
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Network Security Evaluation and Optimal Active Defense based on Attack and Defense Game Model
Fang Li
(2023), pp. 1-7
Closed Access | Times Cited: 11
Fang Li
(2023), pp. 1-7
Closed Access | Times Cited: 11
Showing 11 citing articles:
Research on neural networks in computer network security evaluation and prediction methods
H. Wei, Xu Zhao, Baolan Shi
International Journal of Knowledge-based and Intelligent Engineering Systems (2024) Vol. 28, Iss. 3, pp. 497-516
Closed Access | Times Cited: 1
H. Wei, Xu Zhao, Baolan Shi
International Journal of Knowledge-based and Intelligent Engineering Systems (2024) Vol. 28, Iss. 3, pp. 497-516
Closed Access | Times Cited: 1
Big Data Security Evaluation by Bidirectional Analysis of Access Control Policy
Maxim Kalinin, M. A. Poltavtseva
(2024), pp. 98-103
Closed Access | Times Cited: 1
Maxim Kalinin, M. A. Poltavtseva
(2024), pp. 98-103
Closed Access | Times Cited: 1
Adaptive Decision-Making in Attack-Defense Games With Bayesian Inference of Rationality Level
Hongwei Fang, Peng Yi
IEEE Transactions on Industrial Electronics (2024) Vol. 71, Iss. 12, pp. 16558-16567
Closed Access | Times Cited: 1
Hongwei Fang, Peng Yi
IEEE Transactions on Industrial Electronics (2024) Vol. 71, Iss. 12, pp. 16558-16567
Closed Access | Times Cited: 1
Implementing Information Security Models to Reduce Cyber Security Risks in Networked Applications
Ajay Rastogi, R Raghavendra, Megha Pandeya
(2024), pp. 1-6
Closed Access
Ajay Rastogi, R Raghavendra, Megha Pandeya
(2024), pp. 1-6
Closed Access
Classification of Network Security Attack using KNN (K-Nearest Neighbour) and Comparison of different Attacks through different Machine Learning Techniques
Muskan Agarwal, Kanwarpartap Singh Gill, Rahul Chauhan, et al.
(2024), pp. 1-7
Closed Access
Muskan Agarwal, Kanwarpartap Singh Gill, Rahul Chauhan, et al.
(2024), pp. 1-7
Closed Access
A Novel Two Step Computer Network Attack and Defense Strategy
Qiaohua Bai
2022 International Conference on Inventive Computation Technologies (ICICT) (2024)
Closed Access
Qiaohua Bai
2022 International Conference on Inventive Computation Technologies (ICICT) (2024)
Closed Access
Distributed and Cooperative Security Mechanisms for Networked Applications
R. Kamalraj, Vaishali Singh, Pawan Bhambu, et al.
Lecture notes in electrical engineering (2024), pp. 546-552
Closed Access
R. Kamalraj, Vaishali Singh, Pawan Bhambu, et al.
Lecture notes in electrical engineering (2024), pp. 546-552
Closed Access
Dynamic object removal by fusing deep learning and multiview geometry
Yanli Liu, Qi Li, Heng Zhang, et al.
Cluster Computing (2024) Vol. 28, Iss. 1
Closed Access
Yanli Liu, Qi Li, Heng Zhang, et al.
Cluster Computing (2024) Vol. 28, Iss. 1
Closed Access
A probabilistic automata-based network attack-defense game model for data security by using security service chain
Hao Jan Liu, Chong Wang, Zhonghai Wu
World Wide Web (2024) Vol. 28, Iss. 1
Closed Access
Hao Jan Liu, Chong Wang, Zhonghai Wu
World Wide Web (2024) Vol. 28, Iss. 1
Closed Access
Sensor Network Security and Risk Assessment
Yaswanth Chandolu, Ehsan Sheybani
(2023)
Open Access | Times Cited: 1
Yaswanth Chandolu, Ehsan Sheybani
(2023)
Open Access | Times Cited: 1
Full Mesh Networking Technology with Peer to Peer Grid Topology based on Variable Parameter Full Dimensional Space
Wenqiang Song, Chuan He, Zhaoyang Xie, et al.
(2023), pp. 89-101
Open Access
Wenqiang Song, Chuan He, Zhaoyang Xie, et al.
(2023), pp. 89-101
Open Access