OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A deep and systematic review of the intrusion detection systems in the fog environment
Yi Lizhi, Mei Yin, Mehdi Darbandi
Transactions on Emerging Telecommunications Technologies (2022) Vol. 34, Iss. 1
Closed Access | Times Cited: 21

Showing 21 citing articles:

A decade of research in fog computing: Relevance, challenges, and future directions
Satish Narayana Srirama
Software Practice and Experience (2023) Vol. 54, Iss. 1, pp. 3-23
Open Access | Times Cited: 50

HC-DTTSVM: A Network Intrusion Detection Method Based on Decision Tree Twin Support Vector Machine and Hierarchical Clustering
Li Zou, Xuemei Luo, Yan Zhang, et al.
IEEE Access (2023) Vol. 11, pp. 21404-21416
Open Access | Times Cited: 32

When Moving Target Defense Meets Attack Prediction in Digital Twins: A Convolutional and Hierarchical Reinforcement Learning Approach
Tao Zhang, Changqiao Xu, Yibo Lian, et al.
IEEE Journal on Selected Areas in Communications (2023) Vol. 41, Iss. 10, pp. 3293-3305
Closed Access | Times Cited: 29

A Novel IDS with a Dynamic Access Control Algorithm to Detect and Defend Intrusion at IoT Nodes
Moutaz Alazab, Albara Awajan, Hadeel Alazzam, et al.
Sensors (2024) Vol. 24, Iss. 7, pp. 2188-2188
Open Access | Times Cited: 8

OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
Siva Surya Narayana Chintapalli, Satya Prakash Singh, Jaroslav Frnda, et al.
Heliyon (2024) Vol. 10, Iss. 8, pp. e29410-e29410
Open Access | Times Cited: 7

An efficient approach to detect distributed denial of service attacks for software defined internet of things combining autoencoder and extreme gradient boosting with feature selection and hyperparameter tuning optimization
Mohamed Ali Setitra, Mingyu Fan, Zine El Abidine Bensalem
Transactions on Emerging Telecommunications Technologies (2023) Vol. 34, Iss. 9
Closed Access | Times Cited: 15

A big data analytics for DDOS attack detection using optimized ensemble framework in Internet of Things
Ijaz Ahmad, Zhong Wan, Ashfaq Ahmad
Internet of Things (2023) Vol. 23, pp. 100825-100825
Closed Access | Times Cited: 13

Hybrid deep learning models with spotted hyena optimization for cloud computing enabled intrusion detection system
Fatimah Alhayan, Muhammad Kashif Saeed, Randa Allafi, et al.
Journal of Radiation Research and Applied Sciences (2025) Vol. 18, Iss. 2, pp. 101523-101523
Closed Access

GPU-Based Support Vector Machine Using Artificial Orca Algorithm for Intrusion Detection Systems
Lydia Sonia Bendimerad, Habiba Drias, Naila Aziza Houacine
Communications in computer and information science (2025), pp. 316-331
Closed Access

Hierarchical multistep approach for intrusion detection and identification in IoT and Fog computing-based environments
Cristiano Antonio de Souza, Carlos Becker Westphall, Jean Douglas Gomes Valencio, et al.
Ad Hoc Networks (2024) Vol. 161, pp. 103541-103541
Closed Access | Times Cited: 3

A Consistent Augmented Stacking Polynomial Optimized Tool (ASPOT) for Improving Security of Cloud-IoT Systems
Divya Ramachandran, R. Chithambaramani, S. Sankar Ganesh, et al.
Journal of Advanced Research in Applied Sciences and Engineering Technology (2024) Vol. 37, Iss. 1, pp. 16-36
Open Access | Times Cited: 2

Organizational information security threats: Status and challenges
B. Akello
World Journal of Advanced Engineering Technology and Sciences (2024) Vol. 11, Iss. 1, pp. 148-162
Open Access | Times Cited: 2

FogNet: Custom CNN with Optimal Feature Selection-based Combat Model for Secured Fog Computing Environment
Dipti Prava Sahu, Biswajit Tripathy, Leena Samantaray
e-Prime - Advances in Electrical Engineering Electronics and Energy (2024) Vol. 8, pp. 100604-100604
Open Access | Times Cited: 1

Intrusion Detection System Using Machine Learning by RNN Method
K Azarudeen, Dasthageer Ghulam, Gopalkumar Rakesh, et al.
E3S Web of Conferences (2024) Vol. 491, pp. 04012-04012
Open Access | Times Cited: 1

Optimized Intrusion Detection System in Fog Computing Environment Using Automatic Termination-based Whale Optimization with ELM
Dipti Prava Sahu, Biswajit Tripathy, Leena Samantaray
International Journal of Computer Network and Information Security (2024) Vol. 16, Iss. 2, pp. 79-91
Open Access | Times Cited: 1

Modeling of Improved Sine Cosine Algorithm with Optimal Deep Learning-Enabled Security Solution
Latifah Almuqren, Mohammed Maray, Sumayh S. Aljameel, et al.
Electronics (2023) Vol. 12, Iss. 19, pp. 4130-4130
Open Access | Times Cited: 3

Enhanced IoT Security for DDOS Attack Detection: Split Attention-Based ResNeXt-GRU Ensembler Approach
Abdulrahman A. Alshdadi, Abdulwahab Ali Almazroi, Eesa Alsolami, et al.
IEEE Access (2024) Vol. 12, pp. 112368-112380
Open Access

A deep neural network-based multi-layer classifier ensembles for intrusion detection in fog-based Internet of Things environments
Hossein khosravifar, Mohammad Ali Jabraeil Jamali, Kambiz Majidzadeh, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 140, pp. 109727-109727
Closed Access

Deep reinforcement learning-based moving target defense method in computing power network
Changqiao Xu, 长桥 许, 一博 连, et al.
Scientia Sinica Informationis (2023)
Closed Access | Times Cited: 1

Context-Aware Adaptive Encryption: Integrating Sensitive Data Detection and Network intrusion detection for Dynamic Data Security and Encryption
Lary Lawrence, R. De Giovanni, Cynthia Calongne, et al.
The Pinnacle A Journal by Scholar-Practitioners (2024) Vol. 2, Iss. 3
Open Access

Page 1

Scroll to top