OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Survey on Explainable Artificial Intelligence for Cybersecurity
Gaith Rjoub, Jamal Bentahar, Omar Abdel Wahab, et al.
IEEE Transactions on Network and Service Management (2023) Vol. 20, Iss. 4, pp. 5115-5140
Open Access | Times Cited: 26

Showing 1-25 of 26 citing articles:

From COBIT to ISO 42001: Evaluating cybersecurity frameworks for opportunities, risks, and regulatory compliance in commercializing large language models
Timothy R. McIntosh, Teo Sušnjak, Tong Liu, et al.
Computers & Security (2024) Vol. 144, pp. 103964-103964
Open Access | Times Cited: 24

Machine learning and deep learning for user authentication and authorization in cybersecurity: A state-of-the-art review
Zinniya Taffannum Pritee, Mehedi Hasan Anik, Saida Binta Alam, et al.
Computers & Security (2024) Vol. 140, pp. 103747-103747
Closed Access | Times Cited: 11

Explainable artificial intelligence models in intrusion detection systems
Samed Al, Şeref Sağıroğlu
Engineering Applications of Artificial Intelligence (2025) Vol. 144, pp. 110145-110145
Closed Access

Exploring the Unseen: A Survey of Multi-Sensor Fusion and the Role of Explainable AI (XAI) in Autonomous Vehicles
De Jong Yeong, Krishna Panduru, J. L. Walsh
Sensors (2025) Vol. 25, Iss. 3, pp. 856-856
Open Access

Intelligent Cyber Defense: Leveraging LLMs for Real-Time Threat Detection and Analysis
Elena Kakoulli, Zacharioudakis Eleftherios, Salomi Evripidou
Lecture notes in business information processing (2025), pp. 58-73
Closed Access

Advanced Deep Learning Models for 6G: Overview, Opportunities and Challenges
Licheng Jiao, Y Shao, Long Sun, et al.
IEEE Access (2024) Vol. 12, pp. 133245-133314
Open Access | Times Cited: 4

Explainable deep learning approach for advanced persistent threats (APTs) detection in cybersecurity: a review
Noor Hazlina Abdul Mutalib, Aznul Qalid Md Sabri, Ainuddin Wahid Abdul Wahab, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 11
Open Access | Times Cited: 4

Proactive detection of anomalous behavior in Ethereum accounts using XAI-enabled ensemble stacking with Bayesian optimization
Vasavi Chithanuru, Mangayarkarasi Ramaiah
PeerJ Computer Science (2025) Vol. 11, pp. e2630-e2630
Open Access

Explainable AI: Machine Learning Interpretation in Blackcurrant Powders
Krzysztof Przybył
Sensors (2024) Vol. 24, Iss. 10, pp. 3198-3198
Open Access | Times Cited: 2

Enhancing Machine Learning Model Interpretability in Intrusion Detection Systems through SHAP Explanations and LLM-Generated Descriptions
Abderrazak Khediri, Hamda Slimi, Ayoub Yahiaoui, et al.
(2024), pp. 1-6
Closed Access | Times Cited: 2

Interpretability and Transparency of Machine Learning in File Fragment Analysis with Explainable Artificial Intelligence
Razaq Jinad, ABM Rezbaul Islam, Narasimha Shashidhar
Electronics (2024) Vol. 13, Iss. 13, pp. 2438-2438
Open Access | Times Cited: 2

Reinforcement Learning Approaches in Cyber Security
Ehtisham Safeer
Advances in information security, privacy, and ethics book series (2024), pp. 53-76
Closed Access | Times Cited: 2

Recent Applications of Explainable AI (XAI): A Systematic Literature Review
Mirka Saarela, Vili Podgorelec
Applied Sciences (2024) Vol. 14, Iss. 19, pp. 8884-8884
Open Access | Times Cited: 2

Advancing cybersecurity and privacy with artificial intelligence: current trends and future research directions
Krishnashree Achuthan, Sasangan Ramanathan, Sethuraman Srinivas, et al.
Frontiers in Big Data (2024) Vol. 7
Open Access | Times Cited: 2

Explainable AI in Military Training Applications
Azeem Khan, N. Z. Jhanjhi, Dayang Hajah Tiawa Binti Awang Haji Hamid, et al.
Advances in computational intelligence and robotics book series (2024), pp. 199-234
Closed Access | Times Cited: 1

Intelligent Solution System for Cloud Security Based on Equity Distribution: Model and Algorithms
Sarah Mustafa Eljack, Mahdi Jemmali, Mohsen Denden, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 1, pp. 1461-1479
Open Access | Times Cited: 1

ARTIFICIAL INTELLIGENCE IN CYBERSECURITY
Navya Shree
International Journal of Progressive Research in Engineering Management and Science (2024)
Open Access | Times Cited: 1

Network intrusion detection leveraging multimodal features
Aklil Kiflay, Athanasios Tsokanos, Mahmood Fazlali, et al.
Array (2024) Vol. 22, pp. 100349-100349
Open Access | Times Cited: 1

Enhancing IoT Intelligence: A Transformer-based Reinforcement Learning Methodology
Gaith Rjoub, Saidul Islam, Jamal Bentahar, et al.
2022 International Wireless Communications and Mobile Computing (IWCMC) (2024), pp. 1418-1423
Open Access | Times Cited: 1

Cybersecurity in Internet of Medical Vehicles: State-of-the-Art Analysis, Research Challenges and Future Perspectives
Chidambar Rao Bhukya, Prabhat Thakur, Bhavesh Raju Mudhivarthi, et al.
Sensors (2023) Vol. 23, Iss. 19, pp. 8107-8107
Open Access | Times Cited: 2

An eXplainable Artificial Intelligence Methodology on Big Data Architecture
Valerio La Gatta, Vincenzo Moscato, Marco Postiglione, et al.
Cognitive Computation (2024) Vol. 16, Iss. 5, pp. 2642-2659
Open Access

Interpretable SHAP-Driven Machine Learning for Accurate Fault Detection in Software Engineering
Sofian Kassaymeh, Gaith Rjoub, Rachida Dssouli, et al.
Lecture notes in networks and systems (2024), pp. 52-66
Closed Access

Page 1 - Next Page

Scroll to top