
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Deep learning technology of computer network security detection based on artificial intelligence
Qinghui Liu, Tianping Zhang
Computers & Electrical Engineering (2023) Vol. 110, pp. 108813-108813
Closed Access | Times Cited: 13
Qinghui Liu, Tianping Zhang
Computers & Electrical Engineering (2023) Vol. 110, pp. 108813-108813
Closed Access | Times Cited: 13
Showing 13 citing articles:
Beyond the hype: AI advice and investor dissonance in crypto trading
Sinh Duc Hoang, Tho Huu-Hoang Nguyen, Sandeep Kumar Dey, et al.
Current Psychology (2025)
Closed Access
Sinh Duc Hoang, Tho Huu-Hoang Nguyen, Sandeep Kumar Dey, et al.
Current Psychology (2025)
Closed Access
Research on the Impact of Combining Big Data and Deep Learning Technology on Network Security Information Security Protection
X. Wang
Applied Mathematics and Nonlinear Sciences (2025) Vol. 10, Iss. 1
Open Access
X. Wang
Applied Mathematics and Nonlinear Sciences (2025) Vol. 10, Iss. 1
Open Access
An Unsupervised Generative Adversarial Network System to Detect DDoS Attacks in SDN
Daniel Matheus Brandão Lent, Vitor Gabriel da Silva Ruffo, Luiz F. Carvalho, et al.
IEEE Access (2024) Vol. 12, pp. 70690-70706
Open Access | Times Cited: 4
Daniel Matheus Brandão Lent, Vitor Gabriel da Silva Ruffo, Luiz F. Carvalho, et al.
IEEE Access (2024) Vol. 12, pp. 70690-70706
Open Access | Times Cited: 4
Harnessing the Power of AI for Effective Cybersecurity Defense
Samar Nour, Samar A. Said
(2024) Vol. 12.24, pp. 98-102
Closed Access | Times Cited: 2
Samar Nour, Samar A. Said
(2024) Vol. 12.24, pp. 98-102
Closed Access | Times Cited: 2
Research on neural networks in computer network security evaluation and prediction methods
H. Wei, Xu Zhao, Baolan Shi
International Journal of Knowledge-based and Intelligent Engineering Systems (2024) Vol. 28, Iss. 3, pp. 497-516
Closed Access | Times Cited: 1
H. Wei, Xu Zhao, Baolan Shi
International Journal of Knowledge-based and Intelligent Engineering Systems (2024) Vol. 28, Iss. 3, pp. 497-516
Closed Access | Times Cited: 1
An innovative defense strategy against targeted spreading in complex networks
Haofei Yin, Xiaohua Cui, An Zeng
Physica A Statistical Mechanics and its Applications (2024), pp. 130120-130120
Closed Access | Times Cited: 1
Haofei Yin, Xiaohua Cui, An Zeng
Physica A Statistical Mechanics and its Applications (2024), pp. 130120-130120
Closed Access | Times Cited: 1
Construction and Analysis of QPSO-LSTM Model in Network Security Situation Prediction
LI Wen-tao
Journal of Cyber Security and Mobility (2024), pp. 417-438
Open Access
LI Wen-tao
Journal of Cyber Security and Mobility (2024), pp. 417-438
Open Access
Deep learning-based detection and condition classification of bridge elastomeric bearings
Liang Dong, Shaojie Zhang, Haibin Huang, et al.
Automation in Construction (2024) Vol. 166, pp. 105680-105680
Closed Access
Liang Dong, Shaojie Zhang, Haibin Huang, et al.
Automation in Construction (2024) Vol. 166, pp. 105680-105680
Closed Access
Semantic-based defense mechanism for ai model networks using rich semantic identifier mapping
Linjiang Ba, Jianfeng Guan, Jinheng Jiang
Computers & Electrical Engineering (2024) Vol. 122, pp. 109977-109977
Closed Access
Linjiang Ba, Jianfeng Guan, Jinheng Jiang
Computers & Electrical Engineering (2024) Vol. 122, pp. 109977-109977
Closed Access
Security and Privacy Policy Assessment in Mobile Health Applications: A Literature Review
Journal of System and Management Sciences (2024) Vol. 14, Iss. 2
Open Access
Journal of System and Management Sciences (2024) Vol. 14, Iss. 2
Open Access
Técnicas de machine learning para la detección de intrusos en redes: Una revisión sistemática de la literatura
Jairo Nuñez, Alfredo Cervantes Ccasa, Mario Aquino Cruz
Micaela Revista de Investigación - UNAMBA (2024) Vol. 5, Iss. 2, pp. 17-24
Open Access
Jairo Nuñez, Alfredo Cervantes Ccasa, Mario Aquino Cruz
Micaela Revista de Investigación - UNAMBA (2024) Vol. 5, Iss. 2, pp. 17-24
Open Access
Development of a Method for Determining the List of Key Threats to Information Security of Computer Networks
Abas Lampezhev, Vladimir Kuklin, Leonid M. Chervyakov, et al.
International Journal of Safety and Security Engineering (2023) Vol. 13, Iss. 6, pp. 1039-1047
Open Access
Abas Lampezhev, Vladimir Kuklin, Leonid M. Chervyakov, et al.
International Journal of Safety and Security Engineering (2023) Vol. 13, Iss. 6, pp. 1039-1047
Open Access
Research on Key Technology of Network Security Management Based on Artificial Intelligence
Pei-hong Wang
(2023), pp. 208-212
Closed Access
Pei-hong Wang
(2023), pp. 208-212
Closed Access