
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Paying attention to cyber-attacks: A multi-layer perceptron with self-attention mechanism
Fernando J. Rendón-Segador, Juan A. Álvarez-García, Ángel Jesús Varela‐Vaca
Computers & Security (2023) Vol. 132, pp. 103318-103318
Closed Access | Times Cited: 7
Fernando J. Rendón-Segador, Juan A. Álvarez-García, Ángel Jesús Varela‐Vaca
Computers & Security (2023) Vol. 132, pp. 103318-103318
Closed Access | Times Cited: 7
Showing 7 citing articles:
Elevated few-shot network intrusion detection via self-attention mechanisms and iterative refinement
Congyuan Xu, Yong Zhao Zhan, Guanghui Chen, et al.
PLoS ONE (2025) Vol. 20, Iss. 1, pp. e0317713-e0317713
Open Access
Congyuan Xu, Yong Zhao Zhan, Guanghui Chen, et al.
PLoS ONE (2025) Vol. 20, Iss. 1, pp. e0317713-e0317713
Open Access
Feature-enhanced fusion of U-NET-based improved brain tumor images segmentation
Abdul Haseeb Nizamani, Zhigang Chen, Ahsan Ahmed Nizamani, et al.
Journal of Cloud Computing Advances Systems and Applications (2023) Vol. 12, Iss. 1
Open Access | Times Cited: 5
Abdul Haseeb Nizamani, Zhigang Chen, Ahsan Ahmed Nizamani, et al.
Journal of Cloud Computing Advances Systems and Applications (2023) Vol. 12, Iss. 1
Open Access | Times Cited: 5
An innovative approach and evaluation of contemporary intrusion detection systems
Sureswar Reddy Dronadula, Stephen M. Sagar, D N Gandhi, et al.
Journal of Cyber Security Technology (2024), pp. 1-44
Closed Access | Times Cited: 1
Sureswar Reddy Dronadula, Stephen M. Sagar, D N Gandhi, et al.
Journal of Cyber Security Technology (2024), pp. 1-44
Closed Access | Times Cited: 1
An integrated model based on deep learning classifiers and pre-trained transformer for phishing URL detection
Nguyet Quang, Ali Selamat, Hamido Fujita, et al.
Future Generation Computer Systems (2024) Vol. 161, pp. 269-285
Closed Access
Nguyet Quang, Ali Selamat, Hamido Fujita, et al.
Future Generation Computer Systems (2024) Vol. 161, pp. 269-285
Closed Access
Improving IIoT security: Unveiling threats through advanced side-channel analysis
Dalin He, Huanyu Wang, Tuo Deng, et al.
Computers & Security (2024), pp. 104135-104135
Closed Access
Dalin He, Huanyu Wang, Tuo Deng, et al.
Computers & Security (2024), pp. 104135-104135
Closed Access
Real-time phishing URL detection framework using knowledge distilled ELECTRA
K S Jishnu, B. Arthi
Automatika (2024) Vol. 65, Iss. 4, pp. 1621-1639
Open Access
K S Jishnu, B. Arthi
Automatika (2024) Vol. 65, Iss. 4, pp. 1621-1639
Open Access
Deep Learning-Based Network Intrusion Detection Systems: A Systematic Literature Review
Leonard L. Mutembei, Makhamisa Senekane, Terence L. van Zyl
Communications in computer and information science (2024), pp. 207-234
Closed Access
Leonard L. Mutembei, Makhamisa Senekane, Terence L. van Zyl
Communications in computer and information science (2024), pp. 207-234
Closed Access