OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Harnessing the Speed and Accuracy of Machine Learning to Advance Cybersecurity
Rebet Jones, Marwan Omar, Derek Mohammed, et al.
(2023), pp. 418-421
Closed Access | Times Cited: 31

Showing 1-25 of 31 citing articles:

Foundations of Large Language Models in Software Vulnerability Detection
Hewa Majeed Zangana, Derek Mohammed
Advances in information security, privacy, and ethics book series (2024), pp. 41-74
Closed Access | Times Cited: 15

Harnessing the Power of Large Language Models for Cybersecurity
Hewa Majeed Zangana, Marwan Omar
Advances in information security, privacy, and ethics book series (2024), pp. 1-40
Closed Access | Times Cited: 14

Secure Authentication and Identity Management With AI
Derek Mohammed, Helen MacLennan
Advances in computational intelligence and robotics book series (2025), pp. 271-306
Closed Access

AI Automated Incident Response and Threat Mitigation Using AI
Rebet Jones
Advances in computational intelligence and robotics book series (2025), pp. 201-236
Closed Access

Malware Analysis and Classification Using Deep Learning
Rebet Jones
Advances in computational intelligence and robotics book series (2025), pp. 165-200
Closed Access

Phishing and Social Engineering Attack Prevention With LLMs
Hermano Jorge Da Silva De Queiroz
Advances in computational intelligence and robotics book series (2025), pp. 133-164
Closed Access

Threat Detection and Anomaly Identification Using Deep Learning
Hermano Jorge Da Silva De Queiroz, Helen MacLennan
Advances in computational intelligence and robotics book series (2025), pp. 65-96
Closed Access

Foundations of Deep Learning and Large Language Models in Cybersecurity
Hewa Majeed Zangana, Marwan Omar, Jamal N. Al-Karaki
Advances in computational intelligence and robotics book series (2025), pp. 1-36
Closed Access

Integration of LLMs With Traditional Security Tools
Rebet Jones, A. Jones
Advances in information security, privacy, and ethics book series (2024), pp. 295-334
Closed Access | Times Cited: 3

Introduction to Artificial Intelligence in Cybersecurity and Forensic Science
Hewa Majeed Zangana, Marwan Omar, Derek Mohammed
Advances in information security, privacy, and ethics book series (2024), pp. 1-24
Closed Access | Times Cited: 3

Automated Evidence Collection and Analysis Using AI
Luay Albtosh
Advances in information security, privacy, and ethics book series (2024), pp. 143-186
Closed Access | Times Cited: 2

Digital Forensic Data Mining and Pattern Recognition
Luay Albtosh
Advances in information security, privacy, and ethics book series (2024), pp. 245-294
Closed Access | Times Cited: 1

Network Forensics and Traffic Analysis With Machine Learning
Yara Shamoo
Advances in information security, privacy, and ethics book series (2024), pp. 79-116
Closed Access | Times Cited: 1

Behavioral Analysis and User Profiling in Forensic Investigations
A. Jones, Bianca Montes Jones
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 247-280
Closed Access | Times Cited: 1

Future Trends in AI and Digital Forensics
Hewa Majeed Zangana, Shuai Li
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 347-380
Closed Access | Times Cited: 1

Combatting Deepfakes
Ngozi Tracy Aleke
Advances in information security, privacy, and ethics book series (2024), pp. 375-412
Closed Access | Times Cited: 1

Advances in Cybersecurity and AI: Integrating Machine Learning, IoT, and Smart Systems for Resilience and Innovation Across Domains
Yara Shamoo
World Journal of Advanced Research and Reviews (2024) Vol. 23, Iss. 2, pp. 2450-2461
Open Access

Comparative Analysis of LLMs vs. Traditional Methods in Vulnerability Detection
Yara Shamoo
Advances in information security, privacy, and ethics book series (2024), pp. 335-374
Closed Access

Performance Evaluation of LLM-Based Security Systems
Yara Shamoo
Advances in information security, privacy, and ethics book series (2024), pp. 131-166
Closed Access

Ethical Considerations in the Use of LLMs for Vulnerability Detection
Luay Albtosh
Advances in information security, privacy, and ethics book series (2024), pp. 263-294
Closed Access

Challenges and Limitations of Using LLMs in Software Security
Luay Albtosh
Advances in information security, privacy, and ethics book series (2024), pp. 439-464
Closed Access

Techniques and Approaches for Leveraging LLMs in Security Analysis
Rebet Jones
Advances in information security, privacy, and ethics book series (2024), pp. 75-104
Closed Access

Using Natural Language Processing (NLP) for Phishing and Spam Detection
Yara Shamoo
Advances in information security, privacy, and ethics book series (2024), pp. 55-78
Closed Access

Adversarial Attacks and Defense Mechanisms in the Age of Quantum Computing
Yara Shamoo
Advances in information security, privacy, and ethics book series (2024), pp. 301-344
Closed Access

The Future of Cybersecurity Integrating LLMs With Quantum Computing for Autonomous Defense Systems
Yara Shamoo
Advances in information security, privacy, and ethics book series (2024), pp. 389-420
Closed Access

Page 1 - Next Page

Scroll to top