OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Fed-Inforce-Fusion: A federated reinforcement-based fusion model for security and privacy protection of IoMT networks against cyber-attacks
Izhar Ahmed Khan, Imran Razzak, Dechang Pi, et al.
Information Fusion (2023) Vol. 101, pp. 102002-102002
Open Access | Times Cited: 29

Showing 1-25 of 29 citing articles:

Blockchain security enhancement: an approach towards hybrid consensus algorithms and machine learning techniques
K. Venkatesan, Syarifah Bahiyah Rahayu
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 41

MLSTL-WSN: machine learning-based intrusion detection using SMOTETomek in WSNs
Md. Alamin Talukder, Selina Sharmin, Md Ashraf Uddin, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 2139-2158
Open Access | Times Cited: 25

A data-driven multi-perspective approach to cybersecurity knowledge discovery through topic modelling
Fahad Alqurashi, Istiak Ahmad
Alexandria Engineering Journal (2024) Vol. 107, pp. 374-389
Open Access | Times Cited: 5

Big-IDS: a decentralized multi agent reinforcement learning approach for distributed intrusion detection in big data networks
Faten Louati, Farah Barika Ktata, Ikram Amous
Cluster Computing (2024) Vol. 27, Iss. 5, pp. 6823-6841
Closed Access | Times Cited: 4

BFLIDS: Blockchain-Driven Federated Learning for Intrusion Detection in IoMT Networks
Khadija Begum, Md Ariful Islam Mozumder, Moon-Il Joo, et al.
Sensors (2024) Vol. 24, Iss. 14, pp. 4591-4591
Open Access | Times Cited: 4

WFE-Tab: Overcoming limitations of TabPFN in IIoT-MEC environments with a weighted fusion ensemble-TabPFN model for improved IDS performance
Sergio Ruiz-Villafranca, José Roldán-Gómez, Javier Carrillo-Mondéjar, et al.
Future Generation Computer Systems (2025), pp. 107707-107707
Closed Access

Securing the Future of IoMT
S. Satheesh Kumar, V. Muthukumaran, Sai Jahnavi, et al.
Advances in healthcare information systems and administration book series (2025), pp. 191-216
Closed Access

Analysis of convolutional-based variational autoencoders for privacy protection in realtime video surveillance
Mallepogu Sivalakshmi, K. Rajendra Prasad, C. Shoba Bindu
Expert Systems with Applications (2025), pp. 126817-126817
Closed Access

Cyber Security in Healthcare Systems: A Review of Tools and Attack Mitigation Techniques
Kousik Barik, Sanjay Misra, Sabarathinam Chockalingam
Communications in computer and information science (2025), pp. 87-105
Closed Access

Defending Against Multifaceted Network Attacks: A Multi-Label Meta-Learning and Lorenz Chaos MTD based Security Paradigm
N. A. Bharathi, Ranjani Parthasarathi, V. Vetriselvi
Journal of Network and Systems Management (2025) Vol. 33, Iss. 2
Closed Access

Velocity Paused Particle Swarm Optimization-based Intelligent Long Short-Term Memory Framework for Intrusion Detection System in Internet of Medical Things
Pandit Byomakesha Dash, H. S. Behera, Manas Ranjan Senapati, et al.
Arabian Journal for Science and Engineering (2025)
Closed Access

LSTM-JSO framework for privacy preserving adaptive intrusion detection in federated IoT networks
Shaymaa E. Sorour, Mohammed Aljaafari, Amany Mohamed Shaker, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access

A deep Reinforcement learning-based robust Intrusion Detection System for securing IoMT Healthcare Networks
Jamshed Ali Shaikh, Chengliang Wang, Muhammad Wajeeh Us Sima, et al.
Frontiers in Medicine (2025) Vol. 12
Open Access

Cybersecurity Issues on E-Healthcare Cloud Data Warehouse System
Ogheneruona Maria Esegbona-Isikeh, Victor Nosakhare Oriakhi, Oluwatosin Samuel Falebita, et al.
Advances in computational intelligence and robotics book series (2025), pp. 125-154
Closed Access

Blockchain-Integrated Security for Real-Time Patient Monitoring in the Internet of Medical Things Using Federated Learning
Mohammad Faisal Khan, Mohammad Abaoud
IEEE Access (2023) Vol. 11, pp. 117826-117850
Open Access | Times Cited: 10

DeepDeter: Strengthening Cybersecurity Against DoS Attacks with Deep Learning
Vanshika Pahuja, Sharad Shyam Ojha
(2024), pp. 1-6
Closed Access | Times Cited: 2

LSF-IDM: Deep learning-based lightweight semantic fusion intrusion detection model for automotive
Pengzhou Cheng, Lei Hua, Haobin Jiang, et al.
Peer-to-Peer Networking and Applications (2024)
Closed Access | Times Cited: 2

Data fusion and network intrusion detection systems
Rasheed Ahmad, Izzat Alsmadi
Cluster Computing (2024) Vol. 27, Iss. 6, pp. 7493-7519
Closed Access | Times Cited: 1

RCLNet: an effective anomaly-based intrusion detection for securing the IoMT system
Jamshed Ali Shaikh, Chengliang Wang, Wajeeh Us Sima Muhammad, et al.
Frontiers in Digital Health (2024) Vol. 6
Open Access | Times Cited: 1

A context-aware zero trust-based hybrid approach to IoT-based self-driving vehicles security
Izhar Ahmed Khan, Marwa Keshk, Yasir Hussain, et al.
Ad Hoc Networks (2024), pp. 103694-103694
Closed Access | Times Cited: 1

Ensuring patient safety in IoMT: A systematic literature review of behavior-based intrusion detection systems
Jordi Doménech, Isabel V. Martin-Faus, Saber Mhiri, et al.
Internet of Things (2024) Vol. 28, pp. 101420-101420
Open Access | Times Cited: 1

Advancing IoT security: a comprehensive AI-based trust framework for intrusion detection
Chandra Prabha Kaliappan, Kanmani Palaniappan, Devipriya Ananthavadivel, et al.
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 5, pp. 2737-2757
Closed Access

Page 1 - Next Page

Scroll to top