
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Social network security: Issues, challenges, threats, and solutions
Shailendra Rathore, Pradip Kumar Sharma, Vincenzo Loia, et al.
Information Sciences (2017) Vol. 421, pp. 43-69
Closed Access | Times Cited: 236
Shailendra Rathore, Pradip Kumar Sharma, Vincenzo Loia, et al.
Information Sciences (2017) Vol. 421, pp. 43-69
Closed Access | Times Cited: 236
Showing 1-25 of 236 citing articles:
Hybrid Deep-Learning-Based Anomaly Detection Scheme for Suspicious Flow Detection in SDN: A Social Multimedia Perspective
Sahil Garg, Kuljeet Kaur, Neeraj Kumar, et al.
IEEE Transactions on Multimedia (2019) Vol. 21, Iss. 3, pp. 566-578
Closed Access | Times Cited: 238
Sahil Garg, Kuljeet Kaur, Neeraj Kumar, et al.
IEEE Transactions on Multimedia (2019) Vol. 21, Iss. 3, pp. 566-578
Closed Access | Times Cited: 238
Security of Cryptocurrencies in blockchain technology: State-of-art, challenges and future prospects
Arunima Ghosh, Shashank Gupta, Amit Dua, et al.
Journal of Network and Computer Applications (2020) Vol. 163, pp. 102635-102635
Closed Access | Times Cited: 179
Arunima Ghosh, Shashank Gupta, Amit Dua, et al.
Journal of Network and Computer Applications (2020) Vol. 163, pp. 102635-102635
Closed Access | Times Cited: 179
A new direction in social network analysis: Online social network analysis problems and applications
Ümit Can, Bilal Alataş
Physica A Statistical Mechanics and its Applications (2019) Vol. 535, pp. 122372-122372
Closed Access | Times Cited: 168
Ümit Can, Bilal Alataş
Physica A Statistical Mechanics and its Applications (2019) Vol. 535, pp. 122372-122372
Closed Access | Times Cited: 168
Secure-Anonymous User Authentication Scheme for e-Healthcare Application Using Wireless Medical Sensor Networks
Yoney Kirsal Ever
IEEE Systems Journal (2018) Vol. 13, Iss. 1, pp. 456-467
Closed Access | Times Cited: 88
Yoney Kirsal Ever
IEEE Systems Journal (2018) Vol. 13, Iss. 1, pp. 456-467
Closed Access | Times Cited: 88
Detecting Social Bots on Twitter: A Literature Review
Eiman Alothali, Nazar Zaki, Elfadil A. Mohamed, et al.
(2018), pp. 175-180
Closed Access | Times Cited: 86
Eiman Alothali, Nazar Zaki, Elfadil A. Mohamed, et al.
(2018), pp. 175-180
Closed Access | Times Cited: 86
Measuring trust in social networks based on linear uncertainty theory
Zaiwu Gong, Hui Wang, Weiwei Guo, et al.
Information Sciences (2019) Vol. 508, pp. 154-172
Closed Access | Times Cited: 82
Zaiwu Gong, Hui Wang, Weiwei Guo, et al.
Information Sciences (2019) Vol. 508, pp. 154-172
Closed Access | Times Cited: 82
A Survey of Defensive Deception: Approaches Using Game Theory and Machine Learning
Mu Zhu, Ahmed H. Anwar, Zelin Wan, et al.
IEEE Communications Surveys & Tutorials (2021) Vol. 23, Iss. 4, pp. 2460-2493
Closed Access | Times Cited: 71
Mu Zhu, Ahmed H. Anwar, Zelin Wan, et al.
IEEE Communications Surveys & Tutorials (2021) Vol. 23, Iss. 4, pp. 2460-2493
Closed Access | Times Cited: 71
Hybrid data encryption model integrating multi-objective adaptive genetic algorithm for secure medical data communication over cloud-based healthcare systems
R. St. Denis, P. Madhubala
Multimedia Tools and Applications (2021) Vol. 80, Iss. 14, pp. 21165-21202
Closed Access | Times Cited: 63
R. St. Denis, P. Madhubala
Multimedia Tools and Applications (2021) Vol. 80, Iss. 14, pp. 21165-21202
Closed Access | Times Cited: 63
Early detection of cyberbullying on social media networks
Manuel López-Vizcaíno, Francisco J. Nóvoa, Víctor Carneiro, et al.
Future Generation Computer Systems (2021) Vol. 118, pp. 219-229
Open Access | Times Cited: 62
Manuel López-Vizcaíno, Francisco J. Nóvoa, Víctor Carneiro, et al.
Future Generation Computer Systems (2021) Vol. 118, pp. 219-229
Open Access | Times Cited: 62
A network security situation assessment method based on adversarial deep learning
Hongyu Yang, Renyun Zeng, Guangquan Xu, et al.
Applied Soft Computing (2021) Vol. 102, pp. 107096-107096
Closed Access | Times Cited: 59
Hongyu Yang, Renyun Zeng, Guangquan Xu, et al.
Applied Soft Computing (2021) Vol. 102, pp. 107096-107096
Closed Access | Times Cited: 59
CNN-Fusion: An effective and lightweight phishing detection method based on multi-variant ConvNet
Musarat Hussain, Chi Cheng, Rui Xu, et al.
Information Sciences (2023) Vol. 631, pp. 328-345
Closed Access | Times Cited: 31
Musarat Hussain, Chi Cheng, Rui Xu, et al.
Information Sciences (2023) Vol. 631, pp. 328-345
Closed Access | Times Cited: 31
Impact and Research Challenges of Penetrating Testing and Vulnerability Assessment on Network Threat
Areej Fatima, Tahir Abbas Khan, Tamer Mohamed Abdellatif, et al.
2022 International Conference on Business Analytics for Technology and Security (ICBATS) (2023), pp. 1-8
Closed Access | Times Cited: 31
Areej Fatima, Tahir Abbas Khan, Tamer Mohamed Abdellatif, et al.
2022 International Conference on Business Analytics for Technology and Security (ICBATS) (2023), pp. 1-8
Closed Access | Times Cited: 31
Does digital literacy help residents avoid becoming victims of frauds? Empirical evidence based on a survey of residents in six provinces of east China
Peng Li, Qinghai Li, Shanxing Du
International Review of Economics & Finance (2024) Vol. 91, pp. 364-377
Closed Access | Times Cited: 10
Peng Li, Qinghai Li, Shanxing Du
International Review of Economics & Finance (2024) Vol. 91, pp. 364-377
Closed Access | Times Cited: 10
Network security situation assessment based on BKA and cross dual-channel
Shengcai Zhang, Zhiying Fu, Dezhi An, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 3
Closed Access | Times Cited: 1
Shengcai Zhang, Zhiying Fu, Dezhi An, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 3
Closed Access | Times Cited: 1
A Graph-Based Socioeconomic Analysis of Steemit
Barbara Guidi, Andrea Michienzi, Laura Ricci
IEEE Transactions on Computational Social Systems (2020) Vol. 8, Iss. 2, pp. 365-376
Open Access | Times Cited: 65
Barbara Guidi, Andrea Michienzi, Laura Ricci
IEEE Transactions on Computational Social Systems (2020) Vol. 8, Iss. 2, pp. 365-376
Open Access | Times Cited: 65
Detection of malicious social bots: A survey and a refined taxonomy
Majd Latah
Expert Systems with Applications (2020) Vol. 151, pp. 113383-113383
Closed Access | Times Cited: 64
Majd Latah
Expert Systems with Applications (2020) Vol. 151, pp. 113383-113383
Closed Access | Times Cited: 64
Privacy-Preserving Approach PBCN in Social Network With Differential Privacy
Haiping Huang, Zhang Dongjun, Fu Xiao, et al.
IEEE Transactions on Network and Service Management (2020) Vol. 17, Iss. 2, pp. 931-945
Closed Access | Times Cited: 61
Haiping Huang, Zhang Dongjun, Fu Xiao, et al.
IEEE Transactions on Network and Service Management (2020) Vol. 17, Iss. 2, pp. 931-945
Closed Access | Times Cited: 61
Artificial Intelligence Security Threat, Crime, and Forensics: Taxonomy and Open Issues
Doowon Jeong
IEEE Access (2020) Vol. 8, pp. 184560-184574
Open Access | Times Cited: 56
Doowon Jeong
IEEE Access (2020) Vol. 8, pp. 184560-184574
Open Access | Times Cited: 56
Analysis framework of network security situational awareness and comparison of implementation methods
Li Yan, Guang-qiu Huang, Chun-zi Wang, et al.
EURASIP Journal on Wireless Communications and Networking (2019) Vol. 2019, Iss. 1
Open Access | Times Cited: 55
Li Yan, Guang-qiu Huang, Chun-zi Wang, et al.
EURASIP Journal on Wireless Communications and Networking (2019) Vol. 2019, Iss. 1
Open Access | Times Cited: 55
A decision-support framework for data anonymization with application to machine learning processes
Loredana Caruccio, Domenico Desiato, Giuseppe Polese, et al.
Information Sciences (2022) Vol. 613, pp. 1-32
Open Access | Times Cited: 29
Loredana Caruccio, Domenico Desiato, Giuseppe Polese, et al.
Information Sciences (2022) Vol. 613, pp. 1-32
Open Access | Times Cited: 29
A robust semi-fragile watermarking system using Pseudo-Zernike moments and dual tree complex wavelet transform for social media content authentication
L. Agilandeeswari, Prabukumar Manoharan, Farhan A. Alenizi
Multimedia Tools and Applications (2023) Vol. 82, Iss. 28, pp. 43367-43419
Open Access | Times Cited: 21
L. Agilandeeswari, Prabukumar Manoharan, Farhan A. Alenizi
Multimedia Tools and Applications (2023) Vol. 82, Iss. 28, pp. 43367-43419
Open Access | Times Cited: 21
Social media bot detection with deep learning methods: a systematic review
Kadhim Hayawi, Susmita Saha, Mohammad Mehedy Masud, et al.
Neural Computing and Applications (2023)
Open Access | Times Cited: 19
Kadhim Hayawi, Susmita Saha, Mohammad Mehedy Masud, et al.
Neural Computing and Applications (2023)
Open Access | Times Cited: 19
Advanced framework for highly secure and cloud‐based storage of colour images
Nithya Chidambaram, Pethuru Raj, Karruppuswamy Thenmozhi, et al.
IET Image Processing (2020) Vol. 14, Iss. 13, pp. 3143-3153
Open Access | Times Cited: 48
Nithya Chidambaram, Pethuru Raj, Karruppuswamy Thenmozhi, et al.
IET Image Processing (2020) Vol. 14, Iss. 13, pp. 3143-3153
Open Access | Times Cited: 48
Neural-assisted image-dependent encryption scheme for medical image cloud storage
C. Lakshmi, K. Thenmozhi, John Bosco Balaguru Rayappan, et al.
Neural Computing and Applications (2020) Vol. 33, Iss. 12, pp. 6671-6684
Closed Access | Times Cited: 48
C. Lakshmi, K. Thenmozhi, John Bosco Balaguru Rayappan, et al.
Neural Computing and Applications (2020) Vol. 33, Iss. 12, pp. 6671-6684
Closed Access | Times Cited: 48
Online social network individual depression detection using a multitask heterogenous modality fusion approach
Yiding Wang, Zhenyi Wang, Chenghao Li, et al.
Information Sciences (2022) Vol. 609, pp. 727-749
Closed Access | Times Cited: 28
Yiding Wang, Zhenyi Wang, Chenghao Li, et al.
Information Sciences (2022) Vol. 609, pp. 727-749
Closed Access | Times Cited: 28