OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A novel adaptive network intrusion detection system for internet of things
Parthiban Aravamudhan, T. Kanimozhi
PLoS ONE (2023) Vol. 18, Iss. 4, pp. e0283725-e0283725
Open Access | Times Cited: 19

Showing 19 citing articles:

Signature-based intrusion detection using machine learning and deep learning approaches empowered with fuzzy clustering
Usama Ahmed, Mohammad Nazir, Amna Sarwar, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access | Times Cited: 4

A novel deep learning-based intrusion detection system for IoT DDoS security
Selman Hızal, Ünal Çavuşoğlu, Devrim Akgün
Internet of Things (2024) Vol. 28, pp. 101336-101336
Closed Access | Times Cited: 10

Anomaly-Based Intrusion Detection Model Using Deep Learning for IoT Networks
Muaadh A. Alsoufi, Maheyzah Md Siraj, Fuad A. Ghaleb, et al.
Computer Modeling in Engineering & Sciences (2024) Vol. 141, Iss. 1, pp. 823-845
Open Access | Times Cited: 6

Network Intrusion Detection System for Feature Extraction Based on Machine Learning Techniques
N. Nalini, Ankur Chaudhary, S. Surendran, et al.
2022 4th International Conference on Inventive Research in Computing Applications (ICIRCA) (2023), pp. 440-445
Closed Access | Times Cited: 13

Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection Techniques and Recommended Prevention Approach
Omar Alshamsi, Khaled Shaalan, Usman Javed Butt
Information (2024) Vol. 15, Iss. 10, pp. 631-631
Open Access | Times Cited: 4

Adaptive Machine Learning-Based Intrusion Detection Systems for IoT Era
Rahul Vadisetty
Lecture notes in networks and systems (2025), pp. 251-273
Closed Access

Generating IoT Specific Anomaly Datasets Using Cooja Simulator (Contiki-OS) and Performance Evaluation of Deep Learning Model Coupled with Aquila Optimizer
Vandana Choudhary, Sarvesh Tanwar, Tanupriya Choudhury
Journal of Computer Science (2024) Vol. 20, Iss. 4, pp. 365-378
Open Access | Times Cited: 3

Optimizing XGBoost hyperparameters using the dragonfly algorithm for enhanced cyber attack detection in the internet of healthcare things (IoHT)
SURBHI SURBHI, Nupa Ram Chauhan, Neeraj Dahiya
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access

Detection of Cyber Attack in IoT Based Model Using ANN Model with Genetic Algorithm
Animesh Srivastava, Hemendra Shanker Sharma, Rishikesh Rawat, et al.
(2024), pp. 1198-1201
Closed Access | Times Cited: 2

Intrusion Detection Techniques in Internet of Things: A Bird’s Eye View
Mayank Gautam, Sachin Ahuja, Abhishek Kumar
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) (2024), pp. 622-628
Closed Access | Times Cited: 1

Unveiling the Landscape of Machine Learning and Deep Learning Methodologies in Network Security: A Comprehensive Literature Review
Nouf Majid Sultan Eid Saeed, Amer Ibrahim, Liaqat Ali, et al.
(2024), pp. 1-7
Closed Access | Times Cited: 1

An AI-Driven Based Cybersecurity System for Network Intrusion Detection System in Hybrid with EPO and CNNet-LAM
D. Anu Disney, R. Yugha, S.Bangaru Karachi, et al.
(2024), pp. 1397-1404
Closed Access | Times Cited: 1

Generating IoT Specific Anomaly Datasets Using Cooja Simulator (Contiki-OS) and Performance Evaluation of Deep Learning Model Coupled with Aquila Optimizer
Vandana Choudhary, Sarvesh Tanwar, Tanupriya Choudhury
Journal of Computer Science (2024) Vol. 20, Iss. 4, pp. 365-378
Open Access

Machine Learning for Intrusion Detection Systems: A Systematic Literature Review
Daniel Stewart, Taiwo Kolajo, Olawande Daramola
Lecture notes in networks and systems (2024), pp. 623-638
Closed Access

A Dual-Approach Framework for Enhancing Network Traffic Analysis (DAFENTA): Leveraging NumeroLogic LLM Embeddings and Transformer Models for Intrusion Detection
Ning Yu, Liam Davies, Wei Zhong
2021 IEEE International Conference on Big Data (Big Data) (2024), pp. 7262-7271
Closed Access

Finding of DDoS Attack in IoT-Based Networks Using Ensemble Technique
Animesh Srivastava, Shweta Tiwari, Deepak Kumar, et al.
(2024), pp. 1-4
Closed Access

Internet of Things (IOT) Intrusion Detection Utilizing CNN and Fine Tuning It Using Various Optimization Parameters
Kaushiv, Kanwarpartap Singh Gill, Rahul Chauhan, et al.
(2023), pp. 1-5
Closed Access

Page 1

Scroll to top