OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Exploring Lightweight Deep Learning Solution for Malware Detection in IoT Constraint Environment
Abdur Rehman Khan, Amanullah Yasin, Syed Muhammad Usman, et al.
Electronics (2022) Vol. 11, Iss. 24, pp. 4147-4147
Open Access | Times Cited: 9

Showing 9 citing articles:

PestLite: A Novel YOLO-Based Deep Learning Technique for Crop Pest Detection
Qing Dong, Lina Sun, Tianxin Han, et al.
Agriculture (2024) Vol. 14, Iss. 2, pp. 228-228
Open Access | Times Cited: 20

Emerging Research in AI-Assisted Language Learning
Lalu Nurul Yaqin
Advances in multimedia and interactive technologies book series (2025), pp. 29-50
Closed Access

A Survey on Intrusion Detection Systems for IoT Networks Based on Long Short-Term Memory
Nour Elhouda Oueslati, Hichem Mrabet, Abderrazak Jemai
Communications in computer and information science (2024), pp. 237-250
Closed Access | Times Cited: 3

Evolution of Malware Targeting IoT Devices and Botnet formation
B. Sutheekshan, Shajahan Basheer, Gnanaprakasam Thangavel, et al.
(2024), pp. 1415-1422
Closed Access | Times Cited: 3

Privacy BERT-LSTM: a novel NLP algorithm for sensitive information detection in textual documents
Janani Muralitharan, Chandrasekar Arumugam
Neural Computing and Applications (2024) Vol. 36, Iss. 25, pp. 15439-15454
Closed Access | Times Cited: 3

Integrating Ebola optimization search algorithm for enhanced deep learning-based ransomware detection in Internet of Things security
Ibrahim R. Alzahrani, Randa Allafi
AIMS Mathematics (2024) Vol. 9, Iss. 3, pp. 6784-6802
Open Access | Times Cited: 2

Suboptimal Feature Selection Techniques for Effective Malicious Traffic Detection on Lightweight Devices
Soeun Jeon, Ye-Sol Oh, Yeon-Ji Lee, et al.
Computer Modeling in Engineering & Sciences (2024) Vol. 140, Iss. 2, pp. 1669-1687
Open Access | Times Cited: 2

LightFIDS: Lightweight and Hierarchical Federated IDS for Massive IoT in 6G Network
Asma Alotaibi, Ahmed Barnawi
Arabian Journal for Science and Engineering (2023) Vol. 49, Iss. 3, pp. 4383-4399
Closed Access | Times Cited: 3

Malware Prediction Using Tabular Deep Learning Models
Ahmad Alzu’bi, Abdelrahman Abuarqoub, Mohammad Abdullah, et al.
Advances in intelligent systems and computing (2024), pp. 379-389
Closed Access

Page 1

Scroll to top