
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Customised Intrusion Detection for an Industrial IoT Heterogeneous Network Based on Machine Learning Algorithms Called FTL-CID
Nasr Abosata, Saba Al–Rubaye, Gökhan İnalhan
Sensors (2022) Vol. 23, Iss. 1, pp. 321-321
Open Access | Times Cited: 21
Nasr Abosata, Saba Al–Rubaye, Gökhan İnalhan
Sensors (2022) Vol. 23, Iss. 1, pp. 321-321
Open Access | Times Cited: 21
Showing 21 citing articles:
Firefly algorithm based WSN-IoT security enhancement with machine learning for intrusion detection
M. Karthikeyan, D. Manimegalai, Karthikeyan Rajagopal
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 34
M. Karthikeyan, D. Manimegalai, Karthikeyan Rajagopal
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 34
DTL-IDS: An optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm
Shahid Latif, Wadii Boulila, Anis Koubâa, et al.
Journal of Network and Computer Applications (2023) Vol. 221, pp. 103784-103784
Open Access | Times Cited: 38
Shahid Latif, Wadii Boulila, Anis Koubâa, et al.
Journal of Network and Computer Applications (2023) Vol. 221, pp. 103784-103784
Open Access | Times Cited: 38
Towards RPL Attacks and Mitigation Taxonomy: Systematic Literature Review Approach
Hussah Albinali, Farag Azzedin
IEEE Transactions on Network and Service Management (2024) Vol. 21, Iss. 5, pp. 5215-5238
Closed Access | Times Cited: 13
Hussah Albinali, Farag Azzedin
IEEE Transactions on Network and Service Management (2024) Vol. 21, Iss. 5, pp. 5215-5238
Closed Access | Times Cited: 13
Combining Edge Computing-Assisted Internet of Things Security with Artificial Intelligence: Applications, Challenges, and Opportunities
Dulana Rupanetti, Naima Kaabouch
Applied Sciences (2024) Vol. 14, Iss. 16, pp. 7104-7104
Open Access | Times Cited: 9
Dulana Rupanetti, Naima Kaabouch
Applied Sciences (2024) Vol. 14, Iss. 16, pp. 7104-7104
Open Access | Times Cited: 9
Research trends in deep learning and machine learning for cloud computing security
Yehia Ibrahim Alzoubi, Alok Mishra, Ahmet E. Topcu
Artificial Intelligence Review (2024) Vol. 57, Iss. 5
Closed Access | Times Cited: 5
Yehia Ibrahim Alzoubi, Alok Mishra, Ahmet E. Topcu
Artificial Intelligence Review (2024) Vol. 57, Iss. 5
Closed Access | Times Cited: 5
Enhancing the Internet of Medical Things (IoMT) Security with Meta-Learning: A Performance-Driven Approach for Ensemble Intrusion Detection Systems
Mousa Alalhareth, Sungchul Hong
Sensors (2024) Vol. 24, Iss. 11, pp. 3519-3519
Open Access | Times Cited: 5
Mousa Alalhareth, Sungchul Hong
Sensors (2024) Vol. 24, Iss. 11, pp. 3519-3519
Open Access | Times Cited: 5
NFIoT-GATE-DTL IDS: Genetic algorithm-tuned ensemble of deep transfer learning for NetFlow-based intrusion detection system for internet of things
Jing Li, Hewan Chen, Mohd Shahizan Othman, et al.
Engineering Applications of Artificial Intelligence (2025) Vol. 143, pp. 110046-110046
Open Access
Jing Li, Hewan Chen, Mohd Shahizan Othman, et al.
Engineering Applications of Artificial Intelligence (2025) Vol. 143, pp. 110046-110046
Open Access
Advancements in training and deployment strategies for AI-based intrusion detection systems in IoT: a systematic literature review
S Kumar Reddy Mallidi, Rajeswara Rao Ramisetty
Discover Internet of Things (2025) Vol. 5, Iss. 1
Open Access
S Kumar Reddy Mallidi, Rajeswara Rao Ramisetty
Discover Internet of Things (2025) Vol. 5, Iss. 1
Open Access
A Heterogeneity-Aware Semi-Decentralized Model for a Lightweight Intrusion Detection System for IoT Networks Based on Federated Learning and BiLSTM
Shuroog Alsaleh, Mohamed El Bachir Menaï, Saad Al-Ahmadi
Sensors (2025) Vol. 25, Iss. 4, pp. 1039-1039
Open Access
Shuroog Alsaleh, Mohamed El Bachir Menaï, Saad Al-Ahmadi
Sensors (2025) Vol. 25, Iss. 4, pp. 1039-1039
Open Access
Design of a Federated Ensemble Model for Intrusion Detection in Distributed IIoT Networks for Enhancing Cybersecurity
Ayushi Chahal, Preeti Gulia, Nasib Singh Gill, et al.
Journal of Industrial Information Integration (2025), pp. 100800-100800
Closed Access
Ayushi Chahal, Preeti Gulia, Nasib Singh Gill, et al.
Journal of Industrial Information Integration (2025), pp. 100800-100800
Closed Access
Mitigating Denial of Service Attacks in RPL-Based IoT Environments: Trust-Based Approach
Farag Azzedin
IEEE Access (2023) Vol. 11, pp. 129077-129089
Open Access | Times Cited: 12
Farag Azzedin
IEEE Access (2023) Vol. 11, pp. 129077-129089
Open Access | Times Cited: 12
Binary Chimp Optimization Algorithm with ML Based Intrusion Detection for Secure IoT-Assisted Wireless Sensor Networks
Mohammed Aljebreen, Manal Abdullah Alohali, Muhammad Kashif Saeed, et al.
Sensors (2023) Vol. 23, Iss. 8, pp. 4073-4073
Open Access | Times Cited: 10
Mohammed Aljebreen, Manal Abdullah Alohali, Muhammad Kashif Saeed, et al.
Sensors (2023) Vol. 23, Iss. 8, pp. 4073-4073
Open Access | Times Cited: 10
Enhancing the security in IoT and IIoT networks: An intrusion detection scheme leveraging deep transfer learning
Basharat Ahmad, Zhaoliang Wu, Yongfeng Huang, et al.
Knowledge-Based Systems (2024) Vol. 305, pp. 112614-112614
Closed Access | Times Cited: 2
Basharat Ahmad, Zhaoliang Wu, Yongfeng Huang, et al.
Knowledge-Based Systems (2024) Vol. 305, pp. 112614-112614
Closed Access | Times Cited: 2
Federated Learning-based Routing Vulnerability Analysis and Attack Detection for Healthcare 4.0
K. Kowsalyadevi, N. Balaji
International journal of intelligent engineering and systems (2024) Vol. 17, Iss. 2, pp. 412-428
Open Access | Times Cited: 1
K. Kowsalyadevi, N. Balaji
International journal of intelligent engineering and systems (2024) Vol. 17, Iss. 2, pp. 412-428
Open Access | Times Cited: 1
An intrusion attack classification using bio-inspired optimization technique and ensemble learning model for edge computing environments
R. Mohemmed Yousuf, Mangayarkarasi Ramaiah
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1
R. Mohemmed Yousuf, Mangayarkarasi Ramaiah
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1
Optimized Deep Transfer Learning with Soft Voting Ensemble for Netflow Intrusion Detection Systems in Internet of Things
Jing Li, Hewan Chen, Shahizan Othman Mohd, et al.
(2024)
Closed Access
Jing Li, Hewan Chen, Shahizan Othman Mohd, et al.
(2024)
Closed Access
MCTE-RPL: A multi-context trust-based efficient RPL for IoT
Javad Mohajerani, Mokhtar Mohammadi Ghanatghestani, Malihe Hashemipour
Journal of Network and Computer Applications (2024) Vol. 229, pp. 103937-103937
Closed Access
Javad Mohajerani, Mokhtar Mohammadi Ghanatghestani, Malihe Hashemipour
Journal of Network and Computer Applications (2024) Vol. 229, pp. 103937-103937
Closed Access
SoK: Federated Learning based Network Intrusion Detection in 5G: Context, State of the Art and Challenges
Sara Chennoufi, Grégory Blanc, Houda Jmila, et al.
Proceedings of the 17th International Conference on Availability, Reliability and Security (2024), pp. 1-13
Open Access
Sara Chennoufi, Grégory Blanc, Houda Jmila, et al.
Proceedings of the 17th International Conference on Availability, Reliability and Security (2024), pp. 1-13
Open Access
Hybridization of Learning Techniques and Quantum Mechanism for IIoT Security: Applications, Challenges, and Prospects
Ismaeel A. Sikiru, Ahmed Dooguy Kora, Eugène C. Ezin, et al.
Electronics (2024) Vol. 13, Iss. 21, pp. 4153-4153
Open Access
Ismaeel A. Sikiru, Ahmed Dooguy Kora, Eugène C. Ezin, et al.
Electronics (2024) Vol. 13, Iss. 21, pp. 4153-4153
Open Access
Intrusion Detection System based on Pattern Recognition using CNN
K Azarudeen, Syam Kumar, T.V. Aswin Vijay, et al.
(2023)
Closed Access | Times Cited: 1
K Azarudeen, Syam Kumar, T.V. Aswin Vijay, et al.
(2023)
Closed Access | Times Cited: 1
Routing attack Detection using Ensemble Artificial Intelligence Model for IIoT
Ravi Bolleddula, Balakrishna Moku, Cheluchalamala Sai Vyshnavi, et al.
(2023), pp. 1-6
Closed Access
Ravi Bolleddula, Balakrishna Moku, Cheluchalamala Sai Vyshnavi, et al.
(2023), pp. 1-6
Closed Access