
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Effective Multitask Deep Learning for IoT Malware Detection and Identification Using Behavioral Traffic Analysis
Sajid Ali, Omar Abusabha, Farman Ali, et al.
IEEE Transactions on Network and Service Management (2022) Vol. 20, Iss. 2, pp. 1199-1209
Closed Access | Times Cited: 31
Sajid Ali, Omar Abusabha, Farman Ali, et al.
IEEE Transactions on Network and Service Management (2022) Vol. 20, Iss. 2, pp. 1199-1209
Closed Access | Times Cited: 31
Showing 1-25 of 31 citing articles:
Design of an efficient Malware Prediction Model using Auto Encoded & Attention-based Recurrent Graph Relationship Analysis
Mahesh T. Dhande, S. P. Tiwari, Nikhil J. Rathod
International Research Journal of Multidisciplinary Technovation (2025), pp. 71-87
Open Access | Times Cited: 1
Mahesh T. Dhande, S. P. Tiwari, Nikhil J. Rathod
International Research Journal of Multidisciplinary Technovation (2025), pp. 71-87
Open Access | Times Cited: 1
A Review of State-of-the-Art Malware Attack Trends and Defense Mechanisms
Jannatul Ferdous, Rafiqul Islam, Arash Mahboubi, et al.
IEEE Access (2023) Vol. 11, pp. 121118-121141
Open Access | Times Cited: 21
Jannatul Ferdous, Rafiqul Islam, Arash Mahboubi, et al.
IEEE Access (2023) Vol. 11, pp. 121118-121141
Open Access | Times Cited: 21
MF-Net: Multi-frequency intrusion detection network for Internet traffic data
Zhaoxu Ding, Guoqiang Zhong, Xianping Qin, et al.
Pattern Recognition (2023) Vol. 146, pp. 109999-109999
Closed Access | Times Cited: 17
Zhaoxu Ding, Guoqiang Zhong, Xianping Qin, et al.
Pattern Recognition (2023) Vol. 146, pp. 109999-109999
Closed Access | Times Cited: 17
AI-powered malware detection with Differential Privacy for zero trust security in Internet of Things networks
Faria Nawshin, Devrim Ünal, Mohammad Hammoudeh, et al.
Ad Hoc Networks (2024) Vol. 161, pp. 103523-103523
Open Access | Times Cited: 8
Faria Nawshin, Devrim Ünal, Mohammad Hammoudeh, et al.
Ad Hoc Networks (2024) Vol. 161, pp. 103523-103523
Open Access | Times Cited: 8
Enhancing Malware Detection Through Machine Learning Using XAI with SHAP Framework
Nihala Basheer, Bernardi Pranggono, Shareeful Islam, et al.
IFIP advances in information and communication technology (2024), pp. 316-329
Closed Access | Times Cited: 5
Nihala Basheer, Bernardi Pranggono, Shareeful Islam, et al.
IFIP advances in information and communication technology (2024), pp. 316-329
Closed Access | Times Cited: 5
A Survey of Using Machine Learning in IoT Security and the Challenges Faced by Researchers
Khawlah Harahsheh, Chung‐Hao Chen
Informatica (2023) Vol. 47, Iss. 6
Open Access | Times Cited: 12
Khawlah Harahsheh, Chung‐Hao Chen
Informatica (2023) Vol. 47, Iss. 6
Open Access | Times Cited: 12
Anomaly-based Intrusion Detection System in Industrial IoT-Healthcare Environment Network
Md Maruf Rahman, Mahrima Akter Mim, Debashon Chakraborty, et al.
Journal of Engineering Research and Reports (2024) Vol. 26, Iss. 6, pp. 113-123
Open Access | Times Cited: 4
Md Maruf Rahman, Mahrima Akter Mim, Debashon Chakraborty, et al.
Journal of Engineering Research and Reports (2024) Vol. 26, Iss. 6, pp. 113-123
Open Access | Times Cited: 4
Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection Techniques and Recommended Prevention Approach
Omar Alshamsi, Khaled Shaalan, Usman Javed Butt
Information (2024) Vol. 15, Iss. 10, pp. 631-631
Open Access | Times Cited: 4
Omar Alshamsi, Khaled Shaalan, Usman Javed Butt
Information (2024) Vol. 15, Iss. 10, pp. 631-631
Open Access | Times Cited: 4
HoleMal: A lightweight IoT malware detection framework based on efficient host-level traffic processing
Ziqian Chen, Wei Xia, Zhen Li, et al.
Computers & Security (2025), pp. 104360-104360
Closed Access
Ziqian Chen, Wei Xia, Zhen Li, et al.
Computers & Security (2025), pp. 104360-104360
Closed Access
MIDALF—multimodal image and audio late fusion for malware detection
Setia Juli Irzal Ismail, Hendrawan Hendrawan, Budi Rahardjo, et al.
EURASIP Journal on Information Security (2025) Vol. 2025, Iss. 1
Open Access
Setia Juli Irzal Ismail, Hendrawan Hendrawan, Budi Rahardjo, et al.
EURASIP Journal on Information Security (2025) Vol. 2025, Iss. 1
Open Access
q-Rung orthopair fuzzy multi-criteria decision-making method for Internet of Things platforms selection
Xindong Peng, Linhui Yu, Wu Xiu
Engineering Applications of Artificial Intelligence (2025) Vol. 148, pp. 110336-110336
Closed Access
Xindong Peng, Linhui Yu, Wu Xiu
Engineering Applications of Artificial Intelligence (2025) Vol. 148, pp. 110336-110336
Closed Access
Malicious software identification based on deep learning algorithms and API feature extraction
Sun Wei
EURASIP Journal on Information Security (2025) Vol. 2025, Iss. 1
Open Access
Sun Wei
EURASIP Journal on Information Security (2025) Vol. 2025, Iss. 1
Open Access
Energy-Efficient and QoS-Aware Data Routing in Node Fault Prediction Based IoT Networks
Neha Sharma, Udit Agarwal, Sunny Shaurya, et al.
IEEE Transactions on Network and Service Management (2023) Vol. 20, Iss. 4, pp. 4585-4599
Closed Access | Times Cited: 8
Neha Sharma, Udit Agarwal, Sunny Shaurya, et al.
IEEE Transactions on Network and Service Management (2023) Vol. 20, Iss. 4, pp. 4585-4599
Closed Access | Times Cited: 8
A Modified Transformer Neural Network (MTNN) for Robust Intrusion Detection in IoT Networks
Syed Wahaj Ahmed, Fabio Kientz, Rasha Kashef
2022 International Telecommunications Conference (ITC-Egypt) (2023), pp. 663-668
Closed Access | Times Cited: 8
Syed Wahaj Ahmed, Fabio Kientz, Rasha Kashef
2022 International Telecommunications Conference (ITC-Egypt) (2023), pp. 663-668
Closed Access | Times Cited: 8
A Novel Approach to Network Forensic Analysis: Combining Packet Capture Data and Social Network Analysis
Irwan Sembiring, Suharyadi, Ade Iriani, et al.
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 3
Open Access | Times Cited: 5
Irwan Sembiring, Suharyadi, Ade Iriani, et al.
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 3
Open Access | Times Cited: 5
The use of multi-task learning in cybersecurity applications: a systematic literature review
Shimaa Ibrahim, Cagatay Catal, Thabet Kacem
Neural Computing and Applications (2024)
Open Access | Times Cited: 1
Shimaa Ibrahim, Cagatay Catal, Thabet Kacem
Neural Computing and Applications (2024)
Open Access | Times Cited: 1
Classification of Malware for Security Improvement in IoT using Heuristic Aided Adaptive Multi-scale and Dilated ResneXt with Gated Recurrent Unit
J Jagadeesan, S. Nandhini, B. Sathiyaprasad
Applied Soft Computing (2024) Vol. 163, pp. 111838-111838
Closed Access | Times Cited: 1
J Jagadeesan, S. Nandhini, B. Sathiyaprasad
Applied Soft Computing (2024) Vol. 163, pp. 111838-111838
Closed Access | Times Cited: 1
Real-time human detection and behavior recognition using low-cost hardware
Bojun Wang, Sajid Ali, Xinyi Fan, et al.
2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM) (2023)
Closed Access | Times Cited: 2
Bojun Wang, Sajid Ali, Xinyi Fan, et al.
2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM) (2023)
Closed Access | Times Cited: 2
A Robust Approach for Malware Attacks Detection in the Internet of Things Communications
Chhaya Negi, Amit Kumar Mishra, Anshika Verma, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 2
Chhaya Negi, Amit Kumar Mishra, Anshika Verma, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 2
Enhancing IoT Device Security: Predicting and Analyzing Reconnaissance Attacks Using Flags and Time-Based Attributes
Nazia Sharmin, Christopher Kiekintveld
(2023)
Closed Access | Times Cited: 2
Nazia Sharmin, Christopher Kiekintveld
(2023)
Closed Access | Times Cited: 2
Securing IoT Environment by Deploying Federated Deep Learning Models
Saleh Alghamdi, Aiiad Albeshri
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 4
Open Access
Saleh Alghamdi, Aiiad Albeshri
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 4
Open Access
Detecting Internet-of-Things Malware on Evidence Generation
YoonSeok Han, HyungBin Seo, MyungKeun Yoon
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 22, pp. 36950-36964
Closed Access
YoonSeok Han, HyungBin Seo, MyungKeun Yoon
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 22, pp. 36950-36964
Closed Access
Newspaper text recognition in Bengali script using support vector machine
Rajib Ghosh
Multimedia Tools and Applications (2023) Vol. 83, Iss. 11, pp. 32973-32991
Closed Access | Times Cited: 1
Rajib Ghosh
Multimedia Tools and Applications (2023) Vol. 83, Iss. 11, pp. 32973-32991
Closed Access | Times Cited: 1
Transfer learning-based Mirai botnet detection in IoT networks
Sana Rabhi, Tarek Abbes, Faouzi Zarai
2021 International Conference on INnovations in Intelligent SysTems and Applications (INISTA) (2023), pp. 1-5
Closed Access | Times Cited: 1
Sana Rabhi, Tarek Abbes, Faouzi Zarai
2021 International Conference on INnovations in Intelligent SysTems and Applications (INISTA) (2023), pp. 1-5
Closed Access | Times Cited: 1
Machine Learning-based Traffic Classification and Channel Allocation in IoT: A Survey
Santosh Lavate, Priyeshu Srivastava
2022 6th International Conference On Computing, Communication, Control And Automation (ICCUBEA (2023), pp. 1-7
Closed Access | Times Cited: 1
Santosh Lavate, Priyeshu Srivastava
2022 6th International Conference On Computing, Communication, Control And Automation (ICCUBEA (2023), pp. 1-7
Closed Access | Times Cited: 1