
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Decision Tree with Pearson Correlation-based Recursive Feature Elimination Model for Attack Detection in IoT Environment
A. Padmashree, M. Krishnamoorthi
Information Technology And Control (2022) Vol. 51, Iss. 4, pp. 771-785
Open Access | Times Cited: 15
A. Padmashree, M. Krishnamoorthi
Information Technology And Control (2022) Vol. 51, Iss. 4, pp. 771-785
Open Access | Times Cited: 15
Showing 15 citing articles:
Intrusion Detection in Healthcare 4.0 Internet of Things Systems via Metaheuristics Optimized Machine Learning
Nikola Savanović, Ana Toskovic, Aleksandar Petrović, et al.
Sustainability (2023) Vol. 15, Iss. 16, pp. 12563-12563
Open Access | Times Cited: 57
Nikola Savanović, Ana Toskovic, Aleksandar Petrović, et al.
Sustainability (2023) Vol. 15, Iss. 16, pp. 12563-12563
Open Access | Times Cited: 57
DDoS attack detection techniques in IoT networks: a survey
Amir Pakmehr, Andreas Aßmuth, Negar Taheri, et al.
Cluster Computing (2024) Vol. 27, Iss. 10, pp. 14637-14668
Open Access | Times Cited: 5
Amir Pakmehr, Andreas Aßmuth, Negar Taheri, et al.
Cluster Computing (2024) Vol. 27, Iss. 10, pp. 14637-14668
Open Access | Times Cited: 5
XGBoost Tuned by Hybridized SCA Metaheuristics for Intrusion Detection in Healthcare 4.0 IoT Systems
Miodrag Živković, Luka Jovanovic, Nebojša Bačanin, et al.
Algorithms for intelligent systems (2024), pp. 1-16
Closed Access | Times Cited: 4
Miodrag Živković, Luka Jovanovic, Nebojša Bačanin, et al.
Algorithms for intelligent systems (2024), pp. 1-16
Closed Access | Times Cited: 4
Optimizing Intrusion Detection Systems in Three Phases on the CSE-CIC-IDS-2018 Dataset
Surasit Songma, Theera Sathuphan, Thanakorn Pamutha
Computers (2023) Vol. 12, Iss. 12, pp. 245-245
Open Access | Times Cited: 9
Surasit Songma, Theera Sathuphan, Thanakorn Pamutha
Computers (2023) Vol. 12, Iss. 12, pp. 245-245
Open Access | Times Cited: 9
Developing a hybrid feature selection method to detect botnet attacks in IoT devices
Hyder Yahya Alshaeaa, Zainab Mohammed Ghadhban
Kuwait Journal of Science (2024) Vol. 51, Iss. 3, pp. 100222-100222
Open Access | Times Cited: 2
Hyder Yahya Alshaeaa, Zainab Mohammed Ghadhban
Kuwait Journal of Science (2024) Vol. 51, Iss. 3, pp. 100222-100222
Open Access | Times Cited: 2
Robust DDoS Attack Detection Using Piecewise Harris Hawks Optimizer with Deep Learning for a Secure Internet of Things Environment
Mahmoud Ragab, Sultanah M. Alshammari, Louai A. Maghrabi, et al.
Mathematics (2023) Vol. 11, Iss. 21, pp. 4448-4448
Open Access | Times Cited: 6
Mahmoud Ragab, Sultanah M. Alshammari, Louai A. Maghrabi, et al.
Mathematics (2023) Vol. 11, Iss. 21, pp. 4448-4448
Open Access | Times Cited: 6
Enhancing IoT security: A comparative study of feature reduction techniques for intrusion detection system
Jing Li, Hewan Chen, Mohd Othman Shahizan, et al.
Intelligent Systems with Applications (2024) Vol. 23, pp. 200407-200407
Open Access | Times Cited: 1
Jing Li, Hewan Chen, Mohd Othman Shahizan, et al.
Intelligent Systems with Applications (2024) Vol. 23, pp. 200407-200407
Open Access | Times Cited: 1
Enhanced threat intelligence framework for advanced cybersecurity resilience
Moutaz Alazab, Ruba Abu Khurma, M. G. Arenas, et al.
Egyptian Informatics Journal (2024) Vol. 27, pp. 100521-100521
Open Access | Times Cited: 1
Moutaz Alazab, Ruba Abu Khurma, M. G. Arenas, et al.
Egyptian Informatics Journal (2024) Vol. 27, pp. 100521-100521
Open Access | Times Cited: 1
CBF-IDS: Addressing Class Imbalance Using CNN-BiLSTM with Focal Loss in Network Intrusion Detection System
Haonan Peng, Chunming Wu, Yanfeng Xiao
Applied Sciences (2023) Vol. 13, Iss. 21, pp. 11629-11629
Open Access | Times Cited: 4
Haonan Peng, Chunming Wu, Yanfeng Xiao
Applied Sciences (2023) Vol. 13, Iss. 21, pp. 11629-11629
Open Access | Times Cited: 4
Cybersecurity Insights: Analyzing IoT Data Through Statistical and Visualization Techniques
Jing Li, Mohd Shahizan Othman, Hewan Chen, et al.
(2024), pp. 1-10
Closed Access | Times Cited: 1
Jing Li, Mohd Shahizan Othman, Hewan Chen, et al.
(2024), pp. 1-10
Closed Access | Times Cited: 1
Understanding live oil composition effect on asphaltene precipitation as a function of temperature change during depressurization using machine learning techniques
Syed Imran Ali, Shaine Mohammadali Lalji, Awan Zahoor, et al.
Chemical Papers (2024) Vol. 79, Iss. 1, pp. 353-364
Closed Access | Times Cited: 1
Syed Imran Ali, Shaine Mohammadali Lalji, Awan Zahoor, et al.
Chemical Papers (2024) Vol. 79, Iss. 1, pp. 353-364
Closed Access | Times Cited: 1
Cyber attack detection in IOT-WSN devices with threat intelligence using hidden and connected layer based architectures
S. Nandhini, A. Rajeswari, N. R. Shanker
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 1
S. Nandhini, A. Rajeswari, N. R. Shanker
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 1
LEMDA: A Novel Feature Engineering Method for Intrusion Detection in IoT Systems
Ali Ghubaish, Zebo Yang, Aiman Erbad, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 8, pp. 13247-13256
Open Access
Ali Ghubaish, Zebo Yang, Aiman Erbad, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 8, pp. 13247-13256
Open Access
A2FWPO: Anti-aliasing filter based on whale parameter optimization method for feature extraction and recognition of dance motor imagery EEG
Tianliang Huang, Ziyue Luo, Yin Lyu
Computer Science and Information Systems (2023) Vol. 20, Iss. 4, pp. 1849-1868
Open Access
Tianliang Huang, Ziyue Luo, Yin Lyu
Computer Science and Information Systems (2023) Vol. 20, Iss. 4, pp. 1849-1868
Open Access
A Framework for Blended Sub Feature Engineering for Chronic Disease Prediction Using in-Memory Computing
G Raghavendra, Shanthi Mahesh, Manukonda Venkata Poorna Chandrasekhara Rao
Revue d intelligence artificielle (2022) Vol. 36, Iss. 06, pp. 953-957
Open Access
G Raghavendra, Shanthi Mahesh, Manukonda Venkata Poorna Chandrasekhara Rao
Revue d intelligence artificielle (2022) Vol. 36, Iss. 06, pp. 953-957
Open Access