
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Fine-Grained System Driven of Attacks Over Several New Representation Techniques Using Machine Learning
Mohammed A. Al Ghamdi
IEEE Access (2023) Vol. 11, pp. 96615-96625
Open Access | Times Cited: 7
Mohammed A. Al Ghamdi
IEEE Access (2023) Vol. 11, pp. 96615-96625
Open Access | Times Cited: 7
Showing 7 citing articles:
Evaluating machine learning models for predictive accuracy in cryptocurrency price forecasting
Shavez Mushtaq Qureshi, Atif Saeed, Farooq Ahmad, et al.
PeerJ Computer Science (2025) Vol. 11, pp. e2626-e2626
Open Access
Shavez Mushtaq Qureshi, Atif Saeed, Farooq Ahmad, et al.
PeerJ Computer Science (2025) Vol. 11, pp. e2626-e2626
Open Access
Enhancing Intrusion Detection by Using Machine Learning
Abdul Rahman Khan, Parma Nand, Bharat Bhushan, et al.
Lecture notes in networks and systems (2025), pp. 699-712
Closed Access
Abdul Rahman Khan, Parma Nand, Bharat Bhushan, et al.
Lecture notes in networks and systems (2025), pp. 699-712
Closed Access
An Efficient Routing Scheme Based on Node Density for Underwater Acoustic Sensors Networks
Rooh Ullah, Beenish Ayesha Akram, Amna Zafar, et al.
KSII Transactions on Internet and Information Systems (2024) Vol. 18, Iss. 5
Open Access | Times Cited: 1
Rooh Ullah, Beenish Ayesha Akram, Amna Zafar, et al.
KSII Transactions on Internet and Information Systems (2024) Vol. 18, Iss. 5
Open Access | Times Cited: 1
An innovative approach and evaluation of contemporary intrusion detection systems
Sureswar Reddy Dronadula, Stephen M. Sagar, D N Gandhi, et al.
Journal of Cyber Security Technology (2024), pp. 1-44
Closed Access | Times Cited: 1
Sureswar Reddy Dronadula, Stephen M. Sagar, D N Gandhi, et al.
Journal of Cyber Security Technology (2024), pp. 1-44
Closed Access | Times Cited: 1
Network Intrusion Detection System using Random Forest and Gradient Boosting Machines
Indira Bharathi, Rohan Makhija
(2024), pp. 1-5
Closed Access
Indira Bharathi, Rohan Makhija
(2024), pp. 1-5
Closed Access
Intermediary Decentralized Computing and Private Blockchain Mechanisms for Privacy Preservation in the Internet of Medical Things
Rasha Halim Razzaq, Mishall Al-Zubaidie, Rajaa Ghali Atiyah
Deleted Journal (2024) Vol. 4, Iss. 3, pp. 152-165
Open Access
Rasha Halim Razzaq, Mishall Al-Zubaidie, Rajaa Ghali Atiyah
Deleted Journal (2024) Vol. 4, Iss. 3, pp. 152-165
Open Access
Analyze textual data: deep neural network for adversarial inversion attack in wireless networks
Mohammed A. Al Ghamdi
SN Applied Sciences (2023) Vol. 5, Iss. 12
Open Access | Times Cited: 1
Mohammed A. Al Ghamdi
SN Applied Sciences (2023) Vol. 5, Iss. 12
Open Access | Times Cited: 1