
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Network Security Threat Detection: Leveraging Machine Learning Algorithms for Effective Prediction
Kumar T Nitesh, Akash K Thirumala, U. F. Mohammed, et al.
(2023), pp. 1-5
Closed Access | Times Cited: 5
Kumar T Nitesh, Akash K Thirumala, U. F. Mohammed, et al.
(2023), pp. 1-5
Closed Access | Times Cited: 5
Showing 5 citing articles:
Towards Autonomous Cybersecurity: A Comparative Analysis of Agnostic and Hybrid AI Approaches for Advanced Persistent Threat Detection
Adrián Hernández-Rivas, Víctor Morales-Rocha, J. Patricia Sánchez-Solís
Studies in computational intelligence (2024), pp. 181-219
Closed Access | Times Cited: 1
Adrián Hernández-Rivas, Víctor Morales-Rocha, J. Patricia Sánchez-Solís
Studies in computational intelligence (2024), pp. 181-219
Closed Access | Times Cited: 1
Opportunities and Challenges of Artificial Intelligence Applied to Identity and Access Management in Industrial Environments
Jesús Vegas, César Llamas
Future Internet (2024) Vol. 16, Iss. 12, pp. 469-469
Open Access | Times Cited: 1
Jesús Vegas, César Llamas
Future Internet (2024) Vol. 16, Iss. 12, pp. 469-469
Open Access | Times Cited: 1
Intrusion Detection Landscape: Exploring Progress and Confronting Challenges in Security Advances
Mohammed Usman F, S Pavan, M R Suhas, et al.
(2024), pp. 1-8
Closed Access
Mohammed Usman F, S Pavan, M R Suhas, et al.
(2024), pp. 1-8
Closed Access
Enhanced Network Security Protection through Data Analysis and Machine Learning: An Application of GraphSAGE for Anomaly Detection and Operational Intelligence
Yujing Lu
Journal of Computing and Information Technology (2024) Vol. 31, Iss. 4, pp. 233-249
Open Access
Yujing Lu
Journal of Computing and Information Technology (2024) Vol. 31, Iss. 4, pp. 233-249
Open Access
A Digital Twin-Based Approach for Detecting Cyber–Physical Attacks in ICS Using Knowledge Discovery
Marco Lucchese, Giuseppe Salerno, Andrea Pugliese
Applied Sciences (2024) Vol. 14, Iss. 19, pp. 8665-8665
Open Access
Marco Lucchese, Giuseppe Salerno, Andrea Pugliese
Applied Sciences (2024) Vol. 14, Iss. 19, pp. 8665-8665
Open Access