OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Explainable artificial intelligence for cybersecurity: a literature survey
Fabien Charmet, Harry Chandra Tanuwidjaja, Solayman Ayoubi, et al.
Annals of Telecommunications (2022) Vol. 77, Iss. 11-12, pp. 789-812
Open Access | Times Cited: 45

Showing 1-25 of 45 citing articles:

Explainable Artificial Intelligence (XAI): Concepts and Challenges in Healthcare
Tim Hulsen
AI (2023) Vol. 4, Iss. 3, pp. 652-666
Open Access | Times Cited: 92

Electric vehicle charging technologies, infrastructure expansion, grid integration strategies, and their role in promoting sustainable e-mobility
Arvind R. Singh, Pradeep Vishnuram, A. Sureshkumar, et al.
Alexandria Engineering Journal (2024) Vol. 105, pp. 300-330
Open Access | Times Cited: 23

Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects
Iqbal H. Sarker, Helge Janicke, Ahmad Mohsin, et al.
ICT Express (2024) Vol. 10, Iss. 4, pp. 935-958
Open Access | Times Cited: 18

A Survey on Explainable Artificial Intelligence for Cybersecurity
Gaith Rjoub, Jamal Bentahar, Omar Abdel Wahab, et al.
IEEE Transactions on Network and Service Management (2023) Vol. 20, Iss. 4, pp. 5115-5140
Open Access | Times Cited: 25

Accelerating SME growth in the African context: Harnessing FinTech, AI, and cybersecurity for economic prosperity
Chinwe Chinazo Okoye, Ekene Ezinwa Nwankwo, Favour Oluwadamilare Usman, et al.
International Journal of Science and Research Archive (2024) Vol. 11, Iss. 1, pp. 2477-2486
Open Access | Times Cited: 11

XAI-IDS: Toward Proposing an Explainable Artificial Intelligence Framework for Enhancing Network Intrusion Detection Systems
Osvaldo Arreche, Tanish Guntur, Mustafa Abdallah
Applied Sciences (2024) Vol. 14, Iss. 10, pp. 4170-4170
Open Access | Times Cited: 11

An efficient artificial intelligence approach for early detection of cross-site scripting attacks
Faizan Younas, Ali Raza, Nisrean Thalji, et al.
Decision Analytics Journal (2024) Vol. 11, pp. 100466-100466
Open Access | Times Cited: 10

Ethics in Artificial Intelligence: an Approach to Cybersecurity
Ariel López-González, Mailyn Moreno Espino, Ariadna Claudia Moreno Román, et al.
INTELIGENCIA ARTIFICIAL (2024) Vol. 27, Iss. 73, pp. 38-54
Open Access | Times Cited: 8

The Two Sides of AI in Cybersecurity: Opportunities and Challenges
Mowafaq Salem Alzboon, Ahmad Fuad Bader, Ahmad Abuashour, et al.
(2023)
Closed Access | Times Cited: 20

Explainable artificial intelligence models in intrusion detection systems
Samed Al, Şeref Sağıroğlu
Engineering Applications of Artificial Intelligence (2025) Vol. 144, pp. 110145-110145
Closed Access

Cybersecurity in the AI era: analyzing the impact of machine learning on intrusion detection
Huiyao Dong, Igor Kotenko
Knowledge and Information Systems (2025)
Closed Access

A comprehensive survey of manual and dynamic approaches for cybersecurity taxonomy generation
Arnolnt Spyros, Anna Kougioumtzidou, Angelos Papoutsis, et al.
Knowledge and Information Systems (2025)
Open Access

Explainability versus Security: The Unintended Consequences of xAI in Cybersecurity
Marek Pawlicki, Aleksandra Pawlicka, Rafał Kozik, et al.
(2024), pp. 1-7
Closed Access | Times Cited: 3

Towards Transparent Cybersecurity: The Role of Explainable AI in Mitigating Spam Threats
El Arbi Abdellaoui Alaoui, Adnane Filali, Amine Sallah, et al.
Procedia Computer Science (2024) Vol. 236, pp. 394-401
Open Access | Times Cited: 3

A Novel Approach for Efficient Mitigation against the SIP-Based DRDoS Attack
Ismail Melih Tas, Selçuk Baktır
Applied Sciences (2023) Vol. 13, Iss. 3, pp. 1864-1864
Open Access | Times Cited: 7

Explaining the Effectiveness of Machine Learning in Malware Detection: Insights from Explainable AI
Hendrio Bragança, Vanderson Rocha, Eduardo Souto, et al.
(2023), pp. 181-194
Open Access | Times Cited: 6

Privacy preserving machine unlearning for smart cities
Kongyang Chen, Yao Huang, Yiwen Wang, et al.
Annals of Telecommunications (2023) Vol. 79, Iss. 1-2, pp. 61-72
Closed Access | Times Cited: 5

Decoding the Black Box: A Comprehensive Review of Explainable Artificial Intelligence
Ossama Embarak
(2023), pp. 108-113
Closed Access | Times Cited: 5

AgrAmplifier: Defending Federated Learning Against Poisoning Attacks Through Local Update Amplification
Zirui Gong, Liyue Shen, Yanjun Zhang, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 19, pp. 1241-1250
Open Access | Times Cited: 5

Evaluating Rule-Based Global XAI Malware Detection Methods
Rui Li, Olga Gadyatskaya
Lecture notes in computer science (2023), pp. 3-22
Closed Access | Times Cited: 4

MetaCluster: a Universal Interpretable Classification Framework for Cybersecurity
Wenhan Ge, Zeyuan Cui, Junfeng Wang, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 3829-3843
Closed Access | Times Cited: 1

Chatbot-XAI—The New Age Artificial Intelligence Communication Tool for E-Commerce
Kavita Thapliyal, Manjul Thapliyal
Studies in computational intelligence (2024), pp. 77-100
Closed Access | Times Cited: 1

Determining the orderliness of carbon materials with nanoparticle imaging and explainable machine learning
Mikhail Kurbakov, Valentina Sulimova, Andrey Kopylov, et al.
Nanoscale (2024) Vol. 16, Iss. 28, pp. 13663-13676
Closed Access | Times Cited: 1

The revolution and vision of explainable AI for Android malware detection and protection
Shamsher Ullah, Jianqiang Li, Farhan Ullah, et al.
Internet of Things (2024) Vol. 27, pp. 101320-101320
Closed Access | Times Cited: 1

Page 1 - Next Page

Scroll to top