited: 12

Binary Chimp Optimization Algorithm with ML Based Intrusion Detection for Secure IoT-Assisted Wireless Sensor Networks
Mohammed Aljebreen, Manal Abdullah Alohali, Muhammad Kashif Saeed, et al.
Sensors (2023) Vol. 23, Iss. 8, pp. 4073-4073
Open Access | Times Cited: 10

Enhancing the security in IoT and IIoT networks: An intrusion detection scheme leveraging deep transfer learning
Basharat Ahmad, Zhaoliang Wu, Yongfeng Huang, et al.
Knowledge-Based Systems (2024) Vol. 305, pp. 112614-112614
Closed Access | Times Cited: 2

Federated Learning-based Routing Vulnerability Analysis and Attack Detection for Healthcare 4.0
K. Kowsalyadevi, N. Balaji
International journal of intelligent engineering and systems (2024) Vol. 17, Iss. 2, pp. 412-428
Open Access | Times Cited: 1

An intrusion attack classification using bio-inspired optimization technique and ensemble learning model for edge computing environments
R. Mohemmed Yousuf, Mangayarkarasi Ramaiah
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1

MCTE-RPL: A multi-context trust-based efficient RPL for IoT
Javad Mohajerani, Mokhtar Mohammadi Ghanatghestani, Malihe Hashemipour
Journal of Network and Computer Applications (2024) Vol. 229, pp. 103937-103937
Closed Access

SoK: Federated Learning based Network Intrusion Detection in 5G: Context, State of the Art and Challenges
Sara Chennoufi, Grégory Blanc, Houda Jmila, et al.
Proceedings of the 17th International Conference on Availability, Reliability and Security (2024), pp. 1-13
Open Access

Hybridization of Learning Techniques and Quantum Mechanism for IIoT Security: Applications, Challenges, and Prospects
Ismaeel A. Sikiru, Ahmed Dooguy Kora, Eugène C. Ezin, et al.
Electronics (2024) Vol. 13, Iss. 21, pp. 4153-4153
Open Access

Intrusion Detection System based on Pattern Recognition using CNN
K Azarudeen, Syam Kumar, T.V. Aswin Vijay, et al.
(2023)
Closed Access | Times Cited: 1

Routing attack Detection using Ensemble Artificial Intelligence Model for IIoT
Ravi Bolleddula, Balakrishna Moku, Cheluchalamala Sai Vyshnavi, et al.
(2023), pp. 1-6
Closed Access

Page 1

Scroll to top