OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Showing 11 citing articles:

Research on neural networks in computer network security evaluation and prediction methods
H. Wei, Xu Zhao, Baolan Shi
International Journal of Knowledge-based and Intelligent Engineering Systems (2024) Vol. 28, Iss. 3, pp. 497-516
Closed Access | Times Cited: 1

Big Data Security Evaluation by Bidirectional Analysis of Access Control Policy
Maxim Kalinin, M. A. Poltavtseva
(2024), pp. 98-103
Closed Access | Times Cited: 1

Adaptive Decision-Making in Attack-Defense Games With Bayesian Inference of Rationality Level
Hongwei Fang, Peng Yi
IEEE Transactions on Industrial Electronics (2024) Vol. 71, Iss. 12, pp. 16558-16567
Closed Access | Times Cited: 1

Implementing Information Security Models to Reduce Cyber Security Risks in Networked Applications
Ajay Rastogi, R Raghavendra, Megha Pandeya
(2024), pp. 1-6
Closed Access

A Novel Two Step Computer Network Attack and Defense Strategy
Qiaohua Bai
2022 International Conference on Inventive Computation Technologies (ICICT) (2024)
Closed Access

Distributed and Cooperative Security Mechanisms for Networked Applications
R. Kamalraj, Vaishali Singh, Pawan Bhambu, et al.
Lecture notes in electrical engineering (2024), pp. 546-552
Closed Access

Dynamic object removal by fusing deep learning and multiview geometry
Yanli Liu, Qi Li, Heng Zhang, et al.
Cluster Computing (2024) Vol. 28, Iss. 1
Closed Access

A probabilistic automata-based network attack-defense game model for data security by using security service chain
Hao Jan Liu, Chong Wang, Zhonghai Wu
World Wide Web (2024) Vol. 28, Iss. 1
Closed Access

Sensor Network Security and Risk Assessment
Yaswanth Chandolu, Ehsan Sheybani
(2023)
Open Access | Times Cited: 1

Page 1

Scroll to top