
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Understanding the Threat Posed by Chinese Cyber Warfare Units
Nachaat Mohamed, Saif Khameis Almazrouei, Adel Oubelaid, et al.
(2023)
Closed Access | Times Cited: 9
Nachaat Mohamed, Saif Khameis Almazrouei, Adel Oubelaid, et al.
(2023)
Closed Access | Times Cited: 9
Showing 9 citing articles:
Smart Energy Meets Smart Security: A Comprehensive Review of AI Applications in Cybersecurity for Renewable Energy Systems
Nachaat Mohamed, Mohamed El-Guindy El-Guindy, Adel Oubelaid, et al.
International Journal of Electrical and Electronics Research (2023) Vol. 11, Iss. 3, pp. 728-732
Open Access | Times Cited: 8
Nachaat Mohamed, Mohamed El-Guindy El-Guindy, Adel Oubelaid, et al.
International Journal of Electrical and Electronics Research (2023) Vol. 11, Iss. 3, pp. 728-732
Open Access | Times Cited: 8
Comprehensive Review of Advanced Machine Learning Techniques for Detecting and Mitigating Zero-Day Exploits
Nachaat Mohamed, Hamed Taherdoost, Mitra Madanchian
ICST Transactions on Scalable Information Systems (2024) Vol. 11
Open Access | Times Cited: 1
Nachaat Mohamed, Hamed Taherdoost, Mitra Madanchian
ICST Transactions on Scalable Information Systems (2024) Vol. 11
Open Access | Times Cited: 1
Navigating Data Secrecy Challenges: A Study on Cyberespionage Intentions in the WFH Era
Irza Hanie Abu Samah, Azlineer Sarip, Ma Kalthum Ishak, et al.
Journal of The Institution of Engineers (India) Series B (2024) Vol. 105, Iss. 4, pp. 941-957
Closed Access
Irza Hanie Abu Samah, Azlineer Sarip, Ma Kalthum Ishak, et al.
Journal of The Institution of Engineers (India) Series B (2024) Vol. 105, Iss. 4, pp. 941-957
Closed Access
An Analysis of Cyberwarfare Attribution Techniques and Challenges
Clementine Swate, Siphesihle Philezwini Sithungu, Khutso Lebea
European Conference on Cyber Warfare and Security (2024) Vol. 23, Iss. 1, pp. 552-559
Open Access
Clementine Swate, Siphesihle Philezwini Sithungu, Khutso Lebea
European Conference on Cyber Warfare and Security (2024) Vol. 23, Iss. 1, pp. 552-559
Open Access
Review on Machine Learning for Zero-Day Exploit Detection and Response
Nachaat Mohamed, Hamed Taherdoost, Mitra Madanchian
EAI/Springer Innovations in Communication and Computing (2024), pp. 163-176
Closed Access
Nachaat Mohamed, Hamed Taherdoost, Mitra Madanchian
EAI/Springer Innovations in Communication and Computing (2024), pp. 163-176
Closed Access
A Review of AI in Spear Phishing Defense: Detecting and Thwarting Advanced Email Threats
Nachaat Mohamed, Hamed Taherdoost, Osama A. Khashan
EAI/Springer Innovations in Communication and Computing (2024), pp. 177-189
Closed Access
Nachaat Mohamed, Hamed Taherdoost, Osama A. Khashan
EAI/Springer Innovations in Communication and Computing (2024), pp. 177-189
Closed Access
Renewable Energy in the Age of AI: Cybersecurity Challenges and Opportunities
Nachaat Mohamed
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2024), pp. 1-6
Closed Access
Nachaat Mohamed
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2024), pp. 1-6
Closed Access
Enhancing Spear Phishing Defense with AI: A Comprehensive Review and Future Directions
Nachaat Mohamed, Hamed Taherdoost, Mitra Madanchian
ICST Transactions on Scalable Information Systems (2024) Vol. 11
Open Access
Nachaat Mohamed, Hamed Taherdoost, Mitra Madanchian
ICST Transactions on Scalable Information Systems (2024) Vol. 11
Open Access
Employing AI-Driven Drones and Advanced Cyber Penetration Tools for Breakthrough Criminal Network Surveillance
Nachaat Mohamed, Abdussalam Ali Ahmed, Abdulgader Alsharif, et al.
(2023)
Closed Access
Nachaat Mohamed, Abdussalam Ali Ahmed, Abdulgader Alsharif, et al.
(2023)
Closed Access