
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A federated learning-based zero trust intrusion detection system for Internet of Things
Danish Javeed, Muhammad Shahid Saeed, Muhammad Adil, et al.
Ad Hoc Networks (2024) Vol. 162, pp. 103540-103540
Open Access | Times Cited: 16
Danish Javeed, Muhammad Shahid Saeed, Muhammad Adil, et al.
Ad Hoc Networks (2024) Vol. 162, pp. 103540-103540
Open Access | Times Cited: 16
Showing 16 citing articles:
A review of federated learning applications in intrusion detection systems
Aitor Belenguer, José A. Pascual, Javier Navaridas
Computer Networks (2025), pp. 111023-111023
Open Access | Times Cited: 1
Aitor Belenguer, José A. Pascual, Javier Navaridas
Computer Networks (2025), pp. 111023-111023
Open Access | Times Cited: 1
Advancements in training and deployment strategies for AI-based intrusion detection systems in IoT: a systematic literature review
S Kumar Reddy Mallidi, Rajeswara Rao Ramisetty
Discover Internet of Things (2025) Vol. 5, Iss. 1
Open Access | Times Cited: 1
S Kumar Reddy Mallidi, Rajeswara Rao Ramisetty
Discover Internet of Things (2025) Vol. 5, Iss. 1
Open Access | Times Cited: 1
Enhancing network security in industrial IoT environments: a DeepCLG hybrid learning model for cyberattack detection
Qawsar Gulzar, Khurram Mustafa
International Journal of Machine Learning and Cybernetics (2025)
Closed Access | Times Cited: 1
Qawsar Gulzar, Khurram Mustafa
International Journal of Machine Learning and Cybernetics (2025)
Closed Access | Times Cited: 1
CFL-ATELM: an approach to detect botnet traffic by analyzing non-IID and imbalanced data in IoT-edge based 6G networks
Ashwini Pithani, Rashmi Ranjan Rout
Cluster Computing (2025) Vol. 28, Iss. 3
Closed Access
Ashwini Pithani, Rashmi Ranjan Rout
Cluster Computing (2025) Vol. 28, Iss. 3
Closed Access
A new a flow-based approach for enhancing botnet detection using convolutional neural network and long short-term memory
Mehdi Asadi, Arash Heidari, Nima Jafari Navimipour
Knowledge and Information Systems (2025)
Open Access
Mehdi Asadi, Arash Heidari, Nima Jafari Navimipour
Knowledge and Information Systems (2025)
Open Access
Advanced quantum neural network-link net based intrusion detection framework and enhanced blowfish cryptography for data security
Yogesh B. Gurav, Mukil Alagirisamy, Sathish Kumar Selvaperumal
Intelligent Decision Technologies (2025)
Closed Access
Yogesh B. Gurav, Mukil Alagirisamy, Sathish Kumar Selvaperumal
Intelligent Decision Technologies (2025)
Closed Access
A cyber-resilient and explainable intrusion detection system for Internet of Things networks
Muhammad Bilal, Rongfei Zeng, Owais Muhammad, et al.
Cluster Computing (2025) Vol. 28, Iss. 5
Closed Access
Muhammad Bilal, Rongfei Zeng, Owais Muhammad, et al.
Cluster Computing (2025) Vol. 28, Iss. 5
Closed Access
Securing data and preserving privacy in cloud IoT-based technologies an analysis of assessing threats and developing effective safeguard
Mayank Pathak, Kamta Nath Mishra, Satya P. Singh
Artificial Intelligence Review (2024) Vol. 57, Iss. 10
Open Access | Times Cited: 3
Mayank Pathak, Kamta Nath Mishra, Satya P. Singh
Artificial Intelligence Review (2024) Vol. 57, Iss. 10
Open Access | Times Cited: 3
Privacy-Preserving Intrusion Detection Using FedSplit Learning
Malika Abid, Mohammed Kamel Benkaddour, Mohamed Benouis
Lecture notes in networks and systems (2025), pp. 29-42
Closed Access
Malika Abid, Mohammed Kamel Benkaddour, Mohamed Benouis
Lecture notes in networks and systems (2025), pp. 29-42
Closed Access
A survey on IoT security: challenges and their solutions using machine learning and blockchain technology
Neha Sharma, Pankaj Kumar
Cluster Computing (2025) Vol. 28, Iss. 5
Closed Access
Neha Sharma, Pankaj Kumar
Cluster Computing (2025) Vol. 28, Iss. 5
Closed Access
Emerging Authentication Technologies for Zero Trust on the Internet of Things
Chanapha Bast, Kuo‐Hui Yeh
(2024)
Open Access | Times Cited: 2
Chanapha Bast, Kuo‐Hui Yeh
(2024)
Open Access | Times Cited: 2
Automotive Cybersecurity Scheme for Intrusion Detection in CAN ‐Driven Artificial Intelligence of Things
Gagan Dangwal, Mohammad Wazid, Sarah Nizam, et al.
Security and Privacy (2024) Vol. 8, Iss. 1
Closed Access | Times Cited: 2
Gagan Dangwal, Mohammad Wazid, Sarah Nizam, et al.
Security and Privacy (2024) Vol. 8, Iss. 1
Closed Access | Times Cited: 2
Securing fog-assisted IoT smart homes: a federated learning-based intrusion detection approach
Radjaa Bensaid, Nabila Labraoui, Hafida Saidi, et al.
Cluster Computing (2024) Vol. 28, Iss. 1
Closed Access | Times Cited: 1
Radjaa Bensaid, Nabila Labraoui, Hafida Saidi, et al.
Cluster Computing (2024) Vol. 28, Iss. 1
Closed Access | Times Cited: 1
Emerging Authentication Technologies for Zero Trust on the Internet of Things
Chanapha Bast, Kuo‐Hui Yeh
Symmetry (2024) Vol. 16, Iss. 8, pp. 993-993
Open Access
Chanapha Bast, Kuo‐Hui Yeh
Symmetry (2024) Vol. 16, Iss. 8, pp. 993-993
Open Access
Intrusion detection systems for the internet of things: a probabilistic anomaly detection approach
Nadia Bali, Zied Jaoua, Olfa Bzeouich, et al.
International Journal of Computers and Applications (2024), pp. 1-12
Closed Access
Nadia Bali, Zied Jaoua, Olfa Bzeouich, et al.
International Journal of Computers and Applications (2024), pp. 1-12
Closed Access
ZFort: A scalable zero-trust approach for trust management and traffic engineering in SDN based IoTs
Usman Ashraf, Mohammed Al-Naeem, Muhammad Nasir Mumtaz Bhutta, et al.
Internet of Things (2024), pp. 101419-101419
Closed Access
Usman Ashraf, Mohammed Al-Naeem, Muhammad Nasir Mumtaz Bhutta, et al.
Internet of Things (2024), pp. 101419-101419
Closed Access
Abdul Mazid, Sheeraz Kirmani, Manaullah Manaullah, et al.
Transactions on Emerging Telecommunications Technologies (2024) Vol. 36, Iss. 1
Closed Access
Intrusion Detection Using Convolutional Neural Network: A Color Mapping Approach on NSL-KDD Dataset
Md. Abrar Faiaz, Dipankar Mitra, Ranat Das Prangon
(2024), pp. 154-162
Closed Access
Md. Abrar Faiaz, Dipankar Mitra, Ranat Das Prangon
(2024), pp. 154-162
Closed Access