OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Artificial Intelligence techniques to mitigate cyber-attacks within vehicular networks: Survey
Achref Haddaji, Samiha Ayed, Lamia Chaari Fourati
Computers & Electrical Engineering (2022) Vol. 104, pp. 108460-108460
Open Access | Times Cited: 25

Showing 25 citing articles:

At the Confluence of Artificial Intelligence and Edge Computing in IoT-Based Applications: A Review and New Perspectives
Amira Bourechak, Ouarda Zedadra, Mohamed Nadjib Kouahla, et al.
Sensors (2023) Vol. 23, Iss. 3, pp. 1639-1639
Open Access | Times Cited: 101

Exhaustive distributed intrusion detection system for UAVs attacks detection and security enforcement (E-DIDS)
Fadhila Tlili, Samiha Ayed, Lamia Chaari Fourati
Computers & Security (2024) Vol. 142, pp. 103878-103878
Closed Access | Times Cited: 11

Advancing UAV security with artificial intelligence: A comprehensive survey of techniques and future directions
Fadhila Tlili, Samiha Ayed, Lamia Chaari Fourati
Internet of Things (2024) Vol. 27, pp. 101281-101281
Closed Access | Times Cited: 7

A novel and efficient framework for in-vehicle security enforcement
Achref Haddaji, Samiha Ayed, Lamia Chaari Fourati
Ad Hoc Networks (2024) Vol. 158, pp. 103481-103481
Closed Access | Times Cited: 6

Conversational AI – Security Aspects for Modern Business Applications
Hitesh Rawat, Anjali Rawat, Jean‐François Mascari, et al.
(2025), pp. 441-460
Closed Access

Autonomous Vehicles With a 6G-Based Intelligent Cybersecurity Model
Abdullah Algarni, Vijey Thayananthan
IEEE Access (2023) Vol. 11, pp. 15284-15296
Open Access | Times Cited: 12

Scrutinizing Security in Industrial Control Systems: An Architectural Vulnerabilities and Communication Network Perspective
Muhammad Muzamil Aslam, Ali Tufail, Rosyzie Anna Awg Haji Mohd Apong, et al.
IEEE Access (2024) Vol. 12, pp. 67537-67573
Open Access | Times Cited: 4

Intelligence-Based Strategies with Vehicle-to-Everything Network: A Review
Navdeep Bohra, Ashish Kumari, Vikash Kumar Mishra, et al.
Future Internet (2025) Vol. 17, Iss. 2, pp. 79-79
Open Access

Trust Management Scheme for Securing Vehicular Ad Hoc Networks Against Malicious Nodes and False Message Anomaly
Haewon Byeon, Mohammed E. Seno, Ajeet Kumar Srivastava, et al.
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 4
Closed Access

Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network
Eslam Abdelkreem, Sherif Hussein, Ashraf Tammam
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 1939-1961
Open Access | Times Cited: 2

Dynamic Intrusion Detection Framework for UAVCAN Protocol Using AI
Fadhila Tlili, Samiha Ayed, Lamia Chaari Fourati
Proceedings of the 17th International Conference on Availability, Reliability and Security (2023), pp. 1-10
Closed Access | Times Cited: 5

FLID: Intrusion Attack and Defense Mechanism for Federated Learning Empowered Connected Autonomous Vehicles (CAVs) Application
Md Zarif Hossain, Ahmed Imteaj, Saika Zaman, et al.
(2023), pp. 1-8
Closed Access | Times Cited: 5

Secure Artificial Intelligence for Precise Vehicle Behavior Prediction in 6G Consumer Electronics
Sami Ahmed Haider, Janjhyam Venkata Naga Ramesh, Vikas Raina, et al.
IEEE Transactions on Consumer Electronics (2024) Vol. 70, Iss. 1, pp. 3898-3905
Closed Access | Times Cited: 1

IoV security and privacy survey: issues, countermeasures, and challenges
Achref Haddaji, Samiha Ayed, Lamia Chaari Fourati
The Journal of Supercomputing (2024) Vol. 80, Iss. 15, pp. 23018-23082
Closed Access | Times Cited: 1

A Survey on Zero Trust Architecture: Applications and Challenges of 6G Networks
Nurun Nahar, Karl Andersson, Olov Schelén, et al.
IEEE Access (2024) Vol. 12, pp. 94753-94764
Open Access | Times Cited: 1

Autonomous Vehicles: From Technology to Law and Regulation
Didik Suhariyanto, Ridwan Usman, Syamsu Marlin, et al.
Engineering Science Letter (2024) Vol. 3, Iss. 02, pp. 62-67
Closed Access | Times Cited: 1

A New Hybrid Adaptive Deep Learning-Based Framework for UAVs Faults and Attacks Detection
Fadhila Tlili, Samiha Ayed, Lamia Chaari Fourati
IEEE Transactions on Services Computing (2023) Vol. 16, Iss. 6, pp. 4128-4139
Closed Access | Times Cited: 4

Generative Boltzmann Adversarial Network in Manet Attack Detection and QOS Enhancement with Latency
Arun Kumar Marandi, Ms.Richa Dogra, Rahul Bhatt, et al.
International Journal of Communication Networks and Information Security (IJCNIS) (2022) Vol. 14, Iss. 3, pp. 199-213
Open Access | Times Cited: 6

Comprehensive Analysis of Attacks and Defenses in IoT Sensory Big Data Analysis
Mohammad Ishrat, Wasim Khan, Faheem Ahmad, et al.
Advances in systems analysis, software engineering, and high performance computing book series (2024), pp. 24-57
Closed Access

Investigation of Security Threat Datasets for Intra- and Inter-Vehicular Environments
Achref Haddaji, Samiha Ayed, Lamia Chaari Fourati, et al.
Sensors (2024) Vol. 24, Iss. 11, pp. 3431-3431
Open Access

A Novel Approach to Mitigating Traffic Issues through Advanced Congest Detection and Adaptive Signal Control Using AI
G. Vishnu Priya, B. Shyamala Gowri, B. Rajalakshmi, et al.
(2024), pp. 1-5
Closed Access

Controlling User Access with Scripting to Mitigate Cyber-Attacks
Owusu Nyarko‐Boateng, Isaac Kofi Nti, Anastasia Akyamaa Mensah, et al.
Scientific African (2024), pp. e02355-e02355
Open Access

The Role of Artificial Intelligence in Mitigating Cyber Security Issues and its Impact on FinTech
Mohammad In’airat, Nizar Sahawneh, Mohd Abu Faiz, et al.
2022 International Conference on Business Analytics for Technology and Security (ICBATS) (2023), pp. 1-5
Closed Access | Times Cited: 1

Mitigation of Attacks Using Cybersecurity Deep Models in Cloud Servers
Ramesh Babu P, P. Anitha, Wakgari Dibaba, et al.
(2023), pp. 202-205
Closed Access | Times Cited: 1

Page 1

Scroll to top