
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Fed-Inforce-Fusion: A federated reinforcement-based fusion model for security and privacy protection of IoMT networks against cyber-attacks
Izhar Ahmed Khan, Imran Razzak, Dechang Pi, et al.
Information Fusion (2023) Vol. 101, pp. 102002-102002
Open Access | Times Cited: 29
Izhar Ahmed Khan, Imran Razzak, Dechang Pi, et al.
Information Fusion (2023) Vol. 101, pp. 102002-102002
Open Access | Times Cited: 29
Showing 1-25 of 29 citing articles:
Blockchain security enhancement: an approach towards hybrid consensus algorithms and machine learning techniques
K. Venkatesan, Syarifah Bahiyah Rahayu
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 41
K. Venkatesan, Syarifah Bahiyah Rahayu
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 41
MLSTL-WSN: machine learning-based intrusion detection using SMOTETomek in WSNs
Md. Alamin Talukder, Selina Sharmin, Md Ashraf Uddin, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 2139-2158
Open Access | Times Cited: 25
Md. Alamin Talukder, Selina Sharmin, Md Ashraf Uddin, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 2139-2158
Open Access | Times Cited: 25
A Comparative Study of Anomaly Detection Techniques for IoT Security Using Adaptive Machine Learning for IoT Threats
Dheyaaldin Alsalman
IEEE Access (2024) Vol. 12, pp. 14719-14730
Open Access | Times Cited: 11
Dheyaaldin Alsalman
IEEE Access (2024) Vol. 12, pp. 14719-14730
Open Access | Times Cited: 11
A data-driven multi-perspective approach to cybersecurity knowledge discovery through topic modelling
Fahad Alqurashi, Istiak Ahmad
Alexandria Engineering Journal (2024) Vol. 107, pp. 374-389
Open Access | Times Cited: 5
Fahad Alqurashi, Istiak Ahmad
Alexandria Engineering Journal (2024) Vol. 107, pp. 374-389
Open Access | Times Cited: 5
Big-IDS: a decentralized multi agent reinforcement learning approach for distributed intrusion detection in big data networks
Faten Louati, Farah Barika Ktata, Ikram Amous
Cluster Computing (2024) Vol. 27, Iss. 5, pp. 6823-6841
Closed Access | Times Cited: 4
Faten Louati, Farah Barika Ktata, Ikram Amous
Cluster Computing (2024) Vol. 27, Iss. 5, pp. 6823-6841
Closed Access | Times Cited: 4
BFLIDS: Blockchain-Driven Federated Learning for Intrusion Detection in IoMT Networks
Khadija Begum, Md Ariful Islam Mozumder, Moon-Il Joo, et al.
Sensors (2024) Vol. 24, Iss. 14, pp. 4591-4591
Open Access | Times Cited: 4
Khadija Begum, Md Ariful Islam Mozumder, Moon-Il Joo, et al.
Sensors (2024) Vol. 24, Iss. 14, pp. 4591-4591
Open Access | Times Cited: 4
WFE-Tab: Overcoming limitations of TabPFN in IIoT-MEC environments with a weighted fusion ensemble-TabPFN model for improved IDS performance
Sergio Ruiz-Villafranca, José Roldán-Gómez, Javier Carrillo-Mondéjar, et al.
Future Generation Computer Systems (2025), pp. 107707-107707
Closed Access
Sergio Ruiz-Villafranca, José Roldán-Gómez, Javier Carrillo-Mondéjar, et al.
Future Generation Computer Systems (2025), pp. 107707-107707
Closed Access
Securing the Future of IoMT
S. Satheesh Kumar, V. Muthukumaran, Sai Jahnavi, et al.
Advances in healthcare information systems and administration book series (2025), pp. 191-216
Closed Access
S. Satheesh Kumar, V. Muthukumaran, Sai Jahnavi, et al.
Advances in healthcare information systems and administration book series (2025), pp. 191-216
Closed Access
Advanced artificial intelligence with federated learning framework for privacy-preserving cyberthreat detection in IoT-assisted sustainable smart cities
Mahmoud Ragab, Ehab Bahaudien Ashary, Bandar M. Alghamdi, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Mahmoud Ragab, Ehab Bahaudien Ashary, Bandar M. Alghamdi, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Analysis of convolutional-based variational autoencoders for privacy protection in realtime video surveillance
Mallepogu Sivalakshmi, K. Rajendra Prasad, C. Shoba Bindu
Expert Systems with Applications (2025), pp. 126817-126817
Closed Access
Mallepogu Sivalakshmi, K. Rajendra Prasad, C. Shoba Bindu
Expert Systems with Applications (2025), pp. 126817-126817
Closed Access
Cyber Security in Healthcare Systems: A Review of Tools and Attack Mitigation Techniques
Kousik Barik, Sanjay Misra, Sabarathinam Chockalingam
Communications in computer and information science (2025), pp. 87-105
Closed Access
Kousik Barik, Sanjay Misra, Sabarathinam Chockalingam
Communications in computer and information science (2025), pp. 87-105
Closed Access
Defending Against Multifaceted Network Attacks: A Multi-Label Meta-Learning and Lorenz Chaos MTD based Security Paradigm
N. A. Bharathi, Ranjani Parthasarathi, V. Vetriselvi
Journal of Network and Systems Management (2025) Vol. 33, Iss. 2
Closed Access
N. A. Bharathi, Ranjani Parthasarathi, V. Vetriselvi
Journal of Network and Systems Management (2025) Vol. 33, Iss. 2
Closed Access
Velocity Paused Particle Swarm Optimization-based Intelligent Long Short-Term Memory Framework for Intrusion Detection System in Internet of Medical Things
Pandit Byomakesha Dash, H. S. Behera, Manas Ranjan Senapati, et al.
Arabian Journal for Science and Engineering (2025)
Closed Access
Pandit Byomakesha Dash, H. S. Behera, Manas Ranjan Senapati, et al.
Arabian Journal for Science and Engineering (2025)
Closed Access
LSTM-JSO framework for privacy preserving adaptive intrusion detection in federated IoT networks
Shaymaa E. Sorour, Mohammed Aljaafari, Amany Mohamed Shaker, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Shaymaa E. Sorour, Mohammed Aljaafari, Amany Mohamed Shaker, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
A deep Reinforcement learning-based robust Intrusion Detection System for securing IoMT Healthcare Networks
Jamshed Ali Shaikh, Chengliang Wang, Muhammad Wajeeh Us Sima, et al.
Frontiers in Medicine (2025) Vol. 12
Open Access
Jamshed Ali Shaikh, Chengliang Wang, Muhammad Wajeeh Us Sima, et al.
Frontiers in Medicine (2025) Vol. 12
Open Access
Cybersecurity Issues on E-Healthcare Cloud Data Warehouse System
Ogheneruona Maria Esegbona-Isikeh, Victor Nosakhare Oriakhi, Oluwatosin Samuel Falebita, et al.
Advances in computational intelligence and robotics book series (2025), pp. 125-154
Closed Access
Ogheneruona Maria Esegbona-Isikeh, Victor Nosakhare Oriakhi, Oluwatosin Samuel Falebita, et al.
Advances in computational intelligence and robotics book series (2025), pp. 125-154
Closed Access
Blockchain-Integrated Security for Real-Time Patient Monitoring in the Internet of Medical Things Using Federated Learning
Mohammad Faisal Khan, Mohammad Abaoud
IEEE Access (2023) Vol. 11, pp. 117826-117850
Open Access | Times Cited: 10
Mohammad Faisal Khan, Mohammad Abaoud
IEEE Access (2023) Vol. 11, pp. 117826-117850
Open Access | Times Cited: 10
DeepDeter: Strengthening Cybersecurity Against DoS Attacks with Deep Learning
Vanshika Pahuja, Sharad Shyam Ojha
(2024), pp. 1-6
Closed Access | Times Cited: 2
Vanshika Pahuja, Sharad Shyam Ojha
(2024), pp. 1-6
Closed Access | Times Cited: 2
LSF-IDM: Deep learning-based lightweight semantic fusion intrusion detection model for automotive
Pengzhou Cheng, Lei Hua, Haobin Jiang, et al.
Peer-to-Peer Networking and Applications (2024)
Closed Access | Times Cited: 2
Pengzhou Cheng, Lei Hua, Haobin Jiang, et al.
Peer-to-Peer Networking and Applications (2024)
Closed Access | Times Cited: 2
Data fusion and network intrusion detection systems
Rasheed Ahmad, Izzat Alsmadi
Cluster Computing (2024) Vol. 27, Iss. 6, pp. 7493-7519
Closed Access | Times Cited: 1
Rasheed Ahmad, Izzat Alsmadi
Cluster Computing (2024) Vol. 27, Iss. 6, pp. 7493-7519
Closed Access | Times Cited: 1
RCLNet: an effective anomaly-based intrusion detection for securing the IoMT system
Jamshed Ali Shaikh, Chengliang Wang, Wajeeh Us Sima Muhammad, et al.
Frontiers in Digital Health (2024) Vol. 6
Open Access | Times Cited: 1
Jamshed Ali Shaikh, Chengliang Wang, Wajeeh Us Sima Muhammad, et al.
Frontiers in Digital Health (2024) Vol. 6
Open Access | Times Cited: 1
A context-aware zero trust-based hybrid approach to IoT-based self-driving vehicles security
Izhar Ahmed Khan, Marwa Keshk, Yasir Hussain, et al.
Ad Hoc Networks (2024), pp. 103694-103694
Closed Access | Times Cited: 1
Izhar Ahmed Khan, Marwa Keshk, Yasir Hussain, et al.
Ad Hoc Networks (2024), pp. 103694-103694
Closed Access | Times Cited: 1
Ensuring patient safety in IoMT: A systematic literature review of behavior-based intrusion detection systems
Jordi Doménech, Isabel V. Martin-Faus, Saber Mhiri, et al.
Internet of Things (2024) Vol. 28, pp. 101420-101420
Open Access | Times Cited: 1
Jordi Doménech, Isabel V. Martin-Faus, Saber Mhiri, et al.
Internet of Things (2024) Vol. 28, pp. 101420-101420
Open Access | Times Cited: 1
Advancement and Development of Graph-Based Reasoning Method for Human Malicious Behaviors Identification Based on Graph Contrastive Representation Learning
Zhan Li, Xingyu Song, Shi Chen, et al.
(2024)
Closed Access
Zhan Li, Xingyu Song, Shi Chen, et al.
(2024)
Closed Access
Advancing IoT security: a comprehensive AI-based trust framework for intrusion detection
Chandra Prabha Kaliappan, Kanmani Palaniappan, Devipriya Ananthavadivel, et al.
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 5, pp. 2737-2757
Closed Access
Chandra Prabha Kaliappan, Kanmani Palaniappan, Devipriya Ananthavadivel, et al.
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 5, pp. 2737-2757
Closed Access