OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Cyber-security and reinforcement learning — A brief survey
Amrin Maria Khan Adawadkar, Nilima Kulkarni
Engineering Applications of Artificial Intelligence (2022) Vol. 114, pp. 105116-105116
Closed Access | Times Cited: 35

Showing 1-25 of 35 citing articles:

Reinforcement learning algorithms: A brief survey
Ashish Kumar Shakya, G. N. Pillai, Sohom Chakrabarty
Expert Systems with Applications (2023) Vol. 231, pp. 120495-120495
Closed Access | Times Cited: 153

A Comprehensive Survey: Evaluating the Efficiency of Artificial Intelligence and Machine Learning Techniques on Cyber Security Solutions
Merve Ozkan-Okay, Erdal Akin, Ömer Aslan, et al.
IEEE Access (2024) Vol. 12, pp. 12229-12256
Open Access | Times Cited: 43

Machine learning and deep learning for user authentication and authorization in cybersecurity: A state-of-the-art review
Zinniya Taffannum Pritee, Mehedi Hasan Anik, Saida Binta Alam, et al.
Computers & Security (2024) Vol. 140, pp. 103747-103747
Closed Access | Times Cited: 11

Deep Reinforcement Learning for Adaptive Cyber Defense in Network Security
Atheer Alaa Hammad, Saadaldeen Rashid Ahmed, Mohammad K. Abdul-Hussein, et al.
(2024), pp. 292-297
Closed Access | Times Cited: 6

A Multi-Agents Deep Reinforcement Learning Autonomous Security Management Approach for Internet of Things
Bin Ren, Yunlong Tang, Huan Wang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 15, pp. 25600-25612
Closed Access | Times Cited: 5

ARCS: Adaptive Reinforcement Learning Framework for Automated Cybersecurity Incident Response Strategy Optimization
Shaolei Ren, Jianjing Jin, Qi Cao, et al.
Applied Sciences (2025) Vol. 15, Iss. 2, pp. 951-951
Open Access

Application of deep reinforcement learning for intrusion detection in Internet of Things: A systematic review
Saeid Jamshidi, Amin Nikanjam, Kawser Wazed Nafi, et al.
Internet of Things (2025), pp. 101531-101531
Closed Access

Multi-agent reinforcement learning for cybersecurity: Classification and survey
Salvo Finistrella, Stefano Mariani, Manfred A. Jeusfeld
Intelligent Systems with Applications (2025), pp. 200495-200495
Open Access

Military reinforcement learning with large language model–based agents: a case of weapon selection
Jungmok Ma
The Journal of Defense Modeling and Simulation Applications Methodology Technology (2025)
Closed Access

Advanced IDS: a comparative study of datasets and machine learning algorithms for network flow-based intrusion detection systems
Julio Cesar Munguía Mondragón, Paula Branco, Guy-Vincent Jourdan, et al.
Applied Intelligence (2025) Vol. 55, Iss. 7
Open Access

Deep Reinforcement Learning for intrusion detection in Internet of Things: Best practices, lessons learnt, and open challenges
Jesús F. Cevallos M., Alessandra Rizzardi, Sabrina Sicari, et al.
Computer Networks (2023) Vol. 236, pp. 110016-110016
Closed Access | Times Cited: 12

Artificial intelligence, machine learning, and deep learning for cybersecurity solutions: a review of emerging technologies and applications
Mallikarjuna Paramesha, Nitin Liladhar Rane, Jayesh Rane
SSRN Electronic Journal (2024)
Closed Access | Times Cited: 3

A method of network attack-defense game and collaborative defense decision-making based on hierarchical multi-agent reinforcement learning
Yunlong Tang, Jing Sun, Huan Wang, et al.
Computers & Security (2024) Vol. 142, pp. 103871-103871
Closed Access | Times Cited: 2

Reinforcement learning-based autonomous attacker to uncover computer network vulnerabilities
Ahmed Mohamed Ahmed, Thanh Thi Nguyen, Mohamed Abdelrazek, et al.
Neural Computing and Applications (2024) Vol. 36, Iss. 23, pp. 14341-14360
Closed Access | Times Cited: 1

Enhancing Intrusion Detection Systems with Reinforcement Learning: A Comprehensive Survey of RL-based Approaches and Techniques
Faten Louati, Farah Barika Ktata, Ikram Amous
SN Computer Science (2024) Vol. 5, Iss. 6
Closed Access | Times Cited: 1

Military Decision Support with Actor and Critic Reinforcement Learning Agents
Jungmok Ma
Defence Science Journal (2024) Vol. 74, Iss. 3, pp. 389-398
Open Access | Times Cited: 1

Robust and efficient task scheduling for robotics applications with reinforcement learning
Mateusz Tejer, Rafał Szczepański, Tomasz Tarczewski
Engineering Applications of Artificial Intelligence (2023) Vol. 127, pp. 107300-107300
Open Access | Times Cited: 4

Towards a Deep Learning Approach for IoT Attack Detection Based on a New Generative Adversarial Network Architecture and Gated Recurrent Unit
Mohammed Chemmakha, Omar Habibi, Mohamed Lazaar
Journal of Network and Systems Management (2024) Vol. 32, Iss. 4
Closed Access | Times Cited: 1

Machine Learning in Information and Communications Technology: A Survey
Ηλίας Δρίτσας, Μαρία Τρίγκα
Information (2024) Vol. 16, Iss. 1, pp. 8-8
Open Access | Times Cited: 1

Learning new attack vectors from misuse cases with deep reinforcement learning
Eric MSP Veith, Arlena Wellßow, Mathias Uslar
Frontiers in Energy Research (2023) Vol. 11
Open Access | Times Cited: 3

Canaries and Whistles: Resilient Drone Communication Networks with (or without) Deep Reinforcement Learning
Chris Hicks, Vasilios Mavroudis, Myles Foley, et al.
(2023), pp. 91-101
Open Access | Times Cited: 3

Leveraging Deep Reinforcement Learning for Automating Penetration Testing in Reconnaissance and Exploitation Phase
Van-Hoang Le, Nguyen Xuan Nhu, To Trong Nghia, et al.
2022 RIVF International Conference on Computing and Communication Technologies (RIVF) (2022), pp. 41-46
Closed Access | Times Cited: 5

Deep Reinforcement Learning for Intrusion Detection in Internet of Things: Best Practices, Lessons Learnt, and Open Challenges
Jesús F. Cevallos M., Alessandra Rizzardi, Sabrina Sicari, et al.
(2023)
Closed Access | Times Cited: 2

A reinforcement learning-based transformed inverse model strategy for nonlinear process control
Debaprasad Dutta, Simant R. Upreti
Computers & Chemical Engineering (2023) Vol. 178, pp. 108386-108386
Closed Access | Times Cited: 2

A Review of Reinforcement Learning Enabled Autonomous Cyber Operations Platforms
Sabih Saeed, Paul Black, Shaoning Pang, et al.
(2024)
Closed Access

Page 1 - Next Page

Scroll to top