
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
ConvXSS: A deep learning-based smart ICT framework against code injection attacks for HTML5 web applications in sustainable smart city infrastructure
Koundinya Kuppa, Anushka Dayal, Shashank Gupta, et al.
Sustainable Cities and Society (2022) Vol. 80, pp. 103765-103765
Open Access | Times Cited: 18
Koundinya Kuppa, Anushka Dayal, Shashank Gupta, et al.
Sustainable Cities and Society (2022) Vol. 80, pp. 103765-103765
Open Access | Times Cited: 18
Showing 18 citing articles:
Experts and intelligent systems for smart homes’ Transformation to Sustainable Smart Cities: A comprehensive review
Noor Ul Huda, Ijaz Ahmed, Muhammad Adnan, et al.
Expert Systems with Applications (2023) Vol. 238, pp. 122380-122380
Closed Access | Times Cited: 76
Noor Ul Huda, Ijaz Ahmed, Muhammad Adnan, et al.
Expert Systems with Applications (2023) Vol. 238, pp. 122380-122380
Closed Access | Times Cited: 76
A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions
Hüseyin Ahmetoğlu, Resul Daş
Internet of Things (2022) Vol. 20, pp. 100615-100615
Closed Access | Times Cited: 57
Hüseyin Ahmetoğlu, Resul Daş
Internet of Things (2022) Vol. 20, pp. 100615-100615
Closed Access | Times Cited: 57
Unveiling XSS Threats: A Bipartite Graph Approach with Ensemble Deep Learning for Enhanced Detection
Wafa Alorainy
Information (2025) Vol. 16, Iss. 2, pp. 97-97
Open Access
Wafa Alorainy
Information (2025) Vol. 16, Iss. 2, pp. 97-97
Open Access
Industrial IoT intrusion attack detection based on composite attention-driven multi-layer pyramid features
Jiqiang Zhai, Xinyu Wang, Zhengli Zhai, et al.
Computer Networks (2025), pp. 111207-111207
Closed Access
Jiqiang Zhai, Xinyu Wang, Zhengli Zhai, et al.
Computer Networks (2025), pp. 111207-111207
Closed Access
Detection of data-driven blind cyber-attacks on smart grid: A deep learning approach
Debottam Mukherjee
Sustainable Cities and Society (2023) Vol. 92, pp. 104475-104475
Closed Access | Times Cited: 12
Debottam Mukherjee
Sustainable Cities and Society (2023) Vol. 92, pp. 104475-104475
Closed Access | Times Cited: 12
Machine and Deep Learning-based XSS Detection Approaches: A Systematic Literature Review
Isam Kareem Thajeel, Khairulmizam Samsudin, Shaiful Jahari Hashim, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 7, pp. 101628-101628
Open Access | Times Cited: 10
Isam Kareem Thajeel, Khairulmizam Samsudin, Shaiful Jahari Hashim, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 7, pp. 101628-101628
Open Access | Times Cited: 10
Optimizing the Provision of Public Services By Local Administration as a Component of the Smart City Concept on the Example of Zabrze
Małgorzata Mańka-Szulik, Dariusz Krawczyk
Management Systems in Production Engineering (2022) Vol. 30, Iss. 2, pp. 192-199
Open Access | Times Cited: 13
Małgorzata Mańka-Szulik, Dariusz Krawczyk
Management Systems in Production Engineering (2022) Vol. 30, Iss. 2, pp. 192-199
Open Access | Times Cited: 13
Information Security Applications in Smart Cities: A Bibliometric Analysis of Emerging Research
Thiago Poleto, Thyago Celso Cavalcante Nepomuceno, Victor Diogho Heuer de Carvalho, et al.
Future Internet (2023) Vol. 15, Iss. 12, pp. 393-393
Open Access | Times Cited: 4
Thiago Poleto, Thyago Celso Cavalcante Nepomuceno, Victor Diogho Heuer de Carvalho, et al.
Future Internet (2023) Vol. 15, Iss. 12, pp. 393-393
Open Access | Times Cited: 4
Personal data filtering: a systematic literature review comparing the effectiveness of XSS attacks in web applications vs cookie stealing
Germán Rodríguez, Jenny Torres
Annals of Telecommunications (2024)
Closed Access | Times Cited: 1
Germán Rodríguez, Jenny Torres
Annals of Telecommunications (2024)
Closed Access | Times Cited: 1
Prevention and Detection of Network Attacks: A Comprehensive Study
Paul Addai, Ryan Freas, Elnatan Mesfin Tesfa, et al.
Lecture notes in business information processing (2023), pp. 56-66
Closed Access | Times Cited: 2
Paul Addai, Ryan Freas, Elnatan Mesfin Tesfa, et al.
Lecture notes in business information processing (2023), pp. 56-66
Closed Access | Times Cited: 2
Ciudades Inteligentes, Personas Inteligentes y Desinformación
Carlos César Ronchi, Mauro Enrique Carozzo Todaro, Antônio Roberto Coelho Serra
Revista de Ciências da Administração (2024) Vol. 1, Iss. Especial, pp. 1-13
Open Access
Carlos César Ronchi, Mauro Enrique Carozzo Todaro, Antônio Roberto Coelho Serra
Revista de Ciências da Administração (2024) Vol. 1, Iss. Especial, pp. 1-13
Open Access
Novel Defense Method of Malicious Code Injection in High Concurrency Database
Zhiyong Cao
(2024), pp. 481-487
Closed Access
Zhiyong Cao
(2024), pp. 481-487
Closed Access
Systematic Review of Dimensions and Indicators in Sustainable and Smart Cities: Trends, Interdependencies, and Continental Variations
Roger Alejandro Parra-Pulido, Yolanda Teresa Hernández Peña, Carlos Alfonso Zafra Mejía
Urban Science (2024) Vol. 8, Iss. 4, pp. 202-202
Open Access
Roger Alejandro Parra-Pulido, Yolanda Teresa Hernández Peña, Carlos Alfonso Zafra Mejía
Urban Science (2024) Vol. 8, Iss. 4, pp. 202-202
Open Access
A novel hybrid neural network approach incorporating convolution and LSTM with a self-attention mechanism for web attack detection
Kaiyu Luo, Yindong Chen
Applied Intelligence (2024) Vol. 55, Iss. 2
Closed Access
Kaiyu Luo, Yindong Chen
Applied Intelligence (2024) Vol. 55, Iss. 2
Closed Access
Research on Artificial Intelligence Ethical Risk of Threat Intelligence Analysis and Electronic Forensics
XU Fa-jian, Zheng Xu, Lizhi Lin, et al.
Lecture notes on data engineering and communications technologies (2023), pp. 688-696
Closed Access | Times Cited: 1
XU Fa-jian, Zheng Xu, Lizhi Lin, et al.
Lecture notes on data engineering and communications technologies (2023), pp. 688-696
Closed Access | Times Cited: 1
ZTWeb: Cross site scripting detection based on zero trust
Anbin Wu, Zhiyong Feng, Xiaohong Li, et al.
Computers & Security (2023) Vol. 134, pp. 103434-103434
Closed Access | Times Cited: 1
Anbin Wu, Zhiyong Feng, Xiaohong Li, et al.
Computers & Security (2023) Vol. 134, pp. 103434-103434
Closed Access | Times Cited: 1
Cross-Site Scripting Recognition Using LSTM Model
Ishan Joshi, Harsh J. Kiratsata
Advances in intelligent systems and computing (2023), pp. 1-10
Closed Access | Times Cited: 1
Ishan Joshi, Harsh J. Kiratsata
Advances in intelligent systems and computing (2023), pp. 1-10
Closed Access | Times Cited: 1
WebGuardRL: An Innovative Reinforcement Learning-based Approach for Advanced Web Attack Detection
Hien Do Hoang, Ha Nguyen Thi Hai, Do Thi Thu Hien, et al.
(2023), pp. 761-768
Closed Access
Hien Do Hoang, Ha Nguyen Thi Hai, Do Thi Thu Hien, et al.
(2023), pp. 761-768
Closed Access