OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Hybrid CNN-LSTM Model for IIoT Edge Privacy-Aware Intrusion Detection
Erik Miguel de Elias, Vinícius Sanches Carriel, Guilherme Werneck de Oliveira, et al.
(2022)
Closed Access | Times Cited: 16

Showing 16 citing articles:

Revolutionizing Cyber Threat Detection With Large Language Models: A Privacy-Preserving BERT-Based Lightweight Model for IoT/IIoT Devices
Mohamed Amine Ferrag, Mthandazo Ndhlovu, Norbert Tihanyi, et al.
IEEE Access (2024) Vol. 12, pp. 23733-23750
Open Access | Times Cited: 60

A Comprehensive Review of Large Language Models in Cyber Security.
Mesut Güven
International Journal of Computational and Experimental Science and Engineering (2024) Vol. 10, Iss. 3
Open Access | Times Cited: 15

Network Intrusion Detection System Using Convolutional Neural Networks: NIDS-DL-CNN for IoT Security
Kamir Kharoubi, Sarra Cherbal, Djamila Mechta, et al.
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access | Times Cited: 1

Model-agnostic generation-enhanced technology for few-shot intrusion detection
Junpeng He, Lingfeng Yao, Xiong Li, et al.
Applied Intelligence (2024) Vol. 54, Iss. 4, pp. 3181-3204
Closed Access | Times Cited: 7

SmartSentry: Cyber Threat Intelligence in Industrial IoT
Sapna Sadhwani, Urvi Kavan Modi, Raja Muthalagu, et al.
IEEE Access (2024) Vol. 12, pp. 34720-34740
Open Access | Times Cited: 6

DL-SkLSTM approach for cyber security threats detection in 5G enabled IIoT
Anjali Rajak, Rakesh Tripathi
International Journal of Information Technology (2023) Vol. 16, Iss. 1, pp. 13-20
Closed Access | Times Cited: 13

Unsupervised Representation Learning Approach for Intrusion Detection in the Industrial Internet of Things Network Environment
Vishnu Radhakrishnan, N Kabilan, Vinayakumar Ravi, et al.
Springer series in reliability engineering (2025), pp. 41-76
Closed Access

Explainable AI for Zero-Day Attack Detection in IoT Networks Using Attention Fusion Model
Deepa Krishnan, Swapnil Singh, Vijayan Sugumaran
Research Square (Research Square) (2025)
Closed Access

Optimizing Cyber Threat Detection in IoT: A Study of Artificial Bee Colony (ABC)-Based Hyperparameter Tuning for Machine Learning
Ayoub Alsarhan, Mahmoud AlJamal, Osama Harfoushi, et al.
Technologies (2024) Vol. 12, Iss. 10, pp. 181-181
Open Access | Times Cited: 1

An intrusion attack classification using bio-inspired optimization technique and ensemble learning model for edge computing environments
R. Mohemmed Yousuf, Mangayarkarasi Ramaiah
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1

Malicious Traffic Classification via Edge Intelligence in IIoT
Maoli Wang, Bowen Zhang, Xiaodong Zang, et al.
Mathematics (2023) Vol. 11, Iss. 18, pp. 3951-3951
Open Access | Times Cited: 2

Enhancing IoT Intrusion Detection with Federated Learning-Based CNN-GRU and LSTM-GRU Ensembles
Ogobuchi Daniel Okey, Demóstenes Zegarra Rodríguez, João Henrique Kleinschmidt
(2024), pp. 1-6
Closed Access

Applying Hoeffding Tree Algorithms for Effective Stream Learning in IoT DDoS Detection
João Gabriel Andrade de Araújo Josephik, Yaissa Siqueira, Kétly Gonçalves Machado, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 1

Comparative Analysis of Cybersecurity Datasets in Industrial Control Systems
Inês Martins, José Cecílio, Pedro Ferreira, et al.
(2024), pp. 440-445
Closed Access

Page 1

Scroll to top