
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Enhancing Cybersecurity in the Internet of Things Environment Using Bald Eagle Search Optimization With Hybrid Deep Learning
Louai A. Maghrabi, Sahar Shabanah, Turki Althaqafi, et al.
IEEE Access (2024) Vol. 12, pp. 8337-8345
Open Access | Times Cited: 9
Louai A. Maghrabi, Sahar Shabanah, Turki Althaqafi, et al.
IEEE Access (2024) Vol. 12, pp. 8337-8345
Open Access | Times Cited: 9
Showing 9 citing articles:
Demystifying ChatGPT: An In-depth Survey of OpenAI’s Robust Large Language Models
Pronaya Bhattacharya, Vivek Kumar Prasad, Ashwin Verma, et al.
Archives of Computational Methods in Engineering (2024)
Closed Access | Times Cited: 10
Pronaya Bhattacharya, Vivek Kumar Prasad, Ashwin Verma, et al.
Archives of Computational Methods in Engineering (2024)
Closed Access | Times Cited: 10
Bald eagle search algorithm: a comprehensive review with its variants and applications
M.A. El‐Shorbagy, Anas Bouaouda, Hossam A. Nabwey, et al.
Systems Science & Control Engineering (2024) Vol. 12, Iss. 1
Open Access | Times Cited: 9
M.A. El‐Shorbagy, Anas Bouaouda, Hossam A. Nabwey, et al.
Systems Science & Control Engineering (2024) Vol. 12, Iss. 1
Open Access | Times Cited: 9
Kavitha Dhanushkodi, Kiruthika Venkataramani, N. R., et al.
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 1
Closed Access
DeepGuard: real-time threat recognition using Golden Jackal optimization with deep learning model
Fatma S. Alrayes, Hamed Alqahtani, Wahida Mansouri, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Fatma S. Alrayes, Hamed Alqahtani, Wahida Mansouri, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
The Rise and Advancement
Sharon L. Burton
Advances in logistics, operations, and management science book series (2024), pp. 259-302
Closed Access
Sharon L. Burton
Advances in logistics, operations, and management science book series (2024), pp. 259-302
Closed Access
Matrix Profile Based Algorithms Using Self-Collected Data for Detecting DDoS Attacks in loT Equipment
Fahri Sinan, Ramin Fuladi, Emin Anarım
(2024) Vol. 2, pp. 135-139
Closed Access
Fahri Sinan, Ramin Fuladi, Emin Anarım
(2024) Vol. 2, pp. 135-139
Closed Access
Blockchain-assisted improved interval type-2 fuzzy deep learning-based attack detection on internet of things driven consumer electronics
Rana Alabdan, Bayan Alabduallah, Nuha Alruwais, et al.
Alexandria Engineering Journal (2024) Vol. 110, pp. 153-167
Open Access
Rana Alabdan, Bayan Alabduallah, Nuha Alruwais, et al.
Alexandria Engineering Journal (2024) Vol. 110, pp. 153-167
Open Access
Enhancing Industrial-IoT Cybersecurity Through Generative Models and Convolutional Neural Networks
Karima Hassini, Mohamed Lazaar
Lecture notes in networks and systems (2024), pp. 543-558
Closed Access
Karima Hassini, Mohamed Lazaar
Lecture notes in networks and systems (2024), pp. 543-558
Closed Access
Exploring the Impact of Time Management Skills on Academic Achievement with an XGBC Model and Metaheuristic Algorithm
Songyang Li
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 7
Open Access
Songyang Li
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 7
Open Access
Improved perturbation based hybrid firefly algorithm and long short-term memory based intelligent security model for IoT network intrusion detection
Janmenjoy Nayak, Pooja Puspita Priyadarshani, Pandit Byomakesha Dash
Computers & Electrical Engineering (2024) Vol. 121, pp. 109926-109926
Closed Access
Janmenjoy Nayak, Pooja Puspita Priyadarshani, Pandit Byomakesha Dash
Computers & Electrical Engineering (2024) Vol. 121, pp. 109926-109926
Closed Access