OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Showing 1-25 of 31 citing articles:

Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions towards automation, intelligence and transparent cybersecurity modeling for critical infrastructures
Iqbal H. Sarker, Helge Janicke, Mohamed Amine Ferrag, et al.
Internet of Things (2024) Vol. 25, pp. 101110-101110
Open Access | Times Cited: 20

A Survey on Cybersecurity in IoT
Ηλίας Δρίτσας, Μαρία Τρίγκα
Future Internet (2025) Vol. 17, Iss. 1, pp. 30-30
Open Access | Times Cited: 3

Enhancing Cybersecurity through AI and ML: Strategies, Challenges, and Future Directions
Maryam Roshanaei, Mahir R. Khan, Natalie N. Sylvester
Journal of Information Security (2024) Vol. 15, Iss. 03, pp. 320-339
Open Access | Times Cited: 11

Generative AI and Large Language Modeling in Cybersecurity
Iqbal H. Sarker
(2024), pp. 79-99
Closed Access | Times Cited: 8

Employing Deep Reinforcement Learning to Cyber-Attack Simulation for Enhancing Cybersecurity
Sang Ho Oh, Jeongyoon Kim, Jae Hoon Nah, et al.
Electronics (2024) Vol. 13, Iss. 3, pp. 555-555
Open Access | Times Cited: 7

Machine Learning-Driven Detection of Cross-Site Scripting Attacks
Rahmah Alhamyani, Majid Alshammari
Information (2024) Vol. 15, Iss. 7, pp. 420-420
Open Access | Times Cited: 5

LearnAlytics: The Smart Way to Analyze, Adapt, and Achieve in E-Learning
Subhabrata Sengupta, S. Bardhan, Rupayan Das, et al.
SN Computer Science (2025) Vol. 6, Iss. 1
Closed Access

Data Processing Displacements: The Use of CHERI Fat Pointers and the GDPR
Mark Burdon, Lizzie Coles-Kemp, Laura Shipp, et al.
Lecture notes in computer science (2025), pp. 290-308
Closed Access

Offensive and defensive cybersecurity solutions in healthcare
Cheryl Ann Alexander, Lidong Wang
Computing and artificial intelligence. (2025) Vol. 3, Iss. 2, pp. 2220-2220
Closed Access

Towards a smarter education system: an investigation into ML and DL for information retrieval
Subhabrata Sengupta, Satyajit Chakrabarti
Multimedia Tools and Applications (2025)
Closed Access

AI for Critical Infrastructure Protection and Resilience
Iqbal H. Sarker
(2024), pp. 153-172
Closed Access | Times Cited: 3

Introduction to AI-Driven Cybersecurity and Threat Intelligence
Iqbal H. Sarker
(2024), pp. 3-19
Closed Access | Times Cited: 2

Automated Sensor Node Malicious Activity Detection with Explainability Analysis
Md. Zubair, Helge Janicke, Ahmad Mohsin, et al.
Sensors (2024) Vol. 24, Iss. 12, pp. 3712-3712
Open Access | Times Cited: 2

Enhancing IoT Security Using GA-HDLAD: A Hybrid Deep Learning Approach for Anomaly Detection
Ibrahim Mutambik
Applied Sciences (2024) Vol. 14, Iss. 21, pp. 9848-9848
Open Access | Times Cited: 2

A Robust Machine Learning Model for Cyber Incident Classification and Prioritization
Aiswarya Dwarampudi, Manas Kumar Yogi
Journal of Trends in Computer Science and Smart Technology (2024) Vol. 6, Iss. 1, pp. 51-66
Open Access | Times Cited: 2

On the Robustness of ML-Based Network Intrusion Detection Systems: An Adversarial and Distribution Shift Perspective
Minxiao Wang, Ning Yang, Dulaj Gunasinghe, et al.
Computers (2023) Vol. 12, Iss. 10, pp. 209-209
Open Access | Times Cited: 6

AI-Enabled Cybersecurity for IoT and Smart City Applications
Iqbal H. Sarker
(2024), pp. 121-136
Closed Access | Times Cited: 1

Developing robust machine learning models to defend against adversarial attacks in the field of cybersecurity
Taif Ayad Khaleel
2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) (2024), pp. 1-7
Closed Access | Times Cited: 1

Adaptive Management of Multi-Scenario Projects in Cybersecurity: Models and Algorithms for Decision-Making
В С Тынченко, Alexander Lomazov, Vadim Lomazov, et al.
Big Data and Cognitive Computing (2024) Vol. 8, Iss. 11, pp. 150-150
Open Access | Times Cited: 1

A Model for Estimating Resiliency of AI-Based Classifiers Defending Against Cyber Attacks
Kousik Barik, Sanjay Misra, Luis Fernández Sanz
International Journal of Computational Intelligence Systems (2024) Vol. 17, Iss. 1
Open Access | Times Cited: 1

AI-Powered Cyber Threats: A Systematic Review
Mafaz Alanezi, Ruah Mouad Alyas AL-Azzawi
Deleted Journal (2024) Vol. 4, Iss. 3, pp. 166-188
Closed Access | Times Cited: 1

Page 1 - Next Page

Scroll to top