
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Mobile Operating System (Android) Vulnerability Analysis Using Machine Learning
Vinod Mahor, Kiran Pachlasiya, Bhagwati Garg, et al.
Lecture notes in networks and systems (2022), pp. 159-169
Closed Access | Times Cited: 59
Vinod Mahor, Kiran Pachlasiya, Bhagwati Garg, et al.
Lecture notes in networks and systems (2022), pp. 159-169
Closed Access | Times Cited: 59
Showing 1-25 of 59 citing articles:
Malevolent Information Crawling Mechanism for Forming Structured Illegal Organisations in Hidden Networks
Romil Rawat, Sonali Gupta, S. Sivaranjani, et al.
International Journal of Cyber Warfare and Terrorism (2022) Vol. 12, Iss. 1, pp. 1-14
Closed Access | Times Cited: 55
Romil Rawat, Sonali Gupta, S. Sivaranjani, et al.
International Journal of Cyber Warfare and Terrorism (2022) Vol. 12, Iss. 1, pp. 1-14
Closed Access | Times Cited: 55
Future of Digital Work Force in Robotic Process Automation
P. William, V. M. Tidake, Sandip R. Thorat, et al.
(2023), pp. 297-314
Closed Access | Times Cited: 33
P. William, V. M. Tidake, Sandip R. Thorat, et al.
(2023), pp. 297-314
Closed Access | Times Cited: 33
Machine learning aided malware detection for secure and smart manufacturing: a comprehensive analysis of the state of the art
Sangeeta Rani, Khushboo Tripathi, Ajay Kumar
International Journal on Interactive Design and Manufacturing (IJIDeM) (2023)
Closed Access | Times Cited: 21
Sangeeta Rani, Khushboo Tripathi, Ajay Kumar
International Journal on Interactive Design and Manufacturing (IJIDeM) (2023)
Closed Access | Times Cited: 21
Advanced Security Solutions for Conversational AI
Ranjana Sikarwar, Harish Kumar Shakya, Ajay Kumar, et al.
(2024), pp. 287-301
Closed Access | Times Cited: 11
Ranjana Sikarwar, Harish Kumar Shakya, Ajay Kumar, et al.
(2024), pp. 287-301
Closed Access | Times Cited: 11
Revolutionizing Government Operations
Aman Kumar Mishra, Amit Kumar Tyagi, Sathian Dananjayan, et al.
(2024), pp. 607-634
Closed Access | Times Cited: 8
Aman Kumar Mishra, Amit Kumar Tyagi, Sathian Dananjayan, et al.
(2024), pp. 607-634
Closed Access | Times Cited: 8
Chatbot vs Intelligent Virtual Assistance (IVA)
Ajit Noonia, Rijvan Beg, Aruna Patidar, et al.
(2024), pp. 655-673
Closed Access | Times Cited: 8
Ajit Noonia, Rijvan Beg, Aruna Patidar, et al.
(2024), pp. 655-673
Closed Access | Times Cited: 8
OSN Traits and Vulnerability for Measurement and Analysis
Rajat Bhardwaj, Vivek Bhardwaj, Romil Rawat, et al.
(2024), pp. 611-623
Closed Access | Times Cited: 6
Rajat Bhardwaj, Vivek Bhardwaj, Romil Rawat, et al.
(2024), pp. 611-623
Closed Access | Times Cited: 6
Digital Forensics with Emerging Technologies
Anand Kumar Mishra, V. Hemamalini, Amit Kumar Tyagi
(2024), pp. 675-697
Closed Access | Times Cited: 5
Anand Kumar Mishra, V. Hemamalini, Amit Kumar Tyagi
(2024), pp. 675-697
Closed Access | Times Cited: 5
Conversational AI – Security Aspects for Modern Business Applications
Hitesh Rawat, Anjali Rawat, Jean‐François Mascari, et al.
(2025), pp. 441-460
Closed Access
Hitesh Rawat, Anjali Rawat, Jean‐François Mascari, et al.
(2025), pp. 441-460
Closed Access
Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses
Zia Muhammad, Zahid Anwar, Abdul Rehman Javed, et al.
Technologies (2023) Vol. 11, Iss. 3, pp. 76-76
Open Access | Times Cited: 13
Zia Muhammad, Zahid Anwar, Abdul Rehman Javed, et al.
Technologies (2023) Vol. 11, Iss. 3, pp. 76-76
Open Access | Times Cited: 13
Extracting and Analyzing Factors to Identify the Malicious Conversational AI Bots on Twitter
Gitika Vyas, Piyush Vyas, Prathamesh Muzumdar, et al.
(2024), pp. 71-83
Closed Access | Times Cited: 4
Gitika Vyas, Piyush Vyas, Prathamesh Muzumdar, et al.
(2024), pp. 71-83
Closed Access | Times Cited: 4
Conversational Artificial Intelligence at Industrial Internet of Things
Dhirendra Siddharth, DilipKumar Jang Bahadur Saini, Mummadi Ramchandra, et al.
(2024), pp. 169-183
Closed Access | Times Cited: 4
Dhirendra Siddharth, DilipKumar Jang Bahadur Saini, Mummadi Ramchandra, et al.
(2024), pp. 169-183
Closed Access | Times Cited: 4
Conversational AI—A State‐of‐the‐Art Review
Vivek Bhardwaj, Mukesh Kumar, Divyani Joshi, et al.
(2024), pp. 533-555
Closed Access | Times Cited: 3
Vivek Bhardwaj, Mukesh Kumar, Divyani Joshi, et al.
(2024), pp. 533-555
Closed Access | Times Cited: 3
Automatic Speech Recognition Design Modeling
K. Babu Rao, Mopuru Bhargavi, Malik Jawarneh, et al.
(2024), pp. 353-367
Closed Access | Times Cited: 2
K. Babu Rao, Mopuru Bhargavi, Malik Jawarneh, et al.
(2024), pp. 353-367
Closed Access | Times Cited: 2
Conversational AI
Ahmad Mateen Buttar, Faisal Shahzad, Uzma Jamil
(2024), pp. 31-58
Closed Access | Times Cited: 2
Ahmad Mateen Buttar, Faisal Shahzad, Uzma Jamil
(2024), pp. 31-58
Closed Access | Times Cited: 2
Evaluation of Chabot Text Classification Using Machine Learning
P. Kumaraguru Diderot, K. Sakthidasan Sankaran, Malik Jawarneh, et al.
(2024), pp. 199-218
Closed Access | Times Cited: 2
P. Kumaraguru Diderot, K. Sakthidasan Sankaran, Malik Jawarneh, et al.
(2024), pp. 199-218
Closed Access | Times Cited: 2
Conversational AI
Vivek Bhardwaj, Balwinder Kaur Dhaliwal, Sanjaya Kumar Sarangi, et al.
(2024), pp. 435-457
Closed Access | Times Cited: 1
Vivek Bhardwaj, Balwinder Kaur Dhaliwal, Sanjaya Kumar Sarangi, et al.
(2024), pp. 435-457
Closed Access | Times Cited: 1
Conversational AI Applications in Ed‐Tech Industry
Deepika Chauhan, Chaitanya Singh, Romil Rawat, et al.
(2024), pp. 411-433
Closed Access | Times Cited: 1
Deepika Chauhan, Chaitanya Singh, Romil Rawat, et al.
(2024), pp. 411-433
Closed Access | Times Cited: 1
Heart Disease Prediction Using Ensemble Feature Selection Method and Machine Learning Classification Algorithms
A. Lakshmi, R. Karthika Devi
(2024), pp. 237-247
Closed Access | Times Cited: 1
A. Lakshmi, R. Karthika Devi
(2024), pp. 237-247
Closed Access | Times Cited: 1
Machine Learning for Automatic Speech Recognition
Hrishitva Patel, Ramakrishnan Raman, Malik Jawarneh, et al.
(2024), pp. 147-168
Closed Access | Times Cited: 1
Hrishitva Patel, Ramakrishnan Raman, Malik Jawarneh, et al.
(2024), pp. 147-168
Closed Access | Times Cited: 1
A Glance View on Cloud Infrastructures Security and Solutions
Srinivasa Rao Gundu, Charanarur Panem, J. Vijaylaxmi
(2024), pp. 1-15
Closed Access | Times Cited: 1
Srinivasa Rao Gundu, Charanarur Panem, J. Vijaylaxmi
(2024), pp. 1-15
Closed Access | Times Cited: 1
Evolution and Adoption of Conversational Artificial Intelligence in the Banking Industry
Neha Aggarwal, K. B. Singh
(2024), pp. 85-93
Closed Access | Times Cited: 1
Neha Aggarwal, K. B. Singh
(2024), pp. 85-93
Closed Access | Times Cited: 1
Recent Trends in Pattern Recognition, Challenges and Opportunities
S. Kannadhasan, R. Nagarajan
(2024), pp. 459-476
Closed Access | Times Cited: 1
S. Kannadhasan, R. Nagarajan
(2024), pp. 459-476
Closed Access | Times Cited: 1
Risks for Conversational AI Security
Vivek Bhardwaj, Safdar Sardar Khan, Gurpreet Singh, et al.
(2024), pp. 557-587
Closed Access | Times Cited: 1
Vivek Bhardwaj, Safdar Sardar Khan, Gurpreet Singh, et al.
(2024), pp. 557-587
Closed Access | Times Cited: 1
A Review of Renewable Energy Efficiency Technologies Toward Conversational AI
S. Kannadhasan, R. Nagarajan
(2024), pp. 477-494
Closed Access | Times Cited: 1
S. Kannadhasan, R. Nagarajan
(2024), pp. 477-494
Closed Access | Times Cited: 1