
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A comprehensive survey on cyber deception techniques to improve honeypot performance
Amir Javadpour, Forough Ja’fari, Tarik Taleb, et al.
Computers & Security (2024) Vol. 140, pp. 103792-103792
Open Access | Times Cited: 24
Amir Javadpour, Forough Ja’fari, Tarik Taleb, et al.
Computers & Security (2024) Vol. 140, pp. 103792-103792
Open Access | Times Cited: 24
Showing 24 citing articles:
Enhancing Cybersecurity through AI and ML: Strategies, Challenges, and Future Directions
Maryam Roshanaei, Mahir R. Khan, Natalie N. Sylvester
Journal of Information Security (2024) Vol. 15, Iss. 03, pp. 320-339
Open Access | Times Cited: 6
Maryam Roshanaei, Mahir R. Khan, Natalie N. Sylvester
Journal of Information Security (2024) Vol. 15, Iss. 03, pp. 320-339
Open Access | Times Cited: 6
Real‐Time Nail‐Biting Detection on a Smartwatch Using Three CNN Models Pipeline
Abdullah Alesmaeil, Eftâl Şehirli
Computational Intelligence (2025) Vol. 41, Iss. 1
Closed Access
Abdullah Alesmaeil, Eftâl Şehirli
Computational Intelligence (2025) Vol. 41, Iss. 1
Closed Access
An Enhanced LSTM Approach for Detecting IoT-Based DDoS Attacks Using Honeypot Data
Arjun Kumar Bose Arnob, M. F. Mridha, Mejdl Safran, et al.
International Journal of Computational Intelligence Systems (2025) Vol. 18, Iss. 1
Open Access
Arjun Kumar Bose Arnob, M. F. Mridha, Mejdl Safran, et al.
International Journal of Computational Intelligence Systems (2025) Vol. 18, Iss. 1
Open Access
ADFCNN-BiLSTM: A Deep Neural Network Based on Attention and Deformable Convolution for Network Intrusion Detection
Bin Li, Jie Li, Mingyu Jia
Sensors (2025) Vol. 25, Iss. 5, pp. 1382-1382
Open Access
Bin Li, Jie Li, Mingyu Jia
Sensors (2025) Vol. 25, Iss. 5, pp. 1382-1382
Open Access
Design and Analysis of a Honeypot Pi for Intrusion Detection System
D. Saravana Kumar, Alicia Biju, Raja Muthalagu, et al.
(2025), pp. 125-138
Closed Access
D. Saravana Kumar, Alicia Biju, Raja Muthalagu, et al.
(2025), pp. 125-138
Closed Access
Understanding the impact of IoT security patterns on CPU usage and energy consumption: a dynamic approach for selecting patterns with deep reinforcement learning
Saeid Jamshidi, Amin Nikanjam, Kawser Wazed Nafi, et al.
International Journal of Information Security (2025) Vol. 24, Iss. 2
Closed Access
Saeid Jamshidi, Amin Nikanjam, Kawser Wazed Nafi, et al.
International Journal of Information Security (2025) Vol. 24, Iss. 2
Closed Access
Securing IIoT systems against DDoS attacks with adaptive moving target defense strategies
Swati, Sangita Roy, Jawar Singh, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Swati, Sangita Roy, Jawar Singh, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Detection and Mitigation of Distributed Denial of Service Attacks Using Ensemble Learning and Honeypots in a Novel SDN-UAV Network Architecture
Mohamed Amine Ould Rabah, Hamza Drid, Yasmine Medjadba, et al.
IEEE Access (2024) Vol. 12, pp. 128929-128940
Open Access | Times Cited: 2
Mohamed Amine Ould Rabah, Hamza Drid, Yasmine Medjadba, et al.
IEEE Access (2024) Vol. 12, pp. 128929-128940
Open Access | Times Cited: 2
Evaluating modern intrusion detection methods in the face of Gen V multi-vector attacks with fuzzy AHP-TOPSIS
Wajdi Alhakami
PLoS ONE (2024) Vol. 19, Iss. 5, pp. e0302559-e0302559
Open Access | Times Cited: 2
Wajdi Alhakami
PLoS ONE (2024) Vol. 19, Iss. 5, pp. e0302559-e0302559
Open Access | Times Cited: 2
Enhancing honeynet-based protection with network slicing for massive Pre-6G IoT Smart Cities deployments
Antonio Matencio Escolar, Qi Wang, José M. Alcaraz Calero
Journal of Network and Computer Applications (2024) Vol. 229, pp. 103918-103918
Open Access | Times Cited: 2
Antonio Matencio Escolar, Qi Wang, José M. Alcaraz Calero
Journal of Network and Computer Applications (2024) Vol. 229, pp. 103918-103918
Open Access | Times Cited: 2
Application Layer Cyber Deception Without Developer Interaction
Mario Kahlhofer, Stefan Raß
(2024), pp. 416-429
Open Access | Times Cited: 1
Mario Kahlhofer, Stefan Raß
(2024), pp. 416-429
Open Access | Times Cited: 1
Encryption as a Service: A Review of Architectures and Taxonomies
Amir Javadpour, Forough Ja’fari, Tarik Taleb
Lecture notes in computer science (2024), pp. 36-44
Closed Access | Times Cited: 1
Amir Javadpour, Forough Ja’fari, Tarik Taleb
Lecture notes in computer science (2024), pp. 36-44
Closed Access | Times Cited: 1
Encryption as a Service (EaaS): Introducing the Full-Cloud-Fog Architecture for Enhanced Performance and Security
Amir Javadpour, Forough Ja’fari, Tarik Taleb, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 24, pp. 39744-39766
Open Access | Times Cited: 1
Amir Javadpour, Forough Ja’fari, Tarik Taleb, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 24, pp. 39744-39766
Open Access | Times Cited: 1
Generation and deployment of honeytokens in relational databases for cyber deception
Nilin Prabhaker, Ghanshyam S. Bopche, Michael Arock
Computers & Security (2024) Vol. 146, pp. 104032-104032
Closed Access
Nilin Prabhaker, Ghanshyam S. Bopche, Michael Arock
Computers & Security (2024) Vol. 146, pp. 104032-104032
Closed Access
Optimizing SDN resource allocation using fuzzy logic and VM mapping technique
M Soltani, Seyed Amin Hosseini Seno, Amir Hossein Mohajerzadeh
Computing (2024) Vol. 107, Iss. 1
Closed Access
M Soltani, Seyed Amin Hosseini Seno, Amir Hossein Mohajerzadeh
Computing (2024) Vol. 107, Iss. 1
Closed Access
Cybersecurity, National Security and Trade in the Digital Era
Dan Ciuriak
SSRN Electronic Journal (2020)
Closed Access | Times Cited: 4
Dan Ciuriak
SSRN Electronic Journal (2020)
Closed Access | Times Cited: 4
Generation and Deployment of Honeytokens in Relational Databases for Cyber Deception
Nilin Prabhaker, Ghanshyam S. Bopche, Michael Arock
(2024)
Closed Access
Nilin Prabhaker, Ghanshyam S. Bopche, Michael Arock
(2024)
Closed Access
Transfer learning based multi-class malware classification using VGG16 feature extractor and SVM classifier
Harman Saggu, Er. Karandeep Singh, Tammisetti Nagendra Babu
(2024)
Closed Access
Harman Saggu, Er. Karandeep Singh, Tammisetti Nagendra Babu
(2024)
Closed Access
Combating temporal composition inference by high-order camouflaged network topology obfuscation
Xiaohui Li, Yang Xiang, Yizhao Huang, et al.
Computers & Security (2024) Vol. 144, pp. 103981-103981
Closed Access
Xiaohui Li, Yang Xiang, Yizhao Huang, et al.
Computers & Security (2024) Vol. 144, pp. 103981-103981
Closed Access
Analysis of Cyber Attacks Using Honeypot
Hakan Can Altunay
Black Sea Journal of Engineering and Science (2024) Vol. 7, Iss. 5, pp. 954-959
Open Access
Hakan Can Altunay
Black Sea Journal of Engineering and Science (2024) Vol. 7, Iss. 5, pp. 954-959
Open Access
Generative AI in Network Security and Intrusion Detection
Siva Raja Sindiramutty, Krishna Raj V. Prabagaran, N. Z. Jhanjhi, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 77-124
Closed Access
Siva Raja Sindiramutty, Krishna Raj V. Prabagaran, N. Z. Jhanjhi, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 77-124
Closed Access
Honeyquest: Rapidly Measuring the Enticingness of Cyber Deception Techniques with Code-based Questionnaires
Mario Kahlhofer, Stefan Achleitner, Stefan Raß, et al.
(2024), pp. 317-336
Closed Access
Mario Kahlhofer, Stefan Achleitner, Stefan Raß, et al.
(2024), pp. 317-336
Closed Access
A Hypothesis Testing-based Framework for Cyber Deception with Sludging
Abhinav Kumar, Swastik Brahma, Baocheng Geng, et al.
(2024), pp. 1-8
Closed Access
Abhinav Kumar, Swastik Brahma, Baocheng Geng, et al.
(2024), pp. 1-8
Closed Access
Revolutionizing Fault Detection in Self-Healing Network via Multi-Serial Cascaded and Adaptive Network
S Caleb, S. John Justin Thangaraj, G. Padmapriya, et al.
Knowledge-Based Systems (2024), pp. 112732-112732
Closed Access
S Caleb, S. John Justin Thangaraj, G. Padmapriya, et al.
Knowledge-Based Systems (2024), pp. 112732-112732
Closed Access
Anomaly detection in software-defined networking utilizing multi-verse deer hunting optimization enabled deep q-network for traffic flow rate prediction
Nirav M. Raja, Sudhir Vegad
Innovations in Systems and Software Engineering (2024)
Closed Access
Nirav M. Raja, Sudhir Vegad
Innovations in Systems and Software Engineering (2024)
Closed Access