OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

An Advanced Intrusion Detection System for IIoT Based on GA and Tree Based Algorithms
Sydney Mambwe Kasongo
IEEE Access (2021) Vol. 9, pp. 113199-113212
Open Access | Times Cited: 119

Showing 1-25 of 119 citing articles:

A machine learning based credit card fraud detection using the GA algorithm for feature selection
Emmanuel Ileberi, Yanxia Sun, Zenghui Wang
Journal Of Big Data (2022) Vol. 9, Iss. 1
Open Access | Times Cited: 189

A hybrid CNN+LSTM-based intrusion detection system for industrial IoT networks
Hakan Can Altunay, Zafer Albayrak
Engineering Science and Technology an International Journal (2023) Vol. 38, pp. 101322-101322
Open Access | Times Cited: 148

Blockchain and federated learning-based intrusion detection approaches for edge-enabled industrial IoT networks: a survey
Saqib Ali, Qianmu Li, Abdullah Yousafzai
Ad Hoc Networks (2023) Vol. 152, pp. 103320-103320
Closed Access | Times Cited: 68

An Ensemble Learning Based Intrusion Detection Model for Industrial IoT Security
Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, et al.
Big Data Mining and Analytics (2023) Vol. 6, Iss. 3, pp. 273-287
Open Access | Times Cited: 52

Intelligent approaches toward intrusion detection systems for Industrial Internet of Things: A systematic comprehensive review
Mudhafar Nuaimi, Lamia Chaari Fourati, Bassem Ben Hamed
Journal of Network and Computer Applications (2023) Vol. 215, pp. 103637-103637
Closed Access | Times Cited: 51

Network intrusion detection system by applying ensemble model for smart home
Malothu Amru, R. Jagadeesh Kannan, E. N. Ganesh, et al.
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2024) Vol. 14, Iss. 3, pp. 3485-3485
Open Access | Times Cited: 31

Enhanced IDS with Deep Learning for IoT-Based Smart Cities Security
Chaimae Hazman, Azidine Guezzaz, Said Benkirane, et al.
Tsinghua Science & Technology (2024) Vol. 29, Iss. 4, pp. 929-947
Open Access | Times Cited: 19

A Regularized Cross-Layer Ladder Network for Intrusion Detection in Industrial Internet of Things
Jing Long, Wei Liang, Kuan‐Ching Li, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 2, pp. 1747-1755
Open Access | Times Cited: 57

An efficient optimal security system for intrusion detection in cloud computing environment using hybrid deep learning technique
M. Mayuranathan, S.K. Saravanan, B. Muthusenthil, et al.
Advances in Engineering Software (2022) Vol. 173, pp. 103236-103236
Closed Access | Times Cited: 46

An effective intrusion detection approach based on ensemble learning for IIoT edge computing
Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, et al.
Journal of Computer Virology and Hacking Techniques (2022) Vol. 19, Iss. 4, pp. 469-481
Closed Access | Times Cited: 44

Blockchain-Based Secure Localization against Malicious Nodes in IoT-Based Wireless Sensor Networks Using Federated Learning
Gebrekiros Gebreyesus Gebremariam, Jeebananda Panda, S. Indu
Wireless Communications and Mobile Computing (2023) Vol. 2023, pp. 1-27
Open Access | Times Cited: 37

HC-DTTSVM: A Network Intrusion Detection Method Based on Decision Tree Twin Support Vector Machine and Hierarchical Clustering
Li Zou, Xuemei Luo, Yan Zhang, et al.
IEEE Access (2023) Vol. 11, pp. 21404-21416
Open Access | Times Cited: 36

Reliable Machine Learning Model for IIoT Botnet Detection
Fatma Taher, Mahmoud Abdel-Salam, Mohamed Elhoseny, et al.
IEEE Access (2023) Vol. 11, pp. 49319-49336
Open Access | Times Cited: 31

Industrial Internet of Things Intrusion Detection Method Using Machine Learning and Optimization Techniques
Tarek Gaber, Joseph Bamidele Awotunde, Sakinat Oluwabukonla Folorunso, et al.
Wireless Communications and Mobile Computing (2023) Vol. 2023, pp. 1-15
Open Access | Times Cited: 31

Federated Learning Inspired Low-Complexity Intrusion Detection and Classification Technique for SDN-Based Industrial CPS
Ahmad Zainudin, Rubina Akter, Dong‐Seong Kim, et al.
IEEE Transactions on Network and Service Management (2023) Vol. 20, Iss. 3, pp. 2442-2459
Closed Access | Times Cited: 28

An explainable efficient flow-based Industrial IoT intrusion detection system
Mohammed M. Alani
Computers & Electrical Engineering (2023) Vol. 108, pp. 108732-108732
Closed Access | Times Cited: 26

A Machine Learning Method with Hybrid Feature Selection for Improved Credit Card Fraud Detection
Ibomoiye Domor Mienye, Yanxia Sun
Applied Sciences (2023) Vol. 13, Iss. 12, pp. 7254-7254
Open Access | Times Cited: 26

An ensemble framework with improved hybrid breeding optimization-based feature selection for intrusion detection
Zhiwei Ye, Jun Luo, Zhou Wen, et al.
Future Generation Computer Systems (2023) Vol. 151, pp. 124-136
Closed Access | Times Cited: 26

Security at the Edge for Resource-Limited IoT Devices
Daniele Canavese, Luca Mannella, Leonardo Regano, et al.
Sensors (2024) Vol. 24, Iss. 2, pp. 590-590
Open Access | Times Cited: 17

A Genetic Algorithm- and t-Test-Based System for DDoS Attack Detection in IoT Networks
Makhduma F. Saiyed, Irfan Al‐Anbagi
IEEE Access (2024) Vol. 12, pp. 25623-25641
Open Access | Times Cited: 13

Recent endeavors in machine learning-powered intrusion detection systems for the Internet of Things
D. Manivannan
Journal of Network and Computer Applications (2024) Vol. 229, pp. 103925-103925
Closed Access | Times Cited: 12

Malicious detection model with artificial neural network in IoT-based smart farming security
Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, et al.
Cluster Computing (2024) Vol. 27, Iss. 6, pp. 7307-7322
Closed Access | Times Cited: 11

Anomaly Detection for Industrial Internet of Things Cyberattacks
Rehab Alanazi, Ahamed Aljuhani
Computer Systems Science and Engineering (2022) Vol. 44, Iss. 3, pp. 2361-2378
Open Access | Times Cited: 29

Intrusion detection in internet of things using improved binary golden jackal optimization algorithm and LSTM
Amir Vafid Hanafi, Ali Ghaffari, Hesam Rezaei, et al.
Cluster Computing (2023) Vol. 27, Iss. 3, pp. 2673-2690
Closed Access | Times Cited: 23

Secure localization techniques in wireless sensor networks against routing attacks based on hybrid machine learning models
Gebrekiros Gebreyesus Gebremariam, Jeebananda Panda, S. Indu
Alexandria Engineering Journal (2023) Vol. 82, pp. 82-100
Open Access | Times Cited: 22

Page 1 - Next Page

Scroll to top