OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Process Mining Error Detection for Securing the IoT System
Subarna Shakya
Journal of ISMAC (2020) Vol. 2, Iss. 3, pp. 147-153
Open Access | Times Cited: 26

Showing 1-25 of 26 citing articles:

Big Data Analysis and Perturbation using Data Mining Algorithm
Haoxiang Wang, S. Smys
Journal of Soft Computing Paradigm (2021) Vol. 3, Iss. 1, pp. 19-28
Open Access | Times Cited: 159

CNN based Flood Management System with IoT Sensors and Cloud Data
S. Smys, Abul Basar, Haoxiang Wang
Journal of Artificial Intelligence and Capsule Networks (2020) Vol. 2, Iss. 4, pp. 194-200
Open Access | Times Cited: 40

Industrial Quality Prediction System through Data Mining Algorithm
P. Karthigaikumar
Journal of Electronics and Informatics (2021) Vol. 3, Iss. 2, pp. 126-137
Open Access | Times Cited: 28

Real-Time Anomaly Detection of Network Traffic Based on CNN
Liu Hai-tao, Haifeng Wang
Symmetry (2023) Vol. 15, Iss. 6, pp. 1205-1205
Open Access | Times Cited: 11

Hybrid Machine Learning Approach to Detect the Changes in SAR Images for Salvation of Spectral Constriction Problem
R. Dhaya
Journal of Innovative Image Processing (2021) Vol. 3, Iss. 2, pp. 118-130
Open Access | Times Cited: 25

Improved Network Monitoring Using Software-Defined Networking for DDoS Detection and Mitigation Evaluation
J. Ramprasath, V. Seethalakshmi
Wireless Personal Communications (2021) Vol. 116, Iss. 3, pp. 2743-2757
Closed Access | Times Cited: 22

Modified Gray Wolf Feature Selection and Machine Learning Classification for Wireless Sensor Network Intrusion Detection
Subarna Shakya
IRO Journal on Sustainable Wireless Systems (2021) Vol. 3, Iss. 2, pp. 118-127
Open Access | Times Cited: 21

Effective dimensionality reduction by using soft computing method in data mining techniques
A. Radhika, Momina Masood
Soft Computing (2021) Vol. 25, Iss. 6, pp. 4643-4651
Closed Access | Times Cited: 16

Performance Analysis of NOMA-Based VLC System in Different IoT Network Environments
Lisu Yu, Xinxin Lv, M. Zhang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 17, pp. 27944-27954
Closed Access | Times Cited: 1

Safe Prediction of Diabetes Mellitus Using Weighted Conglomeration of Mining Schemes
Shiva Shankar Reddy, Nilambar Sethi, R. Rajender
2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA) (2020), pp. 1213-1220
Closed Access | Times Cited: 10

Reduction of BER and PAPR for Fourier Transform Based In Downlink NOMA-OFDM
M Parvathy, Bala Tripura Sundari B
2022 3rd International Conference on Electronics and Sustainable Communication Systems (ICESC) (2022), pp. 181-185
Closed Access | Times Cited: 5

Cybersecurity in the Age of the Internet of Things: An Assessment of the Users’ Privacy and Data Security
Srirang Jha, S. Sanjay Kumar
Lecture notes in networks and systems (2021), pp. 49-56
Closed Access | Times Cited: 6

Internet of Things Based Coal Mine Safety Monitoring System
T. Thilagavathi, L. Arockiam
IJARCCE (2023) Vol. 12, Iss. 4
Open Access | Times Cited: 2

Blockchain Framework for Communication between Vehicle through IoT Devices and Sensors
Jennifer S. Raj
Journal of Ubiquitous Computing and Communication Technologies (2021) Vol. 3, Iss. 2, pp. 93-106
Open Access | Times Cited: 4

Process-Aware Internet of Things Model: A Discovery Method Using IoT Data and Process Mining Techniques
Hanae Sbaï, Iman Elkodssi, Mustapha Kabil
(2024), pp. 1-4
Closed Access

Potentials of Machine Learning for Data analysis in IoT: A Detailed Survey
Shreya Vasoya, Nishi Patel, Dipak Ramoliya, et al.
(2020)
Closed Access | Times Cited: 3

A Pipeline for Business Intelligence and Data-Driven Root Cause Analysis on Categorical Data
Shubham Thakar, Dhananjay Kalbande
Lecture notes in networks and systems (2023), pp. 389-398
Closed Access | Times Cited: 1

Farmer Connect”- A Step Towards Enabling Machine Learning based Agriculture 4.0 Efficiently
Jesal Desai, Mohammed Husain Bohara
2022 7th International Conference on Communication and Electronics Systems (ICCES) (2021) Vol. 8 2, pp. 1440-1445
Closed Access | Times Cited: 2

Real-Time Security Monitoring System Using Applications Log Data
Sahil Singh, Aarthi Rao, T. Raghavendra Gupta
Lecture notes in networks and systems (2021), pp. 375-384
Closed Access | Times Cited: 2

Early Fault Detection in Safety Critical Systems Using Complex Morlet Wavelet and Deep Learning
A. Gandhimathinathan, R Lavanya
Lecture notes in networks and systems (2022), pp. 515-531
Closed Access | Times Cited: 1

Significant Association Rule Mining Without Support and Confidence Thresholds
Subrata Datta, Kalyani Mali
Algorithms for intelligent systems (2022), pp. 233-246
Closed Access | Times Cited: 1

BitMedi: An Application to Store Medical Records Efficiently and Securely
Rahul Sunil, Kesia Mary Joies, Abhijeet Cherungottil, et al.
Lecture notes on data engineering and communications technologies (2022), pp. 93-105
Closed Access | Times Cited: 1

Error Rate Analysis of NOMA inspired DF Relay System with Imperfect SIC in IoT Network
P. Bachan
2022 4th International Conference on Inventive Research in Computing Applications (ICIRCA) (2022), pp. 375-380
Closed Access | Times Cited: 1

A Distrust Model to Detect Faulty Sensor in an IOT Network
Mạnh Hùng Nguyễn
2022 RIVF International Conference on Computing and Communication Technologies (RIVF) (2023), pp. 53-58
Closed Access

Preprocessing of Datasets Using Sequential and Parallel Approach: A Comparison
Shwetha Rai, M. Geetha, Preetham Kumar
Lecture notes in networks and systems (2021), pp. 311-320
Closed Access

Page 1 - Next Page

Scroll to top