
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Comprehensive review on intelligent security defences in cloud: Taxonomy, security issues, ML/DL techniques, challenges and future trends
Mohamad Mulham Belal, Divya Meena Sundaram
Journal of King Saud University - Computer and Information Sciences (2022) Vol. 34, Iss. 10, pp. 9102-9131
Open Access | Times Cited: 16
Mohamad Mulham Belal, Divya Meena Sundaram
Journal of King Saud University - Computer and Information Sciences (2022) Vol. 34, Iss. 10, pp. 9102-9131
Open Access | Times Cited: 16
Showing 16 citing articles:
Lightweight Integrity Preserving Scheme for Secure Data Exchange in Cloud-Based IoT Systems
Zaid Alaa Hussien, Husam A. Abdulmalik, Mohammed Abdulridha Hussain, et al.
Applied Sciences (2023) Vol. 13, Iss. 2, pp. 691-691
Open Access | Times Cited: 41
Zaid Alaa Hussien, Husam A. Abdulmalik, Mohammed Abdulridha Hussain, et al.
Applied Sciences (2023) Vol. 13, Iss. 2, pp. 691-691
Open Access | Times Cited: 41
MalSort: Lightweight and efficient image-based malware classification using masked self-supervised framework with Swin Transformer
Fangwei Wang, Xipeng Shi, Fang Yang, et al.
Journal of Information Security and Applications (2024) Vol. 83, pp. 103784-103784
Closed Access | Times Cited: 5
Fangwei Wang, Xipeng Shi, Fang Yang, et al.
Journal of Information Security and Applications (2024) Vol. 83, pp. 103784-103784
Closed Access | Times Cited: 5
DBCT-Net:A dual branch hybrid CNN-transformer network for remote sensing image fusion
Quanli Wang, Xin Jin, Qian Jiang, et al.
Expert Systems with Applications (2023) Vol. 233, pp. 120829-120829
Closed Access | Times Cited: 14
Quanli Wang, Xin Jin, Qian Jiang, et al.
Expert Systems with Applications (2023) Vol. 233, pp. 120829-120829
Closed Access | Times Cited: 14
Global-Local Attention-Based Butterfly Vision Transformer for Visualization-Based Malware Classification
Mohamad Mulham Belal, Divya Meena Sundaram
IEEE Access (2023) Vol. 11, pp. 69337-69355
Open Access | Times Cited: 13
Mohamad Mulham Belal, Divya Meena Sundaram
IEEE Access (2023) Vol. 11, pp. 69337-69355
Open Access | Times Cited: 13
Cloud Network Anomaly Detection Using Machine and Deep Learning Techniques— Recent Research Advancements
Amira Mahamat Abdallah, Aysha Saif Rashed Obaid Alkaabi, Ghaya Bark Nasser Douman Alameri, et al.
IEEE Access (2024) Vol. 12, pp. 56749-56773
Open Access | Times Cited: 5
Amira Mahamat Abdallah, Aysha Saif Rashed Obaid Alkaabi, Ghaya Bark Nasser Douman Alameri, et al.
IEEE Access (2024) Vol. 12, pp. 56749-56773
Open Access | Times Cited: 5
A Survey on ML Techniques for Multi-Platform Malware Detection: Securing PC, Mobile Devices, IoT, and Cloud Environments
Jannatul Ferdous, Rafiqul Islam, Arash Mahboubi, et al.
Sensors (2025) Vol. 25, Iss. 4, pp. 1153-1153
Open Access
Jannatul Ferdous, Rafiqul Islam, Arash Mahboubi, et al.
Sensors (2025) Vol. 25, Iss. 4, pp. 1153-1153
Open Access
Deep Learning Methods to Prevent Various Cyberattacks in Cloud Environment
Qusay Kanaan Kadhim, Ohood Fadil Alwan, Inteasar Yaseen Khudhair
Revue d intelligence artificielle (2024) Vol. 38, Iss. 3, pp. 893-900
Open Access | Times Cited: 1
Qusay Kanaan Kadhim, Ohood Fadil Alwan, Inteasar Yaseen Khudhair
Revue d intelligence artificielle (2024) Vol. 38, Iss. 3, pp. 893-900
Open Access | Times Cited: 1
Hybrid feature extraction and integrated deep learning for cloud-based malware detection
Pham Sy Nguyen, Tran Nhat Huy, Tong Anh Tuan, et al.
Computers & Security (2024), pp. 104233-104233
Closed Access | Times Cited: 1
Pham Sy Nguyen, Tran Nhat Huy, Tong Anh Tuan, et al.
Computers & Security (2024), pp. 104233-104233
Closed Access | Times Cited: 1
Comprehensive Review: Security Challenges and Countermeasures for Big Data Security in Cloud Computing
Anupreet Kaur, Ankita Dhiman, Manjit Singh
(2023)
Closed Access | Times Cited: 4
Anupreet Kaur, Ankita Dhiman, Manjit Singh
(2023)
Closed Access | Times Cited: 4
An intelligent protection framework for intrusion detection in cloud environment based on covariance matrix self-adaptation evolution strategy and multi-criteria decision-making
Mohamad Mulham Belal, Divya Meena Sundaram
Journal of Intelligent & Fuzzy Systems (2023) Vol. 44, Iss. 6, pp. 8971-9001
Closed Access | Times Cited: 2
Mohamad Mulham Belal, Divya Meena Sundaram
Journal of Intelligent & Fuzzy Systems (2023) Vol. 44, Iss. 6, pp. 8971-9001
Closed Access | Times Cited: 2
Cloud and Edge Computing Architectures: A Survey
Hasnae Nouhas, Abdessamad Belangour, Mahmoud Nassar
(2023), pp. 210-215
Closed Access | Times Cited: 2
Hasnae Nouhas, Abdessamad Belangour, Mahmoud Nassar
(2023), pp. 210-215
Closed Access | Times Cited: 2
Mobile Cloud Computing Paradigm: A Survey of Operational Concerns, Challenges and Open Issues
Higinio Mora, Francisco A. Pujol, Tamai Ramírez-Gordillo, et al.
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 12
Open Access
Higinio Mora, Francisco A. Pujol, Tamai Ramírez-Gordillo, et al.
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 12
Open Access
Understanding Issues and Challenges Posed by LDOS, FRC Attacks on Cloud Environment
Deepali D. Ahir, Nuzhat F. Shaikh
Results in Control and Optimization (2024), pp. 100512-100512
Open Access
Deepali D. Ahir, Nuzhat F. Shaikh
Results in Control and Optimization (2024), pp. 100512-100512
Open Access
A Survey on Recent Intrusion Detection Systems in Cloud Environment
Belcaid Saad, Siham Aouad, Mostapha Zbakh
(2023), pp. 01-06
Closed Access | Times Cited: 1
Belcaid Saad, Siham Aouad, Mostapha Zbakh
(2023), pp. 01-06
Closed Access | Times Cited: 1
Análisis integral de los sistemas de detección de intrusos y sus algoritmos asociados en la seguridad de la información
Joel Renato Enciso Suárez, Jack Edinson Portilla Rodriguez, Alberto Carlos Mendoza de los Santos
INGENIERÍA INVESTIGA (2023) Vol. 5
Open Access
Joel Renato Enciso Suárez, Jack Edinson Portilla Rodriguez, Alberto Carlos Mendoza de los Santos
INGENIERÍA INVESTIGA (2023) Vol. 5
Open Access
Principales medidas de seguridad para la protección de información y datos en la nube: una revisión sistemática
Â. Gil, Percy Olivarez Geronimo Dionicio, Alberto Carlos Mendoza de los Santos
INGENIERÍA INVESTIGA (2023) Vol. 5
Open Access
Â. Gil, Percy Olivarez Geronimo Dionicio, Alberto Carlos Mendoza de los Santos
INGENIERÍA INVESTIGA (2023) Vol. 5
Open Access