
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Advances and Vulnerabilities in Modern Cryptographic Techniques: A Comprehensive Survey on Cybersecurity in the Domain of Machine/Deep Learning and Quantum Techniques
Abid Mehmood, Arslan Shafique, Moatsum Alawida, et al.
IEEE Access (2024) Vol. 12, pp. 27530-27555
Open Access | Times Cited: 17
Abid Mehmood, Arslan Shafique, Moatsum Alawida, et al.
IEEE Access (2024) Vol. 12, pp. 27530-27555
Open Access | Times Cited: 17
Showing 17 citing articles:
A novel 2D Log-Logistic–Sine chaotic map for image encryption
Mengmeng Wang, Xin-guang Song, Si-hang Liu, et al.
Nonlinear Dynamics (2024)
Closed Access | Times Cited: 7
Mengmeng Wang, Xin-guang Song, Si-hang Liu, et al.
Nonlinear Dynamics (2024)
Closed Access | Times Cited: 7
AI-driven fusion with cybersecurity: Exploring current trends, advanced techniques, future directions, and policy implications for evolving paradigms– A comprehensive review
Sijjad Ali, Jia Wang, Victor Chung Ming Leung
Information Fusion (2025), pp. 102922-102922
Closed Access
Sijjad Ali, Jia Wang, Victor Chung Ming Leung
Information Fusion (2025), pp. 102922-102922
Closed Access
Lightweight image encryption scheme for IoT environment and machine learning-driven robust S-box selection
Arslan Shafique, Abid Mehmood, Moatsum Alawida, et al.
Telecommunication Systems (2025) Vol. 88, Iss. 1
Open Access
Arslan Shafique, Abid Mehmood, Moatsum Alawida, et al.
Telecommunication Systems (2025) Vol. 88, Iss. 1
Open Access
Cyber Security in Healthcare Systems: A Review of Tools and Attack Mitigation Techniques
Kousik Barik, Sanjay Misra, Sabarathinam Chockalingam
Communications in computer and information science (2025), pp. 87-105
Closed Access
Kousik Barik, Sanjay Misra, Sabarathinam Chockalingam
Communications in computer and information science (2025), pp. 87-105
Closed Access
VLSI architecture of a True Random Number Generator with hierarchical Von Neumann corrector and hybrid run length-Golomb coding for data compression
G. Manavaalan, Sankar Jayaram, S. Gunasekaran
Analog Integrated Circuits and Signal Processing (2025) Vol. 123, Iss. 3
Closed Access
G. Manavaalan, Sankar Jayaram, S. Gunasekaran
Analog Integrated Circuits and Signal Processing (2025) Vol. 123, Iss. 3
Closed Access
Cyberspace enhancement of electric vehicle charging stations in smart grids based on detection and resilience measures against hybrid cyberattacks: A multi-agent deep reinforcement learning approach
Ali Rashid Ramul, Atefeh Salimi Shahraki, Naseer K. Bachache, et al.
Energy (2025), pp. 136038-136038
Closed Access
Ali Rashid Ramul, Atefeh Salimi Shahraki, Naseer K. Bachache, et al.
Energy (2025), pp. 136038-136038
Closed Access
Robust Encryption Framework for IoT Devices Based on Bit-plane Extraction, Chaotic Sine Models, and Quantum Operations
Mujeeb Ur Rehman, Arslan Shafqiue
Internet of Things (2024) Vol. 27, pp. 101241-101241
Open Access | Times Cited: 3
Mujeeb Ur Rehman, Arslan Shafqiue
Internet of Things (2024) Vol. 27, pp. 101241-101241
Open Access | Times Cited: 3
A chaotic image encryption algorithm based on sliding window and pseudo-random stack shuffling
Pengfei Cao, Lin Teng
Nonlinear Dynamics (2024) Vol. 112, Iss. 15, pp. 13539-13569
Closed Access | Times Cited: 2
Pengfei Cao, Lin Teng
Nonlinear Dynamics (2024) Vol. 112, Iss. 15, pp. 13539-13569
Closed Access | Times Cited: 2
Cryptanalysis of substitution-permutation network based image encryption schemes: a systematic review
Sakshi Dhall, Khushboo Yadav
Nonlinear Dynamics (2024) Vol. 112, Iss. 17, pp. 14719-14744
Closed Access | Times Cited: 2
Sakshi Dhall, Khushboo Yadav
Nonlinear Dynamics (2024) Vol. 112, Iss. 17, pp. 14719-14744
Closed Access | Times Cited: 2
Generative AI in Network Security and Intrusion Detection
Siva Raja Sindiramutty, Krishna Raj V. Prabagaran, N. Z. Jhanjhi, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 77-124
Closed Access | Times Cited: 1
Siva Raja Sindiramutty, Krishna Raj V. Prabagaran, N. Z. Jhanjhi, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 77-124
Closed Access | Times Cited: 1
Enhancing Internet of Things communications: Development of a new S-box and multi-layer encryption framework
Adel R. Alharbi, Amer Aljaedi, Abdullah Aljuhni, et al.
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 10, pp. 102265-102265
Open Access | Times Cited: 1
Adel R. Alharbi, Amer Aljaedi, Abdullah Aljuhni, et al.
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 10, pp. 102265-102265
Open Access | Times Cited: 1
Survey on medical image encryption: From classical to deep learning-based approaches
Shiv Prasad, Amit Kumar Singh
Computers & Electrical Engineering (2024) Vol. 123, pp. 110011-110011
Closed Access | Times Cited: 1
Shiv Prasad, Amit Kumar Singh
Computers & Electrical Engineering (2024) Vol. 123, pp. 110011-110011
Closed Access | Times Cited: 1
Quantum Computing and Machine Learning for Advanced Cybersecurity Solutions
S. Deepajothi, Caroline Selvi, P. Shanmugaraja, et al.
Advances in computer and electrical engineering book series (2024), pp. 309-338
Closed Access
S. Deepajothi, Caroline Selvi, P. Shanmugaraja, et al.
Advances in computer and electrical engineering book series (2024), pp. 309-338
Closed Access
A hybrid encryption framework leveraging quantum and classical cryptography for secure transmission of medical images in IoT-based telemedicine networks
Arslan Shafique, Syed Naqvi, Ali Raza, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
Arslan Shafique, Syed Naqvi, Ali Raza, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
Quantum Machine Learning for Enhanced Cybersecurity: Proposing a Hypothetical Framework for Next-Generation Security Solutions
Md. Forhad Hossain, Kamrul Hasan, Al Amin, et al.
Journal of Technologies Information and Communication (2024) Vol. 4, Iss. 1, pp. 32222-32222
Closed Access
Md. Forhad Hossain, Kamrul Hasan, Al Amin, et al.
Journal of Technologies Information and Communication (2024) Vol. 4, Iss. 1, pp. 32222-32222
Closed Access
Counter-Offset mode: A new paradigm in resisting differential cryptanalysis
Faisal Muhammad, Nawaz Yasir
Trends in Computer Science and Information Technology (2024) Vol. 9, Iss. 1, pp. 034-041
Open Access
Faisal Muhammad, Nawaz Yasir
Trends in Computer Science and Information Technology (2024) Vol. 9, Iss. 1, pp. 034-041
Open Access
Exploring the Frontier
Navya Sree Anagani, Rajesh Doriya, Chandrasekhar Jatoth
Advances in information security, privacy, and ethics book series (2024), pp. 1-36
Closed Access
Navya Sree Anagani, Rajesh Doriya, Chandrasekhar Jatoth
Advances in information security, privacy, and ethics book series (2024), pp. 1-36
Closed Access