
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Advancing IoT security: A systematic review of machine learning approaches for the detection of IoT botnets
Ahsan Nazir, Jingsha He, Nafei Zhu, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 10, pp. 101820-101820
Open Access | Times Cited: 30
Ahsan Nazir, Jingsha He, Nafei Zhu, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 10, pp. 101820-101820
Open Access | Times Cited: 30
Showing 1-25 of 30 citing articles:
Collaborative threat intelligence: Enhancing IoT security through blockchain and machine learning integration
Ahsan Nazir, Jingsha He, Nafei Zhu, et al.
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 2, pp. 101939-101939
Open Access | Times Cited: 23
Ahsan Nazir, Jingsha He, Nafei Zhu, et al.
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 2, pp. 101939-101939
Open Access | Times Cited: 23
A deep learning-based novel hybrid CNN-LSTM architecture for efficient detection of threats in the IoT ecosystem
Ahsan Nazir, Jingsha He, Nafei Zhu, et al.
Ain Shams Engineering Journal (2024) Vol. 15, Iss. 7, pp. 102777-102777
Open Access | Times Cited: 20
Ahsan Nazir, Jingsha He, Nafei Zhu, et al.
Ain Shams Engineering Journal (2024) Vol. 15, Iss. 7, pp. 102777-102777
Open Access | Times Cited: 20
Botnets Unveiled: A Comprehensive Survey on Evolving Threats and Defense Strategies
Mehdi Asadi, Mohammad Ali Jabraeil Jamali, Arash Heidari, et al.
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 11
Open Access | Times Cited: 14
Mehdi Asadi, Mohammad Ali Jabraeil Jamali, Arash Heidari, et al.
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 11
Open Access | Times Cited: 14
Enhancing IoT security: a collaborative framework integrating federated learning, dense neural networks, and blockchain
Ahsan Nazir, Jingsha He, Nafei Zhu, et al.
Cluster Computing (2024) Vol. 27, Iss. 6, pp. 8367-8392
Closed Access | Times Cited: 4
Ahsan Nazir, Jingsha He, Nafei Zhu, et al.
Cluster Computing (2024) Vol. 27, Iss. 6, pp. 8367-8392
Closed Access | Times Cited: 4
Elevating IoT healthcare security using ProSRN and ICOM methodologies for effective threat management
Y. Sowjanya, S. Gopalakrishnan, Rakesh Kumar
International Journal of Information Technology (2025)
Closed Access
Y. Sowjanya, S. Gopalakrishnan, Rakesh Kumar
International Journal of Information Technology (2025)
Closed Access
A deep learning-based approach with two-step minority classes prediction for intrusion detection in Internet of Things networks
Salah-Eddine Maoudj, Aissam Belghiat
Knowledge-Based Systems (2025), pp. 113143-113143
Closed Access
Salah-Eddine Maoudj, Aissam Belghiat
Knowledge-Based Systems (2025), pp. 113143-113143
Closed Access
Artificial intelligence model for internet of things attack detection using machine learning algorithms
Anduamlak Abebe Fenta, Seffi Gebeyehu, Abebaw Alem
F1000Research (2025) Vol. 14, pp. 230-230
Open Access
Anduamlak Abebe Fenta, Seffi Gebeyehu, Abebaw Alem
F1000Research (2025) Vol. 14, pp. 230-230
Open Access
Security in E-Learning: A Systematic Review
Danilo Greco
Lecture notes in electrical engineering (2025), pp. 457-465
Closed Access
Danilo Greco
Lecture notes in electrical engineering (2025), pp. 457-465
Closed Access
Challenges in detecting security threats in WoT: a systematic literature review
Ruhma Sardar, Tayyaba Anees, Ahmad Sami Al-Shamayleh, et al.
Artificial Intelligence Review (2025) Vol. 58, Iss. 7
Open Access
Ruhma Sardar, Tayyaba Anees, Ahmad Sami Al-Shamayleh, et al.
Artificial Intelligence Review (2025) Vol. 58, Iss. 7
Open Access
Distributed denial-of-service (DDOS) attack detection using supervised machine learning algorithms
S. Abiramasundari, V. Ramaswamy
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
S. Abiramasundari, V. Ramaswamy
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Empirical evaluation of ensemble learning and hybrid CNN-LSTM for IoT threat detection on heterogeneous datasets
Ahsan Nazir, Jingsha He, Nafei Zhu, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 6
Closed Access
Ahsan Nazir, Jingsha He, Nafei Zhu, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 6
Closed Access
Detecting and Analyzing Botnet Nodes via Advanced Graph Representation Learning Tools
Alfredo Cuzzocrea, Abderraouf Hafsaoui, Carmine Gallo
Algorithms (2025) Vol. 18, Iss. 5, pp. 253-253
Open Access
Alfredo Cuzzocrea, Abderraouf Hafsaoui, Carmine Gallo
Algorithms (2025) Vol. 18, Iss. 5, pp. 253-253
Open Access
IoT-Enabled Predictive Maintenance for Sustainable Transportation Fleets
Vaibhav Mittal, P. Srividya Devi, Alok Kumar Pandey, et al.
E3S Web of Conferences (2024) Vol. 511, pp. 01012-01012
Open Access | Times Cited: 2
Vaibhav Mittal, P. Srividya Devi, Alok Kumar Pandey, et al.
E3S Web of Conferences (2024) Vol. 511, pp. 01012-01012
Open Access | Times Cited: 2
Security Analysis for Smart Healthcare Systems
Mariam Ibrahim, Abdallah Al-Wadi, Ruba Elhafiz
Sensors (2024) Vol. 24, Iss. 11, pp. 3375-3375
Open Access | Times Cited: 2
Mariam Ibrahim, Abdallah Al-Wadi, Ruba Elhafiz
Sensors (2024) Vol. 24, Iss. 11, pp. 3375-3375
Open Access | Times Cited: 2
Improving Information Security with Machine Learning
Ahmad Sanmorino, Rendra Gustriansyah, Shinta Puspasari, et al.
Journal Of Computer Networks Architecture and High Performance Computing (2024) Vol. 6, Iss. 1, pp. 212-219
Open Access | Times Cited: 1
Ahmad Sanmorino, Rendra Gustriansyah, Shinta Puspasari, et al.
Journal Of Computer Networks Architecture and High Performance Computing (2024) Vol. 6, Iss. 1, pp. 212-219
Open Access | Times Cited: 1
IoT-Enabled predictive maintenance for sustainable transportation fleets
Lavish Kansal, Poornima Ediga
MATEC Web of Conferences (2024) Vol. 392, pp. 01189-01189
Open Access | Times Cited: 1
Lavish Kansal, Poornima Ediga
MATEC Web of Conferences (2024) Vol. 392, pp. 01189-01189
Open Access | Times Cited: 1
Optimal Routing in Wireless Sensor Networks for Advancing IoT Efficiency and Sustainability using Enhanced Ant Colony Algorithm with machine learning approaches
A. Harshavardhan
Deleted Journal (2024) Vol. 20, Iss. 2s, pp. 922-930
Open Access | Times Cited: 1
A. Harshavardhan
Deleted Journal (2024) Vol. 20, Iss. 2s, pp. 922-930
Open Access | Times Cited: 1
An Optimized Approach to Deep Learning for Botnet Detection and Classification for Cybersecurity in Internet of Things Environment
Abdulrahman Alzahrani
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 80, Iss. 2, pp. 2331-2349
Open Access | Times Cited: 1
Abdulrahman Alzahrani
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 80, Iss. 2, pp. 2331-2349
Open Access | Times Cited: 1
An Attention-Based Approach to Enhance the Detection and Classification of Android Malware
Abdallah Ghourabi
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 80, Iss. 2, pp. 2743-2760
Open Access | Times Cited: 1
Abdallah Ghourabi
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 80, Iss. 2, pp. 2743-2760
Open Access | Times Cited: 1
An effective deep learning scheme for android malware detection leveraging performance metrics and computational resources
Ahsan Wajahat, Jingsha He, Nafei Zhu, et al.
Intelligent Decision Technologies (2024) Vol. 18, Iss. 1, pp. 33-55
Closed Access
Ahsan Wajahat, Jingsha He, Nafei Zhu, et al.
Intelligent Decision Technologies (2024) Vol. 18, Iss. 1, pp. 33-55
Closed Access
Botnet sequential activity detection with hybrid analysis
Muhammad Aidiel Rachman Putra, Tohari Ahmad, Dandy Pramana Hostiadi, et al.
Egyptian Informatics Journal (2024) Vol. 25, pp. 100440-100440
Open Access
Muhammad Aidiel Rachman Putra, Tohari Ahmad, Dandy Pramana Hostiadi, et al.
Egyptian Informatics Journal (2024) Vol. 25, pp. 100440-100440
Open Access
A Method for Examining and Reducing Malicious URL Connections by Machine Learning
Saima Siraj Qureshi, Jingsha He, Siraj Uddin Qureshi, et al.
(2024) Vol. 3, pp. 1-6
Closed Access
Saima Siraj Qureshi, Jingsha He, Siraj Uddin Qureshi, et al.
(2024) Vol. 3, pp. 1-6
Closed Access
Ensemble Learning Techniques for the Detection of IoT Botnets
Ahsan Nazir, Jingsha He, Nafei Zhu, et al.
(2024), pp. 80-85
Closed Access
Ahsan Nazir, Jingsha He, Nafei Zhu, et al.
(2024), pp. 80-85
Closed Access
Deep Learning Model for Intrusion Detection Based on Weighted Cross Entropy Loss Function and OBiLSTM
Yong Ding, Shuai Xu, Xinyong Peng, et al.
Research Square (Research Square) (2024)
Open Access
Yong Ding, Shuai Xu, Xinyong Peng, et al.
Research Square (Research Square) (2024)
Open Access
Enhancing IoT Security: Effective Botnet Attack Detection Through Machine Learning
Tamara Zhukabayeva, Lazzat Zholshiyeva, Khu Ven–Tsen, et al.
Procedia Computer Science (2024) Vol. 241, pp. 421-426
Open Access
Tamara Zhukabayeva, Lazzat Zholshiyeva, Khu Ven–Tsen, et al.
Procedia Computer Science (2024) Vol. 241, pp. 421-426
Open Access