
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Data-Driven Cybersecurity Incident Prediction: A Survey
Nan Sun, Jun Zhang, Paul Rimba, et al.
IEEE Communications Surveys & Tutorials (2018) Vol. 21, Iss. 2, pp. 1744-1772
Closed Access | Times Cited: 285
Nan Sun, Jun Zhang, Paul Rimba, et al.
IEEE Communications Surveys & Tutorials (2018) Vol. 21, Iss. 2, pp. 1744-1772
Closed Access | Times Cited: 285
Showing 1-25 of 285 citing articles:
Cybersecurity data science: an overview from machine learning perspective
Iqbal H. Sarker, A. S. M. Kayes, Shahriar Badsha, et al.
Journal Of Big Data (2020) Vol. 7, Iss. 1
Open Access | Times Cited: 474
Iqbal H. Sarker, A. S. M. Kayes, Shahriar Badsha, et al.
Journal Of Big Data (2020) Vol. 7, Iss. 1
Open Access | Times Cited: 474
AI-Driven Cybersecurity: An Overview, Security Intelligence Modeling and Research Directions
Iqbal H. Sarker, Md Hasan Furhad, Raza Nowrozy
SN Computer Science (2021) Vol. 2, Iss. 3
Open Access | Times Cited: 340
Iqbal H. Sarker, Md Hasan Furhad, Raza Nowrozy
SN Computer Science (2021) Vol. 2, Iss. 3
Open Access | Times Cited: 340
Software Vulnerability Detection Using Deep Neural Networks: A Survey
Guanjun Lin, Sheng Wen, Qing‐Long Han, et al.
Proceedings of the IEEE (2020) Vol. 108, Iss. 10, pp. 1825-1848
Closed Access | Times Cited: 339
Guanjun Lin, Sheng Wen, Qing‐Long Han, et al.
Proceedings of the IEEE (2020) Vol. 108, Iss. 10, pp. 1825-1848
Closed Access | Times Cited: 339
Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey
Jun Zhang, Lei Pan, Qing‐Long Han, et al.
IEEE/CAA Journal of Automatica Sinica (2021) Vol. 9, Iss. 3, pp. 377-391
Closed Access | Times Cited: 275
Jun Zhang, Lei Pan, Qing‐Long Han, et al.
IEEE/CAA Journal of Automatica Sinica (2021) Vol. 9, Iss. 3, pp. 377-391
Closed Access | Times Cited: 275
A Survey of IoT Applications in Blockchain Systems
Laphou Lao, Zecheng Li, Songlin Hou, et al.
ACM Computing Surveys (2020) Vol. 53, Iss. 1, pp. 1-32
Closed Access | Times Cited: 266
Laphou Lao, Zecheng Li, Songlin Hou, et al.
ACM Computing Surveys (2020) Vol. 53, Iss. 1, pp. 1-32
Closed Access | Times Cited: 266
A Survey of Android Malware Detection with Deep Neural Models
Junyang Qiu, Jun Zhang, Wei Luo, et al.
ACM Computing Surveys (2020) Vol. 53, Iss. 6, pp. 1-36
Closed Access | Times Cited: 241
Junyang Qiu, Jun Zhang, Wei Luo, et al.
ACM Computing Surveys (2020) Vol. 53, Iss. 6, pp. 1-36
Closed Access | Times Cited: 241
IntruDTree: A Machine Learning Based Cyber Security Intrusion Detection Model
Iqbal H. Sarker, Yoosef B. Abushark, Fawaz Alsolami, et al.
Symmetry (2020) Vol. 12, Iss. 5, pp. 754-754
Open Access | Times Cited: 234
Iqbal H. Sarker, Yoosef B. Abushark, Fawaz Alsolami, et al.
Symmetry (2020) Vol. 12, Iss. 5, pp. 754-754
Open Access | Times Cited: 234
Combining Graph-Based Learning With Automated Data Collection for Code Vulnerability Detection
Huanting Wang, Guixin Ye, Zhanyong Tang, et al.
IEEE Transactions on Information Forensics and Security (2020) Vol. 16, pp. 1943-1958
Open Access | Times Cited: 213
Huanting Wang, Guixin Ye, Zhanyong Tang, et al.
IEEE Transactions on Information Forensics and Security (2020) Vol. 16, pp. 1943-1958
Open Access | Times Cited: 213
Deep Cybersecurity: A Comprehensive Overview from Neural Network and Deep Learning Perspective
Iqbal H. Sarker
SN Computer Science (2021) Vol. 2, Iss. 3
Open Access | Times Cited: 165
Iqbal H. Sarker
SN Computer Science (2021) Vol. 2, Iss. 3
Open Access | Times Cited: 165
MapReduce based intelligent model for intrusion detection using machine learning technique
Muhammad Asif, Sagheer Abbas, Muhammad Adnan Khan, et al.
Journal of King Saud University - Computer and Information Sciences (2021) Vol. 34, Iss. 10, pp. 9723-9731
Open Access | Times Cited: 148
Muhammad Asif, Sagheer Abbas, Muhammad Adnan Khan, et al.
Journal of King Saud University - Computer and Information Sciences (2021) Vol. 34, Iss. 10, pp. 9723-9731
Open Access | Times Cited: 148
Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives
Nan Sun, Ming Ding, Jiaojiao Jiang, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 3, pp. 1748-1774
Open Access | Times Cited: 104
Nan Sun, Ming Ding, Jiaojiao Jiang, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 3, pp. 1748-1774
Open Access | Times Cited: 104
A survey on deep learning for cybersecurity: Progress, challenges, and opportunities
Mayra Macas, Chunming Wu, Walter Fuertes
Computer Networks (2022) Vol. 212, pp. 109032-109032
Closed Access | Times Cited: 94
Mayra Macas, Chunming Wu, Walter Fuertes
Computer Networks (2022) Vol. 212, pp. 109032-109032
Closed Access | Times Cited: 94
Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning—A Review
Mostofa Ahsan, Kendall E. Nygard, Rahul Gomes, et al.
Journal of Cybersecurity and Privacy (2022) Vol. 2, Iss. 3, pp. 527-555
Open Access | Times Cited: 92
Mostofa Ahsan, Kendall E. Nygard, Rahul Gomes, et al.
Journal of Cybersecurity and Privacy (2022) Vol. 2, Iss. 3, pp. 527-555
Open Access | Times Cited: 92
Detecting Vulnerability on IoT Device Firmware: A Survey
Xiaotao Feng, Xiaogang Zhu, Qing‐Long Han, et al.
IEEE/CAA Journal of Automatica Sinica (2022) Vol. 10, Iss. 1, pp. 25-41
Closed Access | Times Cited: 78
Xiaotao Feng, Xiaogang Zhu, Qing‐Long Han, et al.
IEEE/CAA Journal of Automatica Sinica (2022) Vol. 10, Iss. 1, pp. 25-41
Closed Access | Times Cited: 78
Networking Architecture and Key Supporting Technologies for Human Digital Twin in Personalized Healthcare: A Comprehensive Survey
Jiayuan Chen, Changyan Yi, Samuel D. Okegbile, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 26, Iss. 1, pp. 706-746
Open Access | Times Cited: 58
Jiayuan Chen, Changyan Yi, Samuel D. Okegbile, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 26, Iss. 1, pp. 706-746
Open Access | Times Cited: 58
Secure and privacy-preserving intrusion detection in wireless sensor networks: Federated learning with SCNN-Bi-LSTM for enhanced reliability
Syed Muhammad Salman Bukhari, Muhammad Hamza Zafar, Mohamad Abou Houran, et al.
Ad Hoc Networks (2024) Vol. 155, pp. 103407-103407
Open Access | Times Cited: 46
Syed Muhammad Salman Bukhari, Muhammad Hamza Zafar, Mohamad Abou Houran, et al.
Ad Hoc Networks (2024) Vol. 155, pp. 103407-103407
Open Access | Times Cited: 46
Leveraging AI/ML for anomaly detection, threat prediction, and automated response
Olakunle Abayomi Ajala, Olusegun Abiodun Balogun
World Journal of Advanced Research and Reviews (2024) Vol. 21, Iss. 1, pp. 2584-2598
Open Access | Times Cited: 20
Olakunle Abayomi Ajala, Olusegun Abiodun Balogun
World Journal of Advanced Research and Reviews (2024) Vol. 21, Iss. 1, pp. 2584-2598
Open Access | Times Cited: 20
An innovative approach for real-time network traffic classification
Klenilmar Lopes Dias, Mateus Almeida Pongelupe, Walmir M. Caminhas, et al.
Computer Networks (2019) Vol. 158, pp. 143-157
Closed Access | Times Cited: 111
Klenilmar Lopes Dias, Mateus Almeida Pongelupe, Walmir M. Caminhas, et al.
Computer Networks (2019) Vol. 158, pp. 143-157
Closed Access | Times Cited: 111
Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments
Wenjuan Li, Weizhi Meng, Man Ho Au
Journal of Network and Computer Applications (2020) Vol. 161, pp. 102631-102631
Closed Access | Times Cited: 110
Wenjuan Li, Weizhi Meng, Man Ho Au
Journal of Network and Computer Applications (2020) Vol. 161, pp. 102631-102631
Closed Access | Times Cited: 110
Software Vulnerability Discovery via Learning Multi-Domain Knowledge Bases
Guanjun Lin, Jun Zhang, Wei Luo, et al.
IEEE Transactions on Dependable and Secure Computing (2019) Vol. 18, Iss. 5, pp. 2469-2485
Closed Access | Times Cited: 100
Guanjun Lin, Jun Zhang, Wei Luo, et al.
IEEE Transactions on Dependable and Secure Computing (2019) Vol. 18, Iss. 5, pp. 2469-2485
Closed Access | Times Cited: 100
DeepBalance: Deep-Learning and Fuzzy Oversampling for Vulnerability Detection
Shigang Liu, Guanjun Lin, Qing‐Long Han, et al.
IEEE Transactions on Fuzzy Systems (2019), pp. 1-1
Closed Access | Times Cited: 100
Shigang Liu, Guanjun Lin, Qing‐Long Han, et al.
IEEE Transactions on Fuzzy Systems (2019), pp. 1-1
Closed Access | Times Cited: 100
Data-Driven Cyber Security in Perspective—Intelligent Traffic Analysis
Rory Coulter, Qing‐Long Han, Lei Pan, et al.
IEEE Transactions on Cybernetics (2019) Vol. 50, Iss. 7, pp. 3081-3093
Closed Access | Times Cited: 99
Rory Coulter, Qing‐Long Han, Lei Pan, et al.
IEEE Transactions on Cybernetics (2019) Vol. 50, Iss. 7, pp. 3081-3093
Closed Access | Times Cited: 99
Cyber Resilience in Healthcare Digital Twin on Lung Cancer
Jun Zhang, Lin Li, Guanjun Lin, et al.
IEEE Access (2020) Vol. 8, pp. 201900-201913
Open Access | Times Cited: 97
Jun Zhang, Lin Li, Guanjun Lin, et al.
IEEE Access (2020) Vol. 8, pp. 201900-201913
Open Access | Times Cited: 97
HinCTI: A Cyber Threat Intelligence Modeling and Identification System Based on Heterogeneous Information Network
Yali Gao, Xiaoyong Li, Hao Peng, et al.
IEEE Transactions on Knowledge and Data Engineering (2020) Vol. 34, Iss. 2, pp. 708-722
Open Access | Times Cited: 92
Yali Gao, Xiaoyong Li, Hao Peng, et al.
IEEE Transactions on Knowledge and Data Engineering (2020) Vol. 34, Iss. 2, pp. 708-722
Open Access | Times Cited: 92
Machine Learning–based Cyber Attacks Targeting on Controlled Information
Yuantian Miao, Chao Chen, Lei Pan, et al.
ACM Computing Surveys (2021) Vol. 54, Iss. 7, pp. 1-36
Open Access | Times Cited: 87
Yuantian Miao, Chao Chen, Lei Pan, et al.
ACM Computing Surveys (2021) Vol. 54, Iss. 7, pp. 1-36
Open Access | Times Cited: 87