
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Implementation of Machine Learning and Data Mining to Improve Cybersecurity and Limit Vulnerabilities to Cyber Attacks
Mohamed Alloghani, Dhiya Al‐Jumeily, Abir Hussain, et al.
Studies in computational intelligence (2019), pp. 47-76
Closed Access | Times Cited: 25
Mohamed Alloghani, Dhiya Al‐Jumeily, Abir Hussain, et al.
Studies in computational intelligence (2019), pp. 47-76
Closed Access | Times Cited: 25
Showing 25 citing articles:
A novel PCA–whale optimization-based deep neural network model for classification of tomato plant diseases using GPU
Thippa Reddy Gadekallu, Dharmendra Singh Rajput, Praveen Kumar Reddy Maddikunta, et al.
Journal of Real-Time Image Processing (2020) Vol. 18, Iss. 4, pp. 1383-1396
Closed Access | Times Cited: 268
Thippa Reddy Gadekallu, Dharmendra Singh Rajput, Praveen Kumar Reddy Maddikunta, et al.
Journal of Real-Time Image Processing (2020) Vol. 18, Iss. 4, pp. 1383-1396
Closed Access | Times Cited: 268
An effective genetic algorithm-based feature selection method for intrusion detection systems
Zahid Halim, Muhammad Nadeem Yousaf, Muhammad Waqas, et al.
Computers & Security (2021) Vol. 110, pp. 102448-102448
Closed Access | Times Cited: 109
Zahid Halim, Muhammad Nadeem Yousaf, Muhammad Waqas, et al.
Computers & Security (2021) Vol. 110, pp. 102448-102448
Closed Access | Times Cited: 109
A New Proposal on the Advanced Persistent Threat: A Survey
Santiago Quintero-Bonilla, A. Martı́n del Rey
Applied Sciences (2020) Vol. 10, Iss. 11, pp. 3874-3874
Open Access | Times Cited: 62
Santiago Quintero-Bonilla, A. Martı́n del Rey
Applied Sciences (2020) Vol. 10, Iss. 11, pp. 3874-3874
Open Access | Times Cited: 62
Machine LearningTechniquesfor Detection of Website Phishing: A Review for Promises and Challenges
Ammar Odeh, Ismail Keshta, Eman Abdelfattah
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) (2021), pp. 0813-0818
Closed Access | Times Cited: 40
Ammar Odeh, Ismail Keshta, Eman Abdelfattah
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) (2021), pp. 0813-0818
Closed Access | Times Cited: 40
Análisis de vulnerabilidades en sectores industriales: Un estudio sobre Ciberseguridad 2021-2023
Javier Guaña–Moya, Juan Carlos Cobos Velasco, Genesis Bowen Calero, et al.
Revista Ingenio global. (2025) Vol. 4, Iss. 1, pp. 219-236
Closed Access
Javier Guaña–Moya, Juan Carlos Cobos Velasco, Genesis Bowen Calero, et al.
Revista Ingenio global. (2025) Vol. 4, Iss. 1, pp. 219-236
Closed Access
Joint IoT/ML Platforms for Smart Societies and Environments: A Review on Multimodal Information-Based Learning for Safety and Security
Hani Attar
Journal of Data and Information Quality (2023) Vol. 15, Iss. 3, pp. 1-26
Closed Access | Times Cited: 11
Hani Attar
Journal of Data and Information Quality (2023) Vol. 15, Iss. 3, pp. 1-26
Closed Access | Times Cited: 11
SI-BBA – A novel phishing website detection based on Swarm intelligence with deep learning
Parvathapuram Pavan Kumar, T. Jaya, V. Rajendran
Materials Today Proceedings (2021) Vol. 80, pp. 3129-3139
Closed Access | Times Cited: 23
Parvathapuram Pavan Kumar, T. Jaya, V. Rajendran
Materials Today Proceedings (2021) Vol. 80, pp. 3129-3139
Closed Access | Times Cited: 23
Object Detection and Distance Measurement Using AI
Mustafa M. Faisal, Mohammad S. Mohammed, Ali M. Abduljabar, et al.
2021 14th International Conference on Developments in eSystems Engineering (DeSE) (2021), pp. 559-565
Closed Access | Times Cited: 20
Mustafa M. Faisal, Mohammad S. Mohammed, Ali M. Abduljabar, et al.
2021 14th International Conference on Developments in eSystems Engineering (DeSE) (2021), pp. 559-565
Closed Access | Times Cited: 20
Current security threats in the national and international context
Lavinia Mihaela Cristea
Journal of Accounting and Management Information Systems (2020) Vol. 19, Iss. 2, pp. 351-378
Open Access | Times Cited: 19
Lavinia Mihaela Cristea
Journal of Accounting and Management Information Systems (2020) Vol. 19, Iss. 2, pp. 351-378
Open Access | Times Cited: 19
Intelligent decision support system approach for predicting the performance of students based on three-level machine learning technique
Sohaib Latif, Fang Xian-wen, Lili Wang
Journal of Intelligent Systems (2021) Vol. 30, Iss. 1, pp. 739-749
Open Access | Times Cited: 17
Sohaib Latif, Fang Xian-wen, Lili Wang
Journal of Intelligent Systems (2021) Vol. 30, Iss. 1, pp. 739-749
Open Access | Times Cited: 17
Two-Step Classification with SVD Preprocessing of Distributed Massive Datasets in Apache Spark
A. Alexopoulos, Γεώργιος Δρακόπουλος, Andreas Kanavos, et al.
Algorithms (2020) Vol. 13, Iss. 3, pp. 71-71
Open Access | Times Cited: 15
A. Alexopoulos, Γεώργιος Δρακόπουλος, Andreas Kanavos, et al.
Algorithms (2020) Vol. 13, Iss. 3, pp. 71-71
Open Access | Times Cited: 15
Application of Data Mining Technology in Enterprise Digital Human Resource Management
Zhou Da
Security and Communication Networks (2022) Vol. 2022, pp. 1-9
Open Access | Times Cited: 8
Zhou Da
Security and Communication Networks (2022) Vol. 2022, pp. 1-9
Open Access | Times Cited: 8
Inter net of Things Machine Learning Comprehensive Overview, Security Intelligence, Approaches, and Directions of Research
Hani Attar
(2022), pp. 1-6
Closed Access | Times Cited: 4
Hani Attar
(2022), pp. 1-6
Closed Access | Times Cited: 4
Content Based Image Retrieval Based on Feature Fusion and Support Vector Machine
Ibtihaal M. Hameed, Sadiq H. Abdulhussain, Basheera M. Mahmmod, et al.
2021 14th International Conference on Developments in eSystems Engineering (DeSE) (2021) Vol. 1090, pp. 552-558
Closed Access | Times Cited: 5
Ibtihaal M. Hameed, Sadiq H. Abdulhussain, Basheera M. Mahmmod, et al.
2021 14th International Conference on Developments in eSystems Engineering (DeSE) (2021) Vol. 1090, pp. 552-558
Closed Access | Times Cited: 5
Practical Implementation of Artificial Intelligence in Cybersecurity – A Study
Saeed Fazal Ur Rehman
IJARCCE (2022) Vol. 11, Iss. 11
Open Access | Times Cited: 3
Saeed Fazal Ur Rehman
IJARCCE (2022) Vol. 11, Iss. 11
Open Access | Times Cited: 3
Efficient Time Series of Smoothing and Auto-regressive Forecasting Models for Predicting Police Officer Fatalities in the USA
Danush Nagappan, Manoj Jayabalan, Ahmad Alanezi, et al.
Lecture notes on data engineering and communications technologies (2024), pp. 181-192
Closed Access
Danush Nagappan, Manoj Jayabalan, Ahmad Alanezi, et al.
Lecture notes on data engineering and communications technologies (2024), pp. 181-192
Closed Access
An Analysis of Network Protocol Vulnerability Mining Using Fuzz Testing Combined with Deep Learning Models
MA Ya
Deleted Journal (2024) Vol. 20, Iss. 3, pp. 1111-1125
Open Access
MA Ya
Deleted Journal (2024) Vol. 20, Iss. 3, pp. 1111-1125
Open Access
ML-Based Methods for Detecting Phishing Websites: A Comprehensive Survey and Analysis
Tanvi Tanvi, DR. ABHINAV BHANDARI
SSRN Electronic Journal (2024)
Closed Access
Tanvi Tanvi, DR. ABHINAV BHANDARI
SSRN Electronic Journal (2024)
Closed Access
Revolutionizing Finance: Unleashing Machine Learning's Potential for a New Financial Era
Manjit Kour
(2024), pp. 1-5
Closed Access
Manjit Kour
(2024), pp. 1-5
Closed Access
Explore the Application of Predictive Analytics and Machine Learning Algorithms in Identifying and Preventing Cyber Threats and Vulnerabilities within Computer Systems
Ranadeep Reddy Palle
International Journal of Science and Research (IJSR) (2023) Vol. 12, Iss. 2, pp. 1704-1712
Open Access | Times Cited: 1
Ranadeep Reddy Palle
International Journal of Science and Research (IJSR) (2023) Vol. 12, Iss. 2, pp. 1704-1712
Open Access | Times Cited: 1
Study and design of decision-making models for education system using artificial intelligence
Abhay Gyan P. Kujur, Rajesh Kr Tiwari
(2022), pp. 434-439
Closed Access | Times Cited: 2
Abhay Gyan P. Kujur, Rajesh Kr Tiwari
(2022), pp. 434-439
Closed Access | Times Cited: 2
Cybersecurity using Data Mining Techniques
Sanjiv Jain, Joey G. Fernando
TechnoareteTransactions on Intelligent Data Mining and Knowledge Discovery (2022) Vol. 2, Iss. 4
Open Access | Times Cited: 1
Sanjiv Jain, Joey G. Fernando
TechnoareteTransactions on Intelligent Data Mining and Knowledge Discovery (2022) Vol. 2, Iss. 4
Open Access | Times Cited: 1
A Comparison of Performance of Rough Set Theory with Machine Learning Techniques in Detecting Phishing Attack
Arpit Singh, Subhas Chandra Misra
Lecture notes in networks and systems (2022), pp. 631-650
Closed Access
Arpit Singh, Subhas Chandra Misra
Lecture notes in networks and systems (2022), pp. 631-650
Closed Access
Analysis of Network Technologies and Cyber security Assessment for Enhancing Machine Learning, Grid Computing and Cyber-Physical Connectivity Internetwork Effectiveness
B. Dhanalakshmi, Chaitanya Singh, S. Surya, et al.
2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM) (2022), pp. 1-7
Closed Access
B. Dhanalakshmi, Chaitanya Singh, S. Surya, et al.
2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM) (2022), pp. 1-7
Closed Access
Nuevas perspectivas en el estudio de amenazas persistentes avanzadas
Santiago Bonilla
(2021)
Open Access
Santiago Bonilla
(2021)
Open Access