OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Zero-day attack detection: a systematic literature review
Rasheed Ahmad, Izzat Alsmadi, Wasim A. Al-Hamdani, et al.
Artificial Intelligence Review (2023) Vol. 56, Iss. 10, pp. 10733-10811
Closed Access | Times Cited: 54

Showing 1-25 of 54 citing articles:

Cascaded intrusion detection system using machine learning
Md. Khabir Uddin Ahamed, Abdul Karim
Systems and Soft Computing (2025), pp. 200182-200182
Open Access | Times Cited: 1

A comprehensive and systematic literature review on intrusion detection systems in the internet of medical things: current status, challenges, and opportunities
Arezou Naghib, Farhad Soleimanian Gharehchopogh, Azadeh Zamanifar
Artificial Intelligence Review (2025) Vol. 58, Iss. 4
Open Access | Times Cited: 1

A comprehensive review of vulnerabilities and AI-enabled defense against DDoS attacks for securing cloud services
Surendra Kumar, Mridula Dwivedi, Mohit Kumar, et al.
Computer Science Review (2024) Vol. 53, pp. 100661-100661
Closed Access | Times Cited: 8

Enhanced Network Metric Prediction for Machine Learning-Based Cyber Security of a Software-Defined UAV Relay Network
Dennis Agnew, Álvaro Del Águila, Janise McNair
IEEE Access (2024) Vol. 12, pp. 54202-54219
Open Access | Times Cited: 6

Digital deception: generative artificial intelligence in social engineering and phishing
Marc Schmitt, Ivan Fléchais
Artificial Intelligence Review (2024) Vol. 57, Iss. 12
Open Access | Times Cited: 5

An Ensemble Voting Classifier Based On Machine Learning Models for Phishing Detection
Enas Mohammed Hussien Saeed
International Journal of Scientific Research in Science Engineering and Technology (2025) Vol. 12, Iss. 1, pp. 15-27
Open Access

ORADS: One Class Rule-based Anomaly Detection System in Autonomous Vehicles
Anjanee Kumar, Tanmoy Kanti Das
IEEE Sensors Journal (2025) Vol. 25, Iss. 5, pp. 8988-8997
Closed Access

Enhanced Grey Wolf Optimization (EGWO) and random forest based mechanism for intrusion detection in IoT networks
Saad Said Alqahtany, Asadullah Shaikh, Ali Alqazzaz
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access

Detection of Zero-day Attacks via Sample Augmentation for the Internet of Vehicles
Bingfeng Xu, Jincheng Zhao, Bo Wang, et al.
Vehicular Communications (2025), pp. 100887-100887
Closed Access

A New Secure Model for Cloud Environments Using RBFNN and AdaBoost
Hanaa Attou, Azidine Guezzaz, Said Benkirane, et al.
SN Computer Science (2025) Vol. 6, Iss. 2
Closed Access

Unknown web attack threat detection based on large language model
Yijia Xu, Qiang Zhang, Huaxin Deng, et al.
Applied Soft Computing (2025), pp. 112905-112905
Closed Access

Deep Reinforcement Learning for intrusion detection in Internet of Things: Best practices, lessons learnt, and open challenges
Jesús F. Cevallos M., Alessandra Rizzardi, Sabrina Sicari, et al.
Computer Networks (2023) Vol. 236, pp. 110016-110016
Closed Access | Times Cited: 12

High-Speed Network DDoS Attack Detection: A Survey
Rana Muhammad Abdul Haseeb-ur-rehman, Azana Hafizah Mohd Aman, Mohammad Kamrul Hasan, et al.
Sensors (2023) Vol. 23, Iss. 15, pp. 6850-6850
Open Access | Times Cited: 11

Social Media Zero-Day Attack Detection Using TensorFlow
Ahmet E. Topcu, Yehia Ibrahim Alzoubi, Ersin Elbaşi, et al.
Electronics (2023) Vol. 12, Iss. 17, pp. 3554-3554
Open Access | Times Cited: 10

Federated transfer learning for attack detection for Internet of Medical Things
Afnan Alharbi
International Journal of Information Security (2024) Vol. 23, Iss. 1, pp. 81-100
Closed Access | Times Cited: 3

Robust Botnet Detection Approach for Known and Unknown Attacks in IoT Networks Using Stacked Multi-classifier and Adaptive Thresholding
Deepa Krishnan, Pravin Shrinath
Arabian Journal for Science and Engineering (2024) Vol. 49, Iss. 9, pp. 12561-12577
Closed Access | Times Cited: 3

A Comprehensive Analysis of the Machine Learning Algorithms in IoT IDS Systems
Erdal ÖZDOĞAN
IEEE Access (2024) Vol. 12, pp. 46785-46811
Open Access | Times Cited: 3

NERO: NEural algorithmic reasoning for zeRO-day attack detection in the IoT: A hybrid approach
Jesús F. Cevallos M., Alessandra Rizzardi, Sabrina Sicari, et al.
Computers & Security (2024) Vol. 142, pp. 103898-103898
Open Access | Times Cited: 2

Unknown, Atypical and Polymorphic Network Intrusion Detection: A Systematic Survey
Ulya Sabeel, Shahram Shah Heydari, Khalil El‐Khatib, et al.
IEEE Transactions on Network and Service Management (2023) Vol. 21, Iss. 1, pp. 1190-1212
Closed Access | Times Cited: 7

Hybrid Machine Learning Algorithm for Intrusion Detection Systems
Siddharth Pansare, Arun Malik, Isha Batra
(2024), pp. 359-364
Closed Access | Times Cited: 2

MF2POSE: Multi-task Feature Fusion Pseudo-Siamese Network for intrusion detection using Category-distance Promotion Loss
Jiawei Zhang, Rui Chen, Yanchun Zhang, et al.
Knowledge-Based Systems (2023) Vol. 283, pp. 111110-111110
Closed Access | Times Cited: 5

Detection of Zero-Day Attacks in a Software-Defined LEO Constellation Network Using Enhanced Network Metric Predictions
Dennis Agnew, Ashlee Rice-Bladykas, Janise McNair
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 6611-6634
Open Access | Times Cited: 1

Page 1 - Next Page

Scroll to top