OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Privilege Escalation Attack Detection and Mitigation in Cloud Using Machine Learning
Muhammad Mehmood, Rashid Amin, Muhana Magboul Ali Muslam, et al.
IEEE Access (2023) Vol. 11, pp. 46561-46576
Open Access | Times Cited: 20

Showing 20 citing articles:

Detecting Cyber Threats With a Graph-Based NIDPS
Brendan Ooi Tze Wen, Najihah Syahriza, Nicholas Chan Wei Xian, et al.
Advances in logistics, operations, and management science book series (2023), pp. 36-74
Closed Access | Times Cited: 16

Beyond Firewall: Leveraging Machine Learning for Real-Time Insider Threats Identification and User Profiling
Saif Al-Dean Qawasmeh, Ali Abdullah S. AlQahtani
Future Internet (2025) Vol. 17, Iss. 2, pp. 93-93
Open Access

A novel ML based structure for mitigating security risks in a cloud environment
Gurjit Kaur, Gurbinder Singh Brar, Shalli Rani
AIP conference proceedings (2025) Vol. 3227, pp. 060013-060013
Closed Access

Post-Quantum Secure Identity-Based Signature Scheme with Lattice Assumption for Internet of Things Networks
Yang Zhang, Yu Tang, Chaoyang Li, et al.
Sensors (2024) Vol. 24, Iss. 13, pp. 4188-4188
Open Access | Times Cited: 4

Robust Face Recognition Under Adversarial Attack Using SARGAN Model and Improved Cross Triple MobileNetV1
Sheilla Ann B. Pacheco, Jheanel E. Estrada, Mahesh Goyani
Lecture notes in networks and systems (2025), pp. 491-510
Closed Access

Insider threat mitigation: Systematic literature review
Usman Inayat, Mashaim Farzan, Sajid Mahmood, et al.
Ain Shams Engineering Journal (2024), pp. 103068-103068
Open Access | Times Cited: 3

Organizational information security threats: Status and challenges
B. Akello
World Journal of Advanced Engineering Technology and Sciences (2024) Vol. 11, Iss. 1, pp. 148-162
Open Access | Times Cited: 2

An Online Fake Review Detection Approach Using Famous Machine Learning Algorithms
Asma Hassan Alshehri
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 2, pp. 2767-2786
Open Access | Times Cited: 1

Explorning the Role of Machine Learning in Enhancing Cloud Security
M. Amshavalli, Rajiv Kishore, S.P. Raguvijay, et al.
International Journal of Innovative Science and Research Technology (IJISRT) (2024), pp. 713-717
Open Access | Times Cited: 1

Design of an Anomaly Detection Framework for Delay and Privacy-Aware Blockchain-Based Cloud Deployments
A. Venkata Nagarjun, R. Sujatha
IEEE Access (2024) Vol. 12, pp. 84843-84862
Open Access | Times Cited: 1

Optimized Dual Access Control for Cloud-based Data Storage and Distribution using Global-Context Residual Recurrent Neural Network
Shaik Mohammad Rafi, R Yogesh, M. Sriram
Computers & Security (2024), pp. 104183-104183
Closed Access | Times Cited: 1

Tackling security and privacy challenges in the realm of big data analytics
Janet Ngesa
World Journal of Advanced Research and Reviews (2023) Vol. 21, Iss. 2, pp. 552-576
Open Access | Times Cited: 2

Emerging Cyber Risks & Threats in Healthcare Systems: A Case Study in Resilient Cybersecurity Solutions
Abdiaziz Abdi, Hajar Bennouri, Anthony Keane
2022 11th Mediterranean Conference on Embedded Computing (MECO) (2024), pp. 1-8
Closed Access

TS-AUBD: A Novel Two-Stage Method for Abnormal User Behavior Detection
Yu Cao, Yilu Chen, Ye Wang, et al.
Lecture notes in computer science (2024), pp. 17-30
Closed Access

An Approach for Intelligent Behaviour-Based Threat Modelling with Explanations
Sonu Preetam, Maxime Compastié, Vanesa Daza, et al.
(2023), pp. 197-200
Closed Access

Can artificial intelligence do the job of a theoretical physicist?
Huber Nieto–Chaupis
2019 International Conference on Electrical, Communication, and Computer Engineering (ICECCE) (2023), pp. 1-6
Closed Access

Human Versus Computer: Who Can Make Valuable Progress in Theoretical Physics?
Huber Nieto–Chaupis
(2023), pp. 83-87
Closed Access

Page 1

Scroll to top