
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A cognitive security framework for detecting intrusions in IoT and 5G utilizing deep learning
Umesh Kumar Lilhore, Surjeet Dalal, Sarita Simaiya
Computers & Security (2023) Vol. 136, pp. 103560-103560
Closed Access | Times Cited: 31
Umesh Kumar Lilhore, Surjeet Dalal, Sarita Simaiya
Computers & Security (2023) Vol. 136, pp. 103560-103560
Closed Access | Times Cited: 31
Showing 1-25 of 31 citing articles:
A dynamic and optimized routing approach for VANET communication in smart cities to secure intelligent transportation system via a chaotic multi-verse optimization algorithm
Sumit, Rajender Singh Chhillar, Sandeep Dalal, et al.
Cluster Computing (2024) Vol. 27, Iss. 5, pp. 7023-7048
Closed Access | Times Cited: 15
Sumit, Rajender Singh Chhillar, Sandeep Dalal, et al.
Cluster Computing (2024) Vol. 27, Iss. 5, pp. 7023-7048
Closed Access | Times Cited: 15
Hybrid-CID: Securing IoT with Mongoose Optimization
S. Merlin Sheeba, R. S. Shaji
International Journal of Computational Intelligence Systems (2025) Vol. 18, Iss. 1
Open Access | Times Cited: 1
S. Merlin Sheeba, R. S. Shaji
International Journal of Computational Intelligence Systems (2025) Vol. 18, Iss. 1
Open Access | Times Cited: 1
A comprehensive examination of security and privacy in precision agriculture technologies
Pauline A. Ongadi
GSC Advanced Research and Reviews (2024) Vol. 18, Iss. 1, pp. 336-363
Open Access | Times Cited: 4
Pauline A. Ongadi
GSC Advanced Research and Reviews (2024) Vol. 18, Iss. 1, pp. 336-363
Open Access | Times Cited: 4
Sentiment classification for insider threat identification using metaheuristic optimized machine learning classifiers
Djordje Mladenovic, Miloš Antonijević, Luka Jovanovic, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 4
Djordje Mladenovic, Miloš Antonijević, Luka Jovanovic, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 4
5G Networks Security Mitigation Model: An ANN-ISM Hybrid Approach
Rafiq Ahmad Khan, Habib Ullah Khan, Hathal Salamah Alwageed, et al.
IEEE Open Journal of the Communications Society (2025) Vol. 6, pp. 881-925
Open Access
Rafiq Ahmad Khan, Habib Ullah Khan, Hathal Salamah Alwageed, et al.
IEEE Open Journal of the Communications Society (2025) Vol. 6, pp. 881-925
Open Access
CO-STOP: A Robust P4-Powered Adaptive Framework for Comprehensive Detection and Mitigation of Coordinated and Multi-Faceted Attacks in SD-IoT Networks
Ameer El-Sayed, Ahmed A. Toony, Fayez Alqahtani, et al.
Computers & Security (2025), pp. 104349-104349
Closed Access
Ameer El-Sayed, Ahmed A. Toony, Fayez Alqahtani, et al.
Computers & Security (2025), pp. 104349-104349
Closed Access
Collaborative path penetration in 5G-IoT networks: A multi-agent deep reinforcement learning approach
Hang Shen, Xiangdong Li, Yan Wang, et al.
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 3
Closed Access
Hang Shen, Xiangdong Li, Yan Wang, et al.
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 3
Closed Access
Forensics and security issues in the Internet of Things
Shams Forruque Ahmed, Shanjana Shuravi Shawon, Afsana Bhuyian, et al.
Wireless Networks (2025)
Open Access
Shams Forruque Ahmed, Shanjana Shuravi Shawon, Afsana Bhuyian, et al.
Wireless Networks (2025)
Open Access
Securing Short Range Applications in 5G Cognitive Radio Using an AI-Based Analysis of Security Threats
Asst. Prof. Kumbhoje M. R, Girish Ramakrishna, M. Geetha, et al.
Journal of Machine and Computing (2025), pp. 1288-1300
Closed Access
Asst. Prof. Kumbhoje M. R, Girish Ramakrishna, M. Geetha, et al.
Journal of Machine and Computing (2025), pp. 1288-1300
Closed Access
Postprocessing Deep Neural Network for Performance Improvement of Interictal Epileptiform Discharge Detection
Galia V. Anguelova, Patricia Baines
International Journal of Epilepsy (2025)
Open Access
Galia V. Anguelova, Patricia Baines
International Journal of Epilepsy (2025)
Open Access
DeepTransIDS: Transformer-Based Deep learning Model for Detecting DDoS Attacks on 5G NIDD
Kumar Harshdeep, Konatham Sumalatha, Rohit Mathur
Results in Engineering (2025), pp. 104826-104826
Open Access
Kumar Harshdeep, Konatham Sumalatha, Rohit Mathur
Results in Engineering (2025), pp. 104826-104826
Open Access
Comprehensive analysis on 5G and 6G wireless network security and privacy
K. Rajesh, P. Vetrivelan
Telecommunication Systems (2025) Vol. 88, Iss. 2
Closed Access
K. Rajesh, P. Vetrivelan
Telecommunication Systems (2025) Vol. 88, Iss. 2
Closed Access
An efficient Genetic algorithm-based defensive method to mitigate multiple attacks in RPL-enabled IoT network
Prasant Mohapatra, R. Balakrishnan, Madhukrishna Priyadarsini
Internet of Things (2025), pp. 101614-101614
Closed Access
Prasant Mohapatra, R. Balakrishnan, Madhukrishna Priyadarsini
Internet of Things (2025), pp. 101614-101614
Closed Access
Optimized intrusion detection in IoT and fog computing using ensemble learning and advanced feature selection
Mohammed Tawfik
PLoS ONE (2024) Vol. 19, Iss. 8, pp. e0304082-e0304082
Open Access | Times Cited: 3
Mohammed Tawfik
PLoS ONE (2024) Vol. 19, Iss. 8, pp. e0304082-e0304082
Open Access | Times Cited: 3
A Simultaneous Wireless Information and Power Transfer-Based Multi-Hop Uneven Clustering Routing Protocol for EH-Cognitive Radio Sensor Networks
Jihong Wang, Zhuo Wang, Lidong Zhang
Big Data and Cognitive Computing (2024) Vol. 8, Iss. 2, pp. 15-15
Open Access | Times Cited: 2
Jihong Wang, Zhuo Wang, Lidong Zhang
Big Data and Cognitive Computing (2024) Vol. 8, Iss. 2, pp. 15-15
Open Access | Times Cited: 2
IoT cybersecurity in 5G and beyond: a systematic literature review
Sandeep Pirbhulal, Sabarathinam Chockalingam, Ankur Shukla, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2827-2879
Closed Access | Times Cited: 2
Sandeep Pirbhulal, Sabarathinam Chockalingam, Ankur Shukla, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2827-2879
Closed Access | Times Cited: 2
Deep learning applications in the Internet of Things: a review, tools, and future directions
Parisa Raoufi, Atefeh Hemmati, Amir Masoud Rahmani
Evolutionary Intelligence (2024)
Closed Access | Times Cited: 2
Parisa Raoufi, Atefeh Hemmati, Amir Masoud Rahmani
Evolutionary Intelligence (2024)
Closed Access | Times Cited: 2
Enhancing cloud network security with a trust-based service mechanism using k-anonymity and statistical machine learning approach
Himani Saini, Gopal Singh, Sandeep Dalal, et al.
Peer-to-Peer Networking and Applications (2024)
Closed Access | Times Cited: 2
Himani Saini, Gopal Singh, Sandeep Dalal, et al.
Peer-to-Peer Networking and Applications (2024)
Closed Access | Times Cited: 2
Factors impacting cybersecurity transformation: An Industry 5.0 perspective
Abhik Chaudhuri, Rajat Kumar Behera, Pradip Kumar Bala
Computers & Security (2024), pp. 104267-104267
Closed Access | Times Cited: 2
Abhik Chaudhuri, Rajat Kumar Behera, Pradip Kumar Bala
Computers & Security (2024), pp. 104267-104267
Closed Access | Times Cited: 2
Transforming data‐intensive workflows: A cutting‐edge multi‐layer security and quality aware security framework
Maha Aljohani
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 13
Closed Access | Times Cited: 1
Maha Aljohani
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 13
Closed Access | Times Cited: 1
An optimized neural network with AdaHessian for cryptojacking attack prediction for Securing Crypto Exchange Operations of MEC applications
Uma Rani, Sunil Kumar, Neeraj Dahiya, et al.
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 1
Uma Rani, Sunil Kumar, Neeraj Dahiya, et al.
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 1
Enhancing prognostic prediction in hepatocellular carcinoma post-TACE: a machine learning approach integrating radiomics and clinical features
Mingqi Zhang, Bingling Kuang, Jingxuan Zhang, et al.
Frontiers in Medicine (2024) Vol. 11
Open Access | Times Cited: 1
Mingqi Zhang, Bingling Kuang, Jingxuan Zhang, et al.
Frontiers in Medicine (2024) Vol. 11
Open Access | Times Cited: 1
An adaptive detection framework based on artificial immune for IoT intrusion detection system
Ming Ma, Geying Yang, Junjiang He, et al.
Applied Soft Computing (2024) Vol. 166, pp. 112152-112152
Closed Access | Times Cited: 1
Ming Ma, Geying Yang, Junjiang He, et al.
Applied Soft Computing (2024) Vol. 166, pp. 112152-112152
Closed Access | Times Cited: 1
RCLNet: an effective anomaly-based intrusion detection for securing the IoMT system
Jamshed Ali Shaikh, Chengliang Wang, Wajeeh Us Sima Muhammad, et al.
Frontiers in Digital Health (2024) Vol. 6
Open Access | Times Cited: 1
Jamshed Ali Shaikh, Chengliang Wang, Wajeeh Us Sima Muhammad, et al.
Frontiers in Digital Health (2024) Vol. 6
Open Access | Times Cited: 1
IoT-Enhanced Public Safety in Smart Environments: A Comparative Analysis Using the Public Safety IoT Test
Natalia Shchepkina, Gaurav Singh Negi, Lalit Bhalla, et al.
BIO Web of Conferences (2024) Vol. 86, pp. 01100-01100
Open Access
Natalia Shchepkina, Gaurav Singh Negi, Lalit Bhalla, et al.
BIO Web of Conferences (2024) Vol. 86, pp. 01100-01100
Open Access