OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Novel Graph-Based Descriptor for the Detection of Billing-Related Anomalies in Cellular Mobile Networks
Stavros Papadopoulos, Anastasios Drosou, Dimitrios Tzovaras
IEEE Transactions on Mobile Computing (2016) Vol. 15, Iss. 11, pp. 2655-2668
Closed Access | Times Cited: 23

Showing 23 citing articles:

Deep Learning-Based DDoS-Attack Detection for Cyber–Physical System Over 5G Network
Bilal Hussain, Qinghe Du, Bo Sun, et al.
IEEE Transactions on Industrial Informatics (2020) Vol. 17, Iss. 2, pp. 860-870
Closed Access | Times Cited: 169

Mobile Edge Computing-Based Data-Driven Deep Learning Framework for Anomaly Detection
Bilal Hussain, Qinghe Du, Sihai Zhang, et al.
IEEE Access (2019) Vol. 7, pp. 137656-137667
Open Access | Times Cited: 50

Security for Internet of Things: The SerIoT Project
Erol Gelenbe, Joanna Domańska, Tadeusz Czachórski, et al.
2022 International Symposium on Networks, Computers and Communications (ISNCC) (2018), pp. 1-5
Closed Access | Times Cited: 32

Research and Innovation Action for the Security of the Internet of Things: The SerIoT Project
Joanna Domańska, Erol Gelenbe, Tadeusz Czachórski, et al.
Communications in computer and information science (2018), pp. 101-118
Open Access | Times Cited: 28

An enhanced Graph Analytics Platform (GAP) providing insight in Big Network Data
Anastasios Drosou, Ilias Kalamaras, Stavros Papadopoulos, et al.
Journal of Innovation in Digital Ecosystems (2016) Vol. 3, Iss. 2, pp. 83-97
Open Access | Times Cited: 26

Abnormal Behavior Detection Based on Traffic Pattern Categorization in Mobile Networks
Jonathan M. DeAlmeida, Camila Pontes, Luiz A. DaSilva, et al.
IEEE Transactions on Network and Service Management (2021) Vol. 18, Iss. 4, pp. 4213-4224
Open Access | Times Cited: 13

Anomaly detection for cellular networks using big data analytics
Bing Li, Shengjie Zhao, Rongqing Zhang, et al.
IET Communications (2019) Vol. 13, Iss. 20, pp. 3351-3359
Closed Access | Times Cited: 14

A Hybrid Neural Network Architecture for Early Detection of DDOS attacks using Deep Learning Models
Kumbala Pradeep Reddy, Sarangam Kodati, M Swetha, et al.
2021 2nd International Conference on Smart Electronics and Communication (ICOSEC) (2021), pp. 323-327
Closed Access | Times Cited: 12

Robust malfunction diagnosis in process industry time series
Thanasis Vafeiadis, Stelios Krinidis, Chrysovalantou Ziogou, et al.
2022 IEEE 20th International Conference on Industrial Informatics (INDIN) (2016) Vol. 83, pp. 111-116
Closed Access | Times Cited: 10

Detection of anomalous behavior of smartphones using signal processing and machine learning techniques
R. Soundar Raja James, Abdurhman Albasir, Kshirasagar Naik, et al.
(2017) Vol. 12, pp. 1-7
Closed Access | Times Cited: 9

Using Deep Learning to Classify Power Consumption Signals of Wireless Devices: An Application to Cybersecurity
Abdurhman Albasir, R. Soundar Raja James, Kshirasagar Naik, et al.
(2018), pp. 2032-2036
Closed Access | Times Cited: 8

Real-time incident detection: An approach for two interdependent time series
Thanasis Vafeiadis, Dimosthenis Ioannidis, Stelios Krinidis, et al.
2021 29th European Signal Processing Conference (EUSIPCO) (2016), pp. 1418-1422
Closed Access | Times Cited: 7

Malfunction diagnosis in industrial process systems using data mining for knowledge discovery
Evdoxia Eirini Lithoxoidou, Thanasis Vafeiadis, Stelios Krinidis, et al.
2017 International Conference on Engineering, Technology and Innovation (ICE/ITMC) (2017), pp. 454-461
Open Access | Times Cited: 6

Behavioural Network Traffic Analytics for Securing 5G Networks
Stavros Papadopoulos, Anastasios Drosou, Ilias Kalamaras, et al.
2022 IEEE International Conference on Communications Workshops (ICC Workshops) (2018), pp. 1-6
Open Access | Times Cited: 5

Early malfunction diagnosis of industrial process units utilizing online linear trend profiles and real‐time classification
Thanasis Vafeiadis, Chrysovalantou Ziogou, Georgios Stavropoulos, et al.
International Journal of Adaptive Control and Signal Processing (2018) Vol. 32, Iss. 9, pp. 1313-1325
Closed Access | Times Cited: 5

Overview of Mobile Security Detection Technologies in Internet Traffic
Haobo Liang, Jie Chen, Yingxiong Leng, et al.
Proceedings of the 7th International Conference on Cyber Security and Information Engineering (2024), pp. 182-192
Closed Access

Federated Learning of User Mobility Anomaly Based on Graph Attention Networks
Yingjie Tang, Jia Ruijuan, Xiaoming Zhou, et al.
2021 7th International Conference on Computer and Communications (ICCC) (2021)
Closed Access | Times Cited: 2

Hybrid Model for Anomaly Detection on Call Detail Records by Time Series Forecasting
Aryan Mokhtari, Leyla Sadighi, Behnam Bahrak, et al.
arXiv (Cornell University) (2020)
Open Access | Times Cited: 1

Aggregated Traffic Anomaly Detection Using Time Series Forecasting on Call Detail Records
Arian Mokhtari, Niloofar Ghorbani, Behnam Bahrak
Security and Communication Networks (2022) Vol. 2022, pp. 1-9
Open Access | Times Cited: 1

Effective Credit Default Scoring using Anomaly Detection
Krunal Surti, Ashish Singh Patel
International Journal For Science Technology And Engineering (2017) Vol. 3, Iss. 11, pp. 161-170
Closed Access

A Methodology for Reliable Detection of Anomalous Behavior in Smartphones
Soundar Raja James, Robin Joe Prabhahar
(2018)
Closed Access

A survey on outlier detection methods in data mining
Roy Thomas, J. E. Judith
International Journal of Engineering & Technology (2019) Vol. 7, Iss. 4, pp. 6309-6312
Open Access

Page 1

Scroll to top