OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A new intelligent multilayer framework for insider threat detection
Mohammed Nasser Al‐Mhiqani, Rabiah Ahmad, Zaheera Zainal Abidin, et al.
Computers & Electrical Engineering (2021) Vol. 97, pp. 107597-107597
Closed Access | Times Cited: 61

Showing 1-25 of 61 citing articles:

A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques
Said A. Salloum, Tarek Gaber, Sunil Vadera, et al.
IEEE Access (2022) Vol. 10, pp. 65703-65727
Open Access | Times Cited: 93

Future Horizons: AI-Enhanced Threat Detection in Cloud Environments: Unveiling Opportunities for Research
Haroon Arif, Aashesh Kumar, Muhammad Fahad, et al.
International Journal of Multidisciplinary Sciences and Arts (2024) Vol. 2, Iss. 2, pp. 242-251
Open Access | Times Cited: 8

Comparative Evaluation of AI-Based Techniques for Zero-Day Attacks Detection
Shamshair Ali, Saif Ur Rehman, Azhar Imran, et al.
Electronics (2022) Vol. 11, Iss. 23, pp. 3934-3934
Open Access | Times Cited: 34

BRITD: behavior rhythm insider threat detection with time awareness and user adaptation
Shuang Song, Neng Gao, Yifei Zhang, et al.
Cybersecurity (2024) Vol. 7, Iss. 1
Open Access | Times Cited: 7

A novel approach of botnet detection using hybrid deep learning for enhancing security in IoT networks
Shamshair Ali, Rubina Ghazal, Nauman Qadeer, et al.
Alexandria Engineering Journal (2024) Vol. 103, pp. 88-97
Open Access | Times Cited: 7

A manifold intelligent decision system for fusion and benchmarking of deep waste-sorting models
Karrar Hameed Abdulkareem, Mohammed Ahmed Subhi, Mazin Abed Mohammed, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 132, pp. 107926-107926
Open Access | Times Cited: 5

A Secure Environment Using a New Lightweight AES Encryption Algorithm for E-Commerce Websites
Farah Tawfiq Abdul Hussien, Abdul Monem S. Rahma, Hala Bahjat Abdul Wahab
Security and Communication Networks (2021) Vol. 2021, pp. 1-15
Open Access | Times Cited: 23

Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat
Isabel Herrera Montano, José Javier García Aranda, Juan Ramos Diaz, et al.
Cluster Computing (2022) Vol. 25, Iss. 6, pp. 4289-4302
Open Access | Times Cited: 18

Comprehensive review on intelligent security defences in cloud: Taxonomy, security issues, ML/DL techniques, challenges and future trends
Mohamad Mulham Belal, Divya Meena Sundaram
Journal of King Saud University - Computer and Information Sciences (2022) Vol. 34, Iss. 10, pp. 9102-9131
Open Access | Times Cited: 16

Malicious insider threat detection using variation of sampling methods for anomaly detection in cloud environment
S. Asha, D. Shanmugapriya, G. Padmavathi
Computers & Electrical Engineering (2022) Vol. 105, pp. 108519-108519
Closed Access | Times Cited: 16

Introduction to the special section on advances of machine learning in cybersecurity (VSI-mlsec)
Suyel Namasudra, Rubén González Crespo, Sathish Kumar
Computers & Electrical Engineering (2022) Vol. 100, pp. 108048-108048
Closed Access | Times Cited: 15

MEF: Multidimensional Examination Framework for Prioritization of COVID-19 Severe Patients and Promote Precision Medicine Based on Hybrid Multi-Criteria Decision-Making Approaches
Karrar Hameed Abdulkareem, Mohammed Nasser Al‐Mhiqani, Ahmed M. Dinar, et al.
Bioengineering (2022) Vol. 9, Iss. 9, pp. 457-457
Open Access | Times Cited: 15

Identification and evaluation of the effective criteria for detection of congestion in a smart city
Anita Mohanty, Subrat Kumar Mohanty, Bhagyalaxmi Jena, et al.
IET Communications (2022) Vol. 16, Iss. 5, pp. 560-570
Open Access | Times Cited: 14

Knowledge Graph Based Large Scale Network Security Threat Detection Techniques
Zhifeng Hu
Applied Mathematics and Nonlinear Sciences (2024) Vol. 9, Iss. 1
Open Access | Times Cited: 2

Deep learning-based authentication for insider threat detection in critical infrastructure
Arnoldas Budžys, Olga Kurasova, Viktor Medvedev
Artificial Intelligence Review (2024) Vol. 57, Iss. 10
Open Access | Times Cited: 2

Deep learning enabled class imbalance with sand piper optimization based intrusion detection for secure cyber physical systems
Anwer Mustafa Hilal, Shaha Al‐Otaibi, Hany Mahgoub, et al.
Cluster Computing (2022) Vol. 26, Iss. 3, pp. 2085-2098
Closed Access | Times Cited: 10

Blockchain Driven Metaheuristic Route Planning in Secure Wireless Sensor Networks
M. Rajesh, T. Archana Acharya, Hafis Hajiyev, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 74, Iss. 1, pp. 933-949
Open Access | Times Cited: 10

Bilateral Insider Threat Detection: Harnessing Standalone and Sequential Activities with Recurrent Neural Networks
Phavithra Manoharan, Wei Hong, Jiao Yin, et al.
Lecture notes in computer science (2023), pp. 179-188
Closed Access | Times Cited: 4

AUTH: An Adversarial Autoencoder Based Unsupervised Insider Threat Detection Scheme for Multisource Logs
Xingjian Zhu, Jiankuo Dong, Jin Qi, et al.
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 9, pp. 10954-10965
Closed Access | Times Cited: 1

GMFITD: Graph Meta-Learning for Effective Few-Shot Insider Threat Detection
Ximing Li, Linghui Li, Xiaoyong Li, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 7161-7175
Closed Access | Times Cited: 1

Insider Threat Defense Strategies: Survey and Knowledge Integration
Chengyu Song, Jingjing Zhang, Linru Ma, et al.
Lecture notes in computer science (2024), pp. 106-122
Closed Access | Times Cited: 1

A Data-driven Approach for Risk Exposure Analysis in Enterprise Security
Albert Calvo, Santiago Escuder, Josep Escrig, et al.
2022 IEEE 9th International Conference on Data Science and Advanced Analytics (DSAA) (2023), pp. 1-9
Closed Access | Times Cited: 3

Blockchain-Based Data Breach Detection: Approaches, Challenges, and Future Directions
Kainat Ansar, Mansoor Ahmed, Markus Helfert, et al.
Mathematics (2023) Vol. 12, Iss. 1, pp. 107-107
Open Access | Times Cited: 3

Optimal weighted fusion based insider data leakage detection and classification model for Ubiquitous computing systems
Eatedal Alabdulkreem, Mai Alduailij, Mona Alduailij, et al.
Sustainable Energy Technologies and Assessments (2022) Vol. 54, pp. 102815-102815
Closed Access | Times Cited: 5

Page 1 - Next Page

Scroll to top