OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Optimal Deep-Learning-Based Cyberattack Detection in a Blockchain-Assisted IoT Environment
Fatmah Yousef Assiri, Mahmoud Ragab
Mathematics (2023) Vol. 11, Iss. 19, pp. 4080-4080
Open Access | Times Cited: 13

Showing 13 citing articles:

Optimizing Smart Home Intrusion Detection With Harmony-Enhanced Extra Trees
Akmalbek Abdusalomov, Dusmurod Kilichev, Rashid Nasimov, et al.
IEEE Access (2024) Vol. 12, pp. 117761-117786
Open Access | Times Cited: 4

Application of Metaheuristics in Feature Selection for IoT Networks
Branly Smith Paucar Arias
(2025)
Closed Access

Optimizing Blockchain Communication Systems Security With Deep Logic Sparse Autoencoder and Kookaburra Search–Based Intrusion Detection
Rakan A. Alsowail
International Journal of Communication Systems (2025) Vol. 38, Iss. 7
Closed Access

Path planning for greenhouse robots using a hybrid Dung beetle algorithm
Xinhao Zhang, Yuqing Duan, Xuefei Li, et al.
Intelligent Service Robotics (2025)
Closed Access

Optimizing Smart Home Intrusion Detection with Harmony-Enhanced Extra Trees
Akmalbek Abdusalomov, Dusmurod Kilichev, Rashid Nasimov, et al.
(2024)
Closed Access | Times Cited: 1

A Comprehensive Systematic Review of Blockchain-based Intrusion Detection Systems
Gideon Adele, Abinash Borah, Anirudh Paranjothi, et al.
2022 IEEE World AI IoT Congress (AIIoT) (2024), pp. 605-611
Closed Access | Times Cited: 1

Securing Consumer Electronics Devices: A Blockchain-Based Access Management Approach Enhanced by Deep Learning Threat Modeling for IoT Ecosystems
Mashael M. Asiri, Hessa Alfraihi, Yahia Said, et al.
IEEE Access (2024) Vol. 12, pp. 110671-110680
Open Access | Times Cited: 1

A comprehensive survey of honey badger optimization algorithm and meta-analysis of its variants and applications
Ibrahim Hayatu Hassan, Mohammed Abdullahi, Jeremiah Isuwa, et al.
Franklin Open (2024) Vol. 8, pp. 100141-100141
Open Access | Times Cited: 1

Enhancing data security in cloud computing: a blockchain-based Feistel cipher encryption and multiclass vector side-channel attack detection approach
Ramakrishna Subbareddy, Tamil selvan
International Journal of Advanced Technology and Engineering Exploration (2024) Vol. 11, Iss. 112
Open Access

Exploring the Intersection of Artificial Intelligence and Blockchain Technology in Complex Systems: A Systematic Review
M. Vubangsi, Gerald Nyuga, Fadi Al‐Turjman
Advances in Science, Technology & Innovation/Advances in science, technology & innovation (2024), pp. 235-245
Closed Access

Optimal Hybrid Deep Belief Networks based Cyberattack Detection in Blockchain Assisted Internet of Things Environment
G. Murugesan, P. Maheswaravenkatesh, Zayd Ajzan Salami, et al.
(2024), pp. 1-5
Closed Access

Capuchin Search Algorithm With Deep Learning-Based Data Edge Verification for Blockchain-Assisted IoT Environment
Khaled H. Alyoubi, Adil O. Khadidos, Abdulrhman M. Alshareef, et al.
IEEE Access (2023) Vol. 12, pp. 351-360
Open Access | Times Cited: 1

Page 1

Scroll to top