OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A comprehensive survey on cyber deception techniques to improve honeypot performance
Amir Javadpour, Forough Ja’fari, Tarik Taleb, et al.
Computers & Security (2024) Vol. 140, pp. 103792-103792
Open Access | Times Cited: 24

Showing 24 citing articles:

Enhancing Cybersecurity through AI and ML: Strategies, Challenges, and Future Directions
Maryam Roshanaei, Mahir R. Khan, Natalie N. Sylvester
Journal of Information Security (2024) Vol. 15, Iss. 03, pp. 320-339
Open Access | Times Cited: 6

Real‐Time Nail‐Biting Detection on a Smartwatch Using Three CNN Models Pipeline
Abdullah Alesmaeil, Eftâl Şehirli
Computational Intelligence (2025) Vol. 41, Iss. 1
Closed Access

An Enhanced LSTM Approach for Detecting IoT-Based DDoS Attacks Using Honeypot Data
Arjun Kumar Bose Arnob, M. F. Mridha, Mejdl Safran, et al.
International Journal of Computational Intelligence Systems (2025) Vol. 18, Iss. 1
Open Access

Design and Analysis of a Honeypot Pi for Intrusion Detection System
D. Saravana Kumar, Alicia Biju, Raja Muthalagu, et al.
(2025), pp. 125-138
Closed Access

Understanding the impact of IoT security patterns on CPU usage and energy consumption: a dynamic approach for selecting patterns with deep reinforcement learning
Saeid Jamshidi, Amin Nikanjam, Kawser Wazed Nafi, et al.
International Journal of Information Security (2025) Vol. 24, Iss. 2
Closed Access

Securing IIoT systems against DDoS attacks with adaptive moving target defense strategies
Swati, Sangita Roy, Jawar Singh, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access

Detection and Mitigation of Distributed Denial of Service Attacks Using Ensemble Learning and Honeypots in a Novel SDN-UAV Network Architecture
Mohamed Amine Ould Rabah, Hamza Drid, Yasmine Medjadba, et al.
IEEE Access (2024) Vol. 12, pp. 128929-128940
Open Access | Times Cited: 2

Evaluating modern intrusion detection methods in the face of Gen V multi-vector attacks with fuzzy AHP-TOPSIS
Wajdi Alhakami
PLoS ONE (2024) Vol. 19, Iss. 5, pp. e0302559-e0302559
Open Access | Times Cited: 2

Enhancing honeynet-based protection with network slicing for massive Pre-6G IoT Smart Cities deployments
Antonio Matencio Escolar, Qi Wang, José M. Alcaraz Calero
Journal of Network and Computer Applications (2024) Vol. 229, pp. 103918-103918
Open Access | Times Cited: 2

Application Layer Cyber Deception Without Developer Interaction
Mario Kahlhofer, Stefan Raß
(2024), pp. 416-429
Open Access | Times Cited: 1

Encryption as a Service: A Review of Architectures and Taxonomies
Amir Javadpour, Forough Ja’fari, Tarik Taleb
Lecture notes in computer science (2024), pp. 36-44
Closed Access | Times Cited: 1

Encryption as a Service (EaaS): Introducing the Full-Cloud-Fog Architecture for Enhanced Performance and Security
Amir Javadpour, Forough Ja’fari, Tarik Taleb, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 24, pp. 39744-39766
Open Access | Times Cited: 1

Generation and deployment of honeytokens in relational databases for cyber deception
Nilin Prabhaker, Ghanshyam S. Bopche, Michael Arock
Computers & Security (2024) Vol. 146, pp. 104032-104032
Closed Access

Optimizing SDN resource allocation using fuzzy logic and VM mapping technique
M Soltani, Seyed Amin Hosseini Seno, Amir Hossein Mohajerzadeh
Computing (2024) Vol. 107, Iss. 1
Closed Access

Cybersecurity, National Security and Trade in the Digital Era
Dan Ciuriak
SSRN Electronic Journal (2020)
Closed Access | Times Cited: 4

Generation and Deployment of Honeytokens in Relational Databases for Cyber Deception
Nilin Prabhaker, Ghanshyam S. Bopche, Michael Arock
(2024)
Closed Access

Transfer learning based multi-class malware classification using VGG16 feature extractor and SVM classifier
Harman Saggu, Er. Karandeep Singh, Tammisetti Nagendra Babu
(2024)
Closed Access

Combating temporal composition inference by high-order camouflaged network topology obfuscation
Xiaohui Li, Yang Xiang, Yizhao Huang, et al.
Computers & Security (2024) Vol. 144, pp. 103981-103981
Closed Access

Analysis of Cyber Attacks Using Honeypot
Hakan Can Altunay
Black Sea Journal of Engineering and Science (2024) Vol. 7, Iss. 5, pp. 954-959
Open Access

Generative AI in Network Security and Intrusion Detection
Siva Raja Sindiramutty, Krishna Raj V. Prabagaran, N. Z. Jhanjhi, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 77-124
Closed Access

Honeyquest: Rapidly Measuring the Enticingness of Cyber Deception Techniques with Code-based Questionnaires
Mario Kahlhofer, Stefan Achleitner, Stefan Raß, et al.
(2024), pp. 317-336
Closed Access

A Hypothesis Testing-based Framework for Cyber Deception with Sludging
Abhinav Kumar, Swastik Brahma, Baocheng Geng, et al.
(2024), pp. 1-8
Closed Access

Revolutionizing Fault Detection in Self-Healing Network via Multi-Serial Cascaded and Adaptive Network
S Caleb, S. John Justin Thangaraj, G. Padmapriya, et al.
Knowledge-Based Systems (2024), pp. 112732-112732
Closed Access

Page 1

Scroll to top