OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats
Zhiyan Chen, Jinxin Liu, Yu Shen, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 5, pp. 1-37
Open Access | Times Cited: 75

Showing 1-25 of 75 citing articles:

STSIR: An individual-group game-based model for disclosing virus spread in Social Internet of Things
Guowen Wu, Lanlan Xie, Hong Zhang, et al.
Journal of Network and Computer Applications (2023) Vol. 214, pp. 103608-103608
Closed Access | Times Cited: 45

A metaheuristic-based ensemble feature selection framework for cyber threat detection in IoT-enabled networks
Arun Kumar Dey, Govind P. Gupta, Satya Prakash Sahu
Decision Analytics Journal (2023) Vol. 7, pp. 100206-100206
Open Access | Times Cited: 44

Navigating the nexus of security and privacy in modern financial technologies
Florence Olweny
GSC Advanced Research and Reviews (2024) Vol. 18, Iss. 2, pp. 167-197
Open Access | Times Cited: 19

Edge Learning for 6G-Enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses
Mohamed Amine Ferrag, Othmane Friha, Burak Kantarcı, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 4, pp. 2654-2713
Open Access | Times Cited: 23

Exploring the Potential of Blockchain Technology in an IoT-Enabled Environment: A Review
S. Deepak, Preeti Gulia, Nasib Singh Gill, et al.
IEEE Access (2024) Vol. 12, pp. 31197-31227
Open Access | Times Cited: 12

A Literature Review on Security in the Internet of Things: Identifying and Analysing Critical Categories
Hannelore Sebestyen, Daniela Elena Popescu, Doina Zmaranda
Computers (2025) Vol. 14, Iss. 2, pp. 61-61
Open Access | Times Cited: 1

Effective Multitask Deep Learning for IoT Malware Detection and Identification Using Behavioral Traffic Analysis
Sajid Ali, Omar Abusabha, Farman Ali, et al.
IEEE Transactions on Network and Service Management (2022) Vol. 20, Iss. 2, pp. 1199-1209
Closed Access | Times Cited: 31

Ensemble-Based Deep Learning Models for Enhancing IoT Intrusion Detection
Ammar Odeh, Anas Abu Taleb
Applied Sciences (2023) Vol. 13, Iss. 21, pp. 11985-11985
Open Access | Times Cited: 21

Evolving techniques in cyber threat hunting: A systematic review
Arash Mahboubi, Khanh Luong, Hamed Aboutorab, et al.
Journal of Network and Computer Applications (2024) Vol. 232, pp. 104004-104004
Open Access | Times Cited: 8

Detecting lateral movement: A systematic survey
Christos Smiliotopoulos, Georgios Kambourakis, Constantinos Kolias
Heliyon (2024) Vol. 10, Iss. 4, pp. e26317-e26317
Open Access | Times Cited: 7

SmartSentry: Cyber Threat Intelligence in Industrial IoT
Sapna Sadhwani, Urvi Kavan Modi, Raja Muthalagu, et al.
IEEE Access (2024) Vol. 12, pp. 34720-34740
Open Access | Times Cited: 6

A Systematic Review of Data Quality in CPS and IoT for Industry 4.0
Arda Göknil, Phu H. Nguyen, Sagar Sen, et al.
ACM Computing Surveys (2023) Vol. 55, Iss. 14s, pp. 1-38
Open Access | Times Cited: 16

Generating Synthetic Dataset for ML-Based IDS Using CTGAN and Feature Selection to Protect Smart IoT Environments
Saleh Alabdulwahab, Young-Tak Kim, Aria Seo, et al.
Applied Sciences (2023) Vol. 13, Iss. 19, pp. 10951-10951
Open Access | Times Cited: 14

Machine learning-enabled hybrid intrusion detection system with host data transformation and an advanced two-stage classifier
Zhiyan Chen, Murat Şimşek, Burak Kantarcı, et al.
Computer Networks (2024) Vol. 250, pp. 110576-110576
Open Access | Times Cited: 5

IP2FL: Interpretation-Based Privacy-Preserving Federated Learning for Industrial Cyber-Physical Systems
Danyal Namakshenas, Abbas Yazdinejad, Ali Dehghantanha, et al.
IEEE Transactions on Industrial Cyber-Physical Systems (2024) Vol. 2, pp. 321-330
Closed Access | Times Cited: 5

Machine Learning-Based Intrusion Detection Methods in IoT Systems: A Comprehensive Review
Brunel Rolack Kikissagbe, Meddi Adda
Electronics (2024) Vol. 13, Iss. 18, pp. 3601-3601
Open Access | Times Cited: 5

5G and IoT for Intelligent Healthcare: AI and Machine Learning Approaches—A Review
Hira Akhtar Butt, Abdul Ahad, Muhammad Wasim, et al.
(2024), pp. 107-123
Closed Access | Times Cited: 4

Unleashing the prospective of blockchain-federated learning fusion for IoT security: A comprehensive review
Mansi Gupta, Mohit Kumar, Renu Dhir
Computer Science Review (2024) Vol. 54, pp. 100685-100685
Closed Access | Times Cited: 4

IoT security best practices
Yacine Atif, Sujith Samuel Mathew
Elsevier eBooks (2025), pp. 277-298
Closed Access

Security Assurance of the IoT Environment by Applying Machine Learning: A Survey
S. Faizal Mukthar Hussain, R. Karthikeyan, S. Ramamoorthi, et al.
Signals and communication technology (2025), pp. 369-379
Closed Access

One-class IoT anomaly detection system using an improved interpolated deep SVDD autoencoder with adversarial regularizer
Abdulkarim Katbi, Riadh Ksantini
Digital Signal Processing (2025), pp. 105153-105153
Closed Access

Scientometric Analysis and Knowledge Mapping of Cybersecurity
Fahad Alqurashi, Istiak Ahmad
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 3
Open Access | Times Cited: 3

Machine learning and artificial intelligence techniques adopted for IT audit
Marcin Pycka, Maciej Zastempowski
Management (2025), Iss. 1, pp. 65-87
Open Access

A Hybrid CNN-LSTM Model for IIoT Edge Privacy-Aware Intrusion Detection
Erik Miguel de Elias, Vinícius Sanches Carriel, Guilherme Werneck de Oliveira, et al.
(2022)
Closed Access | Times Cited: 16

Page 1 - Next Page

Scroll to top