Securing Critical Infrastructures: Deep-Learning-Based Threat Detection in IIoT
Abstract
loading...
About
In The Last Decade
doi.org/10.1109/mcom.101.2001126 →Countries where authors are citing Securing Critical Infrastructures: Deep-Learning-Based Threat Detection in IIoT
This map shows the geographic impact of Securing Critical Infrastructures: Deep-Learning-Based Threat Detection in IIoT. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Securing Critical Infrastructures: Deep-Learning-Based Threat Detection in IIoT with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Securing Critical Infrastructures: Deep-Learning-Based Threat Detection in IIoT more than expected).
Fields of papers citing Securing Critical Infrastructures: Deep-Learning-Based Threat Detection in IIoT
This network shows the impact of Securing Critical Infrastructures: Deep-Learning-Based Threat Detection in IIoT. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the Securing Critical Infrastructures: Deep-Learning-Based Threat Detection in IIoT.
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.
This paper is also available at doi.org/10.1109/mcom.101.2001126.