OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Anomaly detection in cloud environment using artificial intelligence techniques
L Girish, Sridhar K. N. Rao
Computing (2021) Vol. 105, Iss. 3, pp. 675-688
Closed Access | Times Cited: 32

Showing 1-25 of 32 citing articles:

Deep learning for anomaly detection in multivariate time series: Approaches, applications, and challenges
Gen Li, Jason J. Jung
Information Fusion (2022) Vol. 91, pp. 93-102
Closed Access | Times Cited: 146

Artificial Intelligence in the Military: An Overview of the Capabilities, Applications, and Challenges
Adib Bin Rashid, Ashfakul Karim Kausik, Ahamed Al Hassan Sunny, et al.
International Journal of Intelligent Systems (2023) Vol. 2023, pp. 1-31
Open Access | Times Cited: 35

AI augmented Edge and Fog computing: Trends and challenges
Shreshth Tuli, Fatemeh Mirhakimi, Samodha Pallewatta, et al.
Journal of Network and Computer Applications (2023) Vol. 216, pp. 103648-103648
Open Access | Times Cited: 34

Anomaly Detection for Sensor Signals Utilizing Deep Learning Autoencoder-Based Neural Networks
Fatemeh Esmaeili, Erica Cassie, Hong Phan T. Nguyen, et al.
Bioengineering (2023) Vol. 10, Iss. 4, pp. 405-405
Open Access | Times Cited: 23

Machine Learning-Based Anomaly Detection in NFV: A Comprehensive Survey
Sehar Zehra, Ummay Faseeha, Hassan Jamil Syed, et al.
Sensors (2023) Vol. 23, Iss. 11, pp. 5340-5340
Open Access | Times Cited: 23

Securing tomorrow: a comprehensive survey on the synergy of Artificial Intelligence and information security
Ehtesham Hashmi, Muhammad Mudassar Yamin, Sule Yildirim Yayilgan
AI and Ethics (2024)
Open Access | Times Cited: 10

Evaluating neural networks using Bi-Directional LSTM for network IDS (intrusion detection systems) in cyber security
Pooja TS, Purohit Shrinivasacharya
Global Transitions Proceedings (2021) Vol. 2, Iss. 2, pp. 448-454
Open Access | Times Cited: 55

An integrated SDN framework for early detection of DDoS attacks in cloud computing
Asha Varma Songa, Ganesh Reddy Karri
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 5

Enhancing Metro Rail Efficiency: A Predictive Maintenance Approach Leveraging Machine Learning and Deep Learning Technologies
Vishak Nair, M. Premalatha, R. Srinivasa Perumal, et al.
Research Square (Research Square) (2024)
Open Access | Times Cited: 3

Accurate Detection of IoT Sensor Behaviors in Legitimate, Faulty and Compromised Scenarios
Keshav Sood, Mohammad Reza Nosouhi, Neeraj Kumar, et al.
IEEE Transactions on Dependable and Secure Computing (2021) Vol. 20, Iss. 1, pp. 288-300
Closed Access | Times Cited: 20

K-AGRUED: A Container Autoscaling Technique for Cloud-based Web Applications in Kubernetes Using Attention-based GRU Encoder-Decoder
Javad Dogani, Farshad Khunjush, Mehdi Seydali
Journal of Grid Computing (2022) Vol. 20, Iss. 4
Closed Access | Times Cited: 13

Signature-based Adaptive Cloud Resource Usage Prediction Using Machine Learning and Anomaly Detection
Wiktor Sus, Piotr Nawrocki
Journal of Grid Computing (2024) Vol. 22, Iss. 2
Open Access | Times Cited: 2

DRAGON: Decentralized Fault Tolerance in Edge Federations
Shreshth Tuli, Giuliano Casale, Nicholas R. Jennings
IEEE Transactions on Network and Service Management (2022) Vol. 20, Iss. 1, pp. 276-291
Open Access | Times Cited: 11

Run-time failure detection via non-intrusive event analysis in a large-scale cloud computing platform
Domenico Cotroneo, Luigi De Simone, Pietro Liguori, et al.
Journal of Systems and Software (2023) Vol. 198, pp. 111611-111611
Open Access | Times Cited: 6

FullSight: A Feasible Intelligent and Collaborative Framework for Service Function Chains Failure Detection
Kuo Guo, Jia Chen, Ping Dong, et al.
IEEE Transactions on Network and Service Management (2022) Vol. 19, Iss. 4, pp. 4546-4565
Closed Access | Times Cited: 10

Anomaly Detection in Time Series: Current Focus and Future Challenges
Farrukh Arslan, A. Javaid, Muhammad Danish Zaheer Awan, et al.
Artificial intelligence (2023)
Open Access | Times Cited: 5

Heterogeneous Data-Driven Failure Diagnosis for Microservice-Based Industrial Clouds Toward Consumer Digital Ecosystems
Yueshen Xu, Zhibo Qiu, Honghao Gao, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 1, pp. 2027-2037
Closed Access | Times Cited: 5

CRISP: Cloud resilient infrastructure for self-healing platforms in dynamic adaptation
Soha Rawas, Agariadne Dwinggo Samala, Aprilla Fortuna
International Journal of Information Technology (2024)
Closed Access | Times Cited: 1

Anomaly Detection in Cloud Network: A Review
Amer Al-Mazrawe, Bahaa Al-Musawi
BIO Web of Conferences (2024) Vol. 97, pp. 00019-00019
Open Access | Times Cited: 1

VM consolidation steps in cloud computing: A perspective review
Seyyed Meysam Rozehkhani, Farnaz Mahan, Witold Pedrycz
Simulation Modelling Practice and Theory (2024) Vol. 138, pp. 103034-103034
Closed Access | Times Cited: 1

CAROL: Confidence-Aware Resilience Model for Edge Federations
Shreshth Tuli, Giuliano Casale, Nicholas R. Jennings
(2022)
Open Access | Times Cited: 5

AIOps: Analysing Cloud Failure Detection Approaches for Enhanced Operational Efficency
Prashanth Kumar, Hp Shreyas Kumar
(2023), pp. 1-6
Closed Access | Times Cited: 2

ISSA-TCNFormer based-server anomaly detection
Fanjin Meng, Xiong Luo
(2024), pp. 130-130
Closed Access

Page 1 - Next Page

Scroll to top