
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Privilege Escalation Attack Detection and Mitigation in Cloud Using Machine Learning
Muhammad Mehmood, Rashid Amin, Muhana Magboul Ali Muslam, et al.
IEEE Access (2023) Vol. 11, pp. 46561-46576
Open Access | Times Cited: 20
Muhammad Mehmood, Rashid Amin, Muhana Magboul Ali Muslam, et al.
IEEE Access (2023) Vol. 11, pp. 46561-46576
Open Access | Times Cited: 20
Showing 20 citing articles:
A Review of Recent Advances, Challenges, and Opportunities in Malicious Insider Threat Detection Using Machine Learning Methods
Fatima Alzaabi, Abid Mehmood
IEEE Access (2024) Vol. 12, pp. 30907-30927
Open Access | Times Cited: 23
Fatima Alzaabi, Abid Mehmood
IEEE Access (2024) Vol. 12, pp. 30907-30927
Open Access | Times Cited: 23
Detecting Cyber Threats With a Graph-Based NIDPS
Brendan Ooi Tze Wen, Najihah Syahriza, Nicholas Chan Wei Xian, et al.
Advances in logistics, operations, and management science book series (2023), pp. 36-74
Closed Access | Times Cited: 16
Brendan Ooi Tze Wen, Najihah Syahriza, Nicholas Chan Wei Xian, et al.
Advances in logistics, operations, and management science book series (2023), pp. 36-74
Closed Access | Times Cited: 16
Beyond Firewall: Leveraging Machine Learning for Real-Time Insider Threats Identification and User Profiling
Saif Al-Dean Qawasmeh, Ali Abdullah S. AlQahtani
Future Internet (2025) Vol. 17, Iss. 2, pp. 93-93
Open Access
Saif Al-Dean Qawasmeh, Ali Abdullah S. AlQahtani
Future Internet (2025) Vol. 17, Iss. 2, pp. 93-93
Open Access
A novel ML based structure for mitigating security risks in a cloud environment
Gurjit Kaur, Gurbinder Singh Brar, Shalli Rani
AIP conference proceedings (2025) Vol. 3227, pp. 060013-060013
Closed Access
Gurjit Kaur, Gurbinder Singh Brar, Shalli Rani
AIP conference proceedings (2025) Vol. 3227, pp. 060013-060013
Closed Access
Post-Quantum Secure Identity-Based Signature Scheme with Lattice Assumption for Internet of Things Networks
Yang Zhang, Yu Tang, Chaoyang Li, et al.
Sensors (2024) Vol. 24, Iss. 13, pp. 4188-4188
Open Access | Times Cited: 4
Yang Zhang, Yu Tang, Chaoyang Li, et al.
Sensors (2024) Vol. 24, Iss. 13, pp. 4188-4188
Open Access | Times Cited: 4
Robust Face Recognition Under Adversarial Attack Using SARGAN Model and Improved Cross Triple MobileNetV1
Sheilla Ann B. Pacheco, Jheanel E. Estrada, Mahesh Goyani
Lecture notes in networks and systems (2025), pp. 491-510
Closed Access
Sheilla Ann B. Pacheco, Jheanel E. Estrada, Mahesh Goyani
Lecture notes in networks and systems (2025), pp. 491-510
Closed Access
A Review on Data Security and Privacy in Serverless Computing: Key Strategies, Emerging Challenges
Bharath Kumar Reddy Janumpally
(2025), pp. 118-126
Closed Access
Bharath Kumar Reddy Janumpally
(2025), pp. 118-126
Closed Access
Insider threat mitigation: Systematic literature review
Usman Inayat, Mashaim Farzan, Sajid Mahmood, et al.
Ain Shams Engineering Journal (2024), pp. 103068-103068
Open Access | Times Cited: 3
Usman Inayat, Mashaim Farzan, Sajid Mahmood, et al.
Ain Shams Engineering Journal (2024), pp. 103068-103068
Open Access | Times Cited: 3
Organizational information security threats: Status and challenges
B. Akello
World Journal of Advanced Engineering Technology and Sciences (2024) Vol. 11, Iss. 1, pp. 148-162
Open Access | Times Cited: 2
B. Akello
World Journal of Advanced Engineering Technology and Sciences (2024) Vol. 11, Iss. 1, pp. 148-162
Open Access | Times Cited: 2
STRIDE-Based Cybersecurity Threat Modeling, Risk Assessment and Treatment of an Infotainment High Performance Computing (HPC) System
Popy Das, Md. Rashid Al Asif, Sohely Jahan, et al.
(2024)
Open Access | Times Cited: 1
Popy Das, Md. Rashid Al Asif, Sohely Jahan, et al.
(2024)
Open Access | Times Cited: 1
An Online Fake Review Detection Approach Using Famous Machine Learning Algorithms
Asma Hassan Alshehri
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 2, pp. 2767-2786
Open Access | Times Cited: 1
Asma Hassan Alshehri
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 2, pp. 2767-2786
Open Access | Times Cited: 1
Explorning the Role of Machine Learning in Enhancing Cloud Security
M. Amshavalli, Rajiv Kishore, S.P. Raguvijay, et al.
International Journal of Innovative Science and Research Technology (IJISRT) (2024), pp. 713-717
Open Access | Times Cited: 1
M. Amshavalli, Rajiv Kishore, S.P. Raguvijay, et al.
International Journal of Innovative Science and Research Technology (IJISRT) (2024), pp. 713-717
Open Access | Times Cited: 1
Design of an Anomaly Detection Framework for Delay and Privacy-Aware Blockchain-Based Cloud Deployments
A. Venkata Nagarjun, R. Sujatha
IEEE Access (2024) Vol. 12, pp. 84843-84862
Open Access | Times Cited: 1
A. Venkata Nagarjun, R. Sujatha
IEEE Access (2024) Vol. 12, pp. 84843-84862
Open Access | Times Cited: 1
Optimized Dual Access Control for Cloud-based Data Storage and Distribution using Global-Context Residual Recurrent Neural Network
Shaik Mohammad Rafi, R Yogesh, M. Sriram
Computers & Security (2024), pp. 104183-104183
Closed Access | Times Cited: 1
Shaik Mohammad Rafi, R Yogesh, M. Sriram
Computers & Security (2024), pp. 104183-104183
Closed Access | Times Cited: 1
Tackling security and privacy challenges in the realm of big data analytics
Janet Ngesa
World Journal of Advanced Research and Reviews (2023) Vol. 21, Iss. 2, pp. 552-576
Open Access | Times Cited: 2
Janet Ngesa
World Journal of Advanced Research and Reviews (2023) Vol. 21, Iss. 2, pp. 552-576
Open Access | Times Cited: 2
Emerging Cyber Risks & Threats in Healthcare Systems: A Case Study in Resilient Cybersecurity Solutions
Abdiaziz Abdi, Hajar Bennouri, Anthony Keane
2022 11th Mediterranean Conference on Embedded Computing (MECO) (2024), pp. 1-8
Closed Access
Abdiaziz Abdi, Hajar Bennouri, Anthony Keane
2022 11th Mediterranean Conference on Embedded Computing (MECO) (2024), pp. 1-8
Closed Access
OPIN-ITP: Optimized Physics Informed Network with Trimmed Score Regression Based Insider Threats Prediction in Cloud Computing
B. Gayathri
ICST Transactions on Scalable Information Systems (2024) Vol. 11
Open Access
B. Gayathri
ICST Transactions on Scalable Information Systems (2024) Vol. 11
Open Access
TS-AUBD: A Novel Two-Stage Method for Abnormal User Behavior Detection
Yu Cao, Yilu Chen, Ye Wang, et al.
Lecture notes in computer science (2024), pp. 17-30
Closed Access
Yu Cao, Yilu Chen, Ye Wang, et al.
Lecture notes in computer science (2024), pp. 17-30
Closed Access
An Approach for Intelligent Behaviour-Based Threat Modelling with Explanations
Sonu Preetam, Maxime Compastié, Vanesa Daza, et al.
(2023), pp. 197-200
Closed Access
Sonu Preetam, Maxime Compastié, Vanesa Daza, et al.
(2023), pp. 197-200
Closed Access
Can artificial intelligence do the job of a theoretical physicist?
Huber Nieto–Chaupis
2019 International Conference on Electrical, Communication, and Computer Engineering (ICECCE) (2023), pp. 1-6
Closed Access
Huber Nieto–Chaupis
2019 International Conference on Electrical, Communication, and Computer Engineering (ICECCE) (2023), pp. 1-6
Closed Access
Human Versus Computer: Who Can Make Valuable Progress in Theoretical Physics?
Huber Nieto–Chaupis
(2023), pp. 83-87
Closed Access
Huber Nieto–Chaupis
(2023), pp. 83-87
Closed Access