
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
IDS in IoT using Machine Learning and Blockchain
Nada Abdu Alsharif, Shailendra Mishra, Mohammed Alshehri
Engineering Technology & Applied Science Research (2023) Vol. 13, Iss. 4, pp. 11197-11203
Open Access | Times Cited: 20
Nada Abdu Alsharif, Shailendra Mishra, Mohammed Alshehri
Engineering Technology & Applied Science Research (2023) Vol. 13, Iss. 4, pp. 11197-11203
Open Access | Times Cited: 20
Showing 20 citing articles:
Prediction of Vehicle-induced Air Pollution based on Advanced Machine Learning Models
Caroline Mongina Matara, Simpson Nyambane Osano, Amir Yusuf, et al.
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 1, pp. 12837-12843
Open Access | Times Cited: 8
Caroline Mongina Matara, Simpson Nyambane Osano, Amir Yusuf, et al.
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 1, pp. 12837-12843
Open Access | Times Cited: 8
Tides of Blockchain in IoT Cybersecurity
Love Allen Chijioke Ahakonye, Cosmas Ifeanyi Nwakanma, Dong‐Seong Kim
Sensors (2024) Vol. 24, Iss. 10, pp. 3111-3111
Open Access | Times Cited: 7
Love Allen Chijioke Ahakonye, Cosmas Ifeanyi Nwakanma, Dong‐Seong Kim
Sensors (2024) Vol. 24, Iss. 10, pp. 3111-3111
Open Access | Times Cited: 7
Advancing IoT Cybersecurity: Adaptive Threat Identification with Deep Learning in Cyber-Physical Systems
C. Atheeq, Ruhiat Sultana, Syeda Asfiya Sabahath, et al.
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 2, pp. 13559-13566
Open Access | Times Cited: 5
C. Atheeq, Ruhiat Sultana, Syeda Asfiya Sabahath, et al.
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 2, pp. 13559-13566
Open Access | Times Cited: 5
A Binary Object Detection Pattern Model to Assist the Visually Impaired in detecting Normal and Camouflaged Faces
S. Sajini, B. Pushpa
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 1, pp. 12716-12721
Open Access | Times Cited: 4
S. Sajini, B. Pushpa
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 1, pp. 12716-12721
Open Access | Times Cited: 4
A Survey on the Latest Intrusion Detection Datasets for Software Defined Networking Environments
Harman Yousif Ibrahim Khalid, Najla Badie Ibrahim Aldabagh
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 2, pp. 13190-13200
Open Access | Times Cited: 4
Harman Yousif Ibrahim Khalid, Najla Badie Ibrahim Aldabagh
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 2, pp. 13190-13200
Open Access | Times Cited: 4
Blockchain-based IoT security solutions for IDS research centers
Selman Hızal, A. F. M. Suaib Akhter, Ünal Çavuşoğlu, et al.
Internet of Things (2024) Vol. 27, pp. 101307-101307
Closed Access | Times Cited: 4
Selman Hızal, A. F. M. Suaib Akhter, Ünal Çavuşoğlu, et al.
Internet of Things (2024) Vol. 27, pp. 101307-101307
Closed Access | Times Cited: 4
Blockchain Non-Fungible Token for Effective Drug Traceability System with Optimal Deep Learning on Pharmaceutical Supply Chain Management
Shanthi Perumalsamy, Venkatesh Kaliyamurthy
Engineering Technology & Applied Science Research (2025) Vol. 15, Iss. 1, pp. 19261-19266
Open Access
Shanthi Perumalsamy, Venkatesh Kaliyamurthy
Engineering Technology & Applied Science Research (2025) Vol. 15, Iss. 1, pp. 19261-19266
Open Access
Anomaly Detection in IIoT Transactions using Machine Learning: A Lightweight Blockchain-based Approach
Mayar Ibrahim Hasan Okfie, Shailendra Mishra
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 3, pp. 14645-14653
Open Access | Times Cited: 3
Mayar Ibrahim Hasan Okfie, Shailendra Mishra
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 3, pp. 14645-14653
Open Access | Times Cited: 3
Robust and Secure Routing Protocol Based on Group Key Management for Internet of Things Systems
Salwa Othmen, Wahida Mansouri, Somia A. Asklany
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 3, pp. 14402-14410
Open Access | Times Cited: 2
Salwa Othmen, Wahida Mansouri, Somia A. Asklany
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 3, pp. 14402-14410
Open Access | Times Cited: 2
Enhanced Intrusion Detection in IoT with a Novel PRBF Kernel and Cloud Integration
Mopuru Bhargavi, Pachipala Yellamma
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 4, pp. 14988-14993
Open Access | Times Cited: 2
Mopuru Bhargavi, Pachipala Yellamma
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 4, pp. 14988-14993
Open Access | Times Cited: 2
BlockEstate: Revolutionizing Real Estate Transactions through Hyperledger-based Blockchain Technology
Laviza Falak Naz, Rohail Qamar, Raheela Asif, et al.
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 3, pp. 14458-14464
Open Access | Times Cited: 1
Laviza Falak Naz, Rohail Qamar, Raheela Asif, et al.
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 3, pp. 14458-14464
Open Access | Times Cited: 1
A Comprehensive Systematic Review of Blockchain-based Intrusion Detection Systems
Gideon Adele, Abinash Borah, Anirudh Paranjothi, et al.
2022 IEEE World AI IoT Congress (AIIoT) (2024), pp. 605-611
Closed Access | Times Cited: 1
Gideon Adele, Abinash Borah, Anirudh Paranjothi, et al.
2022 IEEE World AI IoT Congress (AIIoT) (2024), pp. 605-611
Closed Access | Times Cited: 1
Detecting and Mitigating Data Poisoning Attacks in Machine Learning: A Weighted Average Approach
Yogi Reddy Maramreddy, Kireet Muppavaram
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 4, pp. 15505-15509
Open Access | Times Cited: 1
Yogi Reddy Maramreddy, Kireet Muppavaram
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 4, pp. 15505-15509
Open Access | Times Cited: 1
Cyberatttack Detection and Classification in IIoT systems using XGBoost and Gaussian Naïve Bayes: A Comparative Study
Mordi Alenazi, Shailendra Mishra
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 4, pp. 15074-15082
Open Access | Times Cited: 1
Mordi Alenazi, Shailendra Mishra
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 4, pp. 15074-15082
Open Access | Times Cited: 1
Efficient and Secure Access Control for IoT-based Environmental Monitoring
Asia Othman Aljahdali, Afnan Habibullah, Huda Aljohani
Engineering Technology & Applied Science Research (2023) Vol. 13, Iss. 5, pp. 11807-11815
Open Access | Times Cited: 3
Asia Othman Aljahdali, Afnan Habibullah, Huda Aljohani
Engineering Technology & Applied Science Research (2023) Vol. 13, Iss. 5, pp. 11807-11815
Open Access | Times Cited: 3
Advancing Hospital Cybersecurity Through IoT-Enabled Neural Network for Human Behavior Analysis and Anomaly Detection
Faisal ALmojel, Shailendra Mishra
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 5
Open Access
Faisal ALmojel, Shailendra Mishra
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 5
Open Access
The Impact of Artificial Intelligence on Business Performance in Saudi Arabia: The Role of Technological Readiness and Data Quality
Mohammed Alarefi
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 5, pp. 16802-16807
Open Access
Mohammed Alarefi
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 5, pp. 16802-16807
Open Access
Intrusion Detection in IoT using Gaussian Fuzzy Mutual Information-based Feature Selection
Abdullah Hussain Abu Saq, Anazida Zainal, Bander Ali Saleh Al‐rimy, et al.
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 6, pp. 17564-17571
Open Access
Abdullah Hussain Abu Saq, Anazida Zainal, Bander Ali Saleh Al‐rimy, et al.
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 6, pp. 17564-17571
Open Access
Optimized Cyber Attack Detection in IoT Networks Using Feature Selection and LightGBM
Akshat Gaurav, Brij B. Gupta, Kwok Tai Chui
2022 25th International Symposium on Wireless Personal Multimedia Communications (WPMC) (2024), pp. 1-5
Closed Access
Akshat Gaurav, Brij B. Gupta, Kwok Tai Chui
2022 25th International Symposium on Wireless Personal Multimedia Communications (WPMC) (2024), pp. 1-5
Closed Access
A Security Scheme for Statistical Anomaly Detection and the Mitigation of Rank Attacks in RPL Networks (IoT Environment)
Mohammed A. Alqarni, Sajjad Hussain Chauhdary
Engineering Technology & Applied Science Research (2023) Vol. 13, Iss. 6, pp. 12409-12414
Open Access | Times Cited: 1
Mohammed A. Alqarni, Sajjad Hussain Chauhdary
Engineering Technology & Applied Science Research (2023) Vol. 13, Iss. 6, pp. 12409-12414
Open Access | Times Cited: 1