
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Survey on Representation Learning Efforts in Cybersecurity Domain
Muhammad Usman, Mian Ahmad Jan, Xiangjian He, et al.
ACM Computing Surveys (2019) Vol. 52, Iss. 6, pp. 1-28
Closed Access | Times Cited: 36
Muhammad Usman, Mian Ahmad Jan, Xiangjian He, et al.
ACM Computing Surveys (2019) Vol. 52, Iss. 6, pp. 1-28
Closed Access | Times Cited: 36
Showing 1-25 of 36 citing articles:
The Emerging Threat of Ai-driven Cyber Attacks: A Review
Blessing Guembe, Ambrose Azeta, Sanjay Misra, et al.
Applied Artificial Intelligence (2022) Vol. 36, Iss. 1
Open Access | Times Cited: 127
Blessing Guembe, Ambrose Azeta, Sanjay Misra, et al.
Applied Artificial Intelligence (2022) Vol. 36, Iss. 1
Open Access | Times Cited: 127
Survey on Explainable AI: Techniques, challenges and open issues
Adel Abusitta, Miles Q. Li, Benjamin C. M. Fung
Expert Systems with Applications (2024) Vol. 255, pp. 124710-124710
Closed Access | Times Cited: 19
Adel Abusitta, Miles Q. Li, Benjamin C. M. Fung
Expert Systems with Applications (2024) Vol. 255, pp. 124710-124710
Closed Access | Times Cited: 19
Security and blockchain convergence with Internet of Multimedia Things: Current trends, research challenges and future directions
Mian Ahmad Jan, Cai Jinjin, Xiangchuan Gao, et al.
Journal of Network and Computer Applications (2020) Vol. 175, pp. 102918-102918
Open Access | Times Cited: 71
Mian Ahmad Jan, Cai Jinjin, Xiangchuan Gao, et al.
Journal of Network and Computer Applications (2020) Vol. 175, pp. 102918-102918
Open Access | Times Cited: 71
Representation-Learning-Based CNN for Intelligent Attack Localization and Recovery of Cyber-Physical Power Systems
Kang‐Di Lu, Le Zhou, Zheng‐Guang Wu
IEEE Transactions on Neural Networks and Learning Systems (2023) Vol. 35, Iss. 5, pp. 6145-6155
Closed Access | Times Cited: 37
Kang‐Di Lu, Le Zhou, Zheng‐Guang Wu
IEEE Transactions on Neural Networks and Learning Systems (2023) Vol. 35, Iss. 5, pp. 6145-6155
Closed Access | Times Cited: 37
A Survey on Threat Hunting in Enterprise Networks
Boubakr Nour, Makan Pourzandi, Mourad Debbabi
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 4, pp. 2299-2324
Closed Access | Times Cited: 22
Boubakr Nour, Makan Pourzandi, Mourad Debbabi
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 4, pp. 2299-2324
Closed Access | Times Cited: 22
A Survey on Malware Detection with Graph Representation Learning
Tristan Bilot, Nour El Madhoun, Khaldoun Al Agha, et al.
ACM Computing Surveys (2024) Vol. 56, Iss. 11, pp. 1-36
Open Access | Times Cited: 14
Tristan Bilot, Nour El Madhoun, Khaldoun Al Agha, et al.
ACM Computing Surveys (2024) Vol. 56, Iss. 11, pp. 1-36
Open Access | Times Cited: 14
Blockchain and Machine Learning: A Critical Review on Security
Hamed Taherdoost
Information (2023) Vol. 14, Iss. 5, pp. 295-295
Open Access | Times Cited: 18
Hamed Taherdoost
Information (2023) Vol. 14, Iss. 5, pp. 295-295
Open Access | Times Cited: 18
ARIES: A Novel Multivariate Intrusion Detection System for Smart Grid
Panagiotis Radoglou-Grammatikis, Panagiotis Sarigiannidis, Georgios Efstathopoulos, et al.
Sensors (2020) Vol. 20, Iss. 18, pp. 5305-5305
Open Access | Times Cited: 49
Panagiotis Radoglou-Grammatikis, Panagiotis Sarigiannidis, Georgios Efstathopoulos, et al.
Sensors (2020) Vol. 20, Iss. 18, pp. 5305-5305
Open Access | Times Cited: 49
A Comprehensive Survey on Deep Clustering: Taxonomy, Challenges, and Future Directions
Sheng Zhou, Hongjia Xu, Zhuonan Zheng, et al.
ACM Computing Surveys (2024) Vol. 57, Iss. 3, pp. 1-38
Open Access | Times Cited: 5
Sheng Zhou, Hongjia Xu, Zhuonan Zheng, et al.
ACM Computing Surveys (2024) Vol. 57, Iss. 3, pp. 1-38
Open Access | Times Cited: 5
A Survey of Source Code Representations for Machine Learning-Based Cybersecurity Tasks
Beatrice Casey, Joanna C. S. Santos, George Perry
ACM Computing Surveys (2025)
Open Access
Beatrice Casey, Joanna C. S. Santos, George Perry
ACM Computing Surveys (2025)
Open Access
A Survey on Concept Factorization: From Shallow to Deep Representation Learning
Zhao Zhang, Yan Zhang, Mingliang Xu, et al.
Information Processing & Management (2021) Vol. 58, Iss. 3, pp. 102534-102534
Open Access | Times Cited: 32
Zhao Zhang, Yan Zhang, Mingliang Xu, et al.
Information Processing & Management (2021) Vol. 58, Iss. 3, pp. 102534-102534
Open Access | Times Cited: 32
Machine Learning for Detecting Security Attacks on Blockchain using Software Defined Networking
Shivani Gaba, Ishan Budhiraja, Aaisha Makkar, et al.
2022 IEEE International Conference on Communications Workshops (ICC Workshops) (2022)
Closed Access | Times Cited: 17
Shivani Gaba, Ishan Budhiraja, Aaisha Makkar, et al.
2022 IEEE International Conference on Communications Workshops (ICC Workshops) (2022)
Closed Access | Times Cited: 17
Advanced Persistent Threat intelligent profiling technique: A survey
Binhui Tang, Junfeng Wang, Zhongkun Yu, et al.
Computers & Electrical Engineering (2022) Vol. 103, pp. 108261-108261
Closed Access | Times Cited: 16
Binhui Tang, Junfeng Wang, Zhongkun Yu, et al.
Computers & Electrical Engineering (2022) Vol. 103, pp. 108261-108261
Closed Access | Times Cited: 16
An Analysis of Cybersecurity Architectures
Noluntu Mpekoa
International Conference on Cyber Warfare and Security (2024) Vol. 19, Iss. 1, pp. 200-207
Open Access | Times Cited: 3
Noluntu Mpekoa
International Conference on Cyber Warfare and Security (2024) Vol. 19, Iss. 1, pp. 200-207
Open Access | Times Cited: 3
RaSEC: An Intelligent Framework for Reliable and Secure Multi-Level Edge Computing in Industrial Environments
Muhammad Usman, Alireza Jolfaei, Mian Ahmad Jan
IEEE Transactions on Industry Applications (2020), pp. 1-1
Open Access | Times Cited: 26
Muhammad Usman, Alireza Jolfaei, Mian Ahmad Jan
IEEE Transactions on Industry Applications (2020), pp. 1-1
Open Access | Times Cited: 26
Analyzing the Usefulness of the DARPA OpTC Dataset in Cyber Threat Detection Research
Md. Monowar Anjum, Shahrear Iqbal, Benoît Hamelin
(2021), pp. 27-32
Open Access | Times Cited: 19
Md. Monowar Anjum, Shahrear Iqbal, Benoît Hamelin
(2021), pp. 27-32
Open Access | Times Cited: 19
AI-Driven Solutions for Social Engineering Attacks: Detection, Prevention, and Response
Hussam N. Fakhouri, Basim Alhadidi, Khalil Omar, et al.
(2024), pp. 1-8
Closed Access | Times Cited: 2
Hussam N. Fakhouri, Basim Alhadidi, Khalil Omar, et al.
(2024), pp. 1-8
Closed Access | Times Cited: 2
Applying machine learning and parallel data processing for attack detection in IoT
Alexander Branitskiy, Igor Kotenko, Igor Saenko
IEEE Transactions on Emerging Topics in Computing (2020) Vol. 9, Iss. 4, pp. 1642-1653
Closed Access | Times Cited: 18
Alexander Branitskiy, Igor Kotenko, Igor Saenko
IEEE Transactions on Emerging Topics in Computing (2020) Vol. 9, Iss. 4, pp. 1642-1653
Closed Access | Times Cited: 18
An active defense model based on situational awareness and firewalls
Di Li, Yikun Hu, Guoqing Xiao, et al.
Concurrency and Computation Practice and Experience (2023) Vol. 35, Iss. 6, pp. 1-1
Closed Access | Times Cited: 6
Di Li, Yikun Hu, Guoqing Xiao, et al.
Concurrency and Computation Practice and Experience (2023) Vol. 35, Iss. 6, pp. 1-1
Closed Access | Times Cited: 6
Learning Word Representation for the Cyber Security Vulnerability Domain
Sara Mumtaz, Carlos Rodríguez, Boualem Benatallah, et al.
2022 International Joint Conference on Neural Networks (IJCNN) (2020), pp. 1-8
Closed Access | Times Cited: 12
Sara Mumtaz, Carlos Rodríguez, Boualem Benatallah, et al.
2022 International Joint Conference on Neural Networks (IJCNN) (2020), pp. 1-8
Closed Access | Times Cited: 12
Fast Localization Model of Network Intrusion Detection System for Enterprises Using Cloud Computing Environment
Xingzhu Wang
Mobile Networks and Applications (2023) Vol. 28, Iss. 6, pp. 2191-2203
Closed Access | Times Cited: 3
Xingzhu Wang
Mobile Networks and Applications (2023) Vol. 28, Iss. 6, pp. 2191-2203
Closed Access | Times Cited: 3
A Deep Learning Model for Threat Hunting in Ethereum Blockchain
Elnaz Rabieinejad, Abbas Yazdinejad, Reza M. Parizi
2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (2021), pp. 1185-1190
Closed Access | Times Cited: 7
Elnaz Rabieinejad, Abbas Yazdinejad, Reza M. Parizi
2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (2021), pp. 1185-1190
Closed Access | Times Cited: 7
The Current Trends, Techniques, and Challenges of Cybersecurity
Mubarak Himmat, Mnahel Ahmed Ibrahim, Nazar Hammam, et al.
European Journal of Information Technologies and Computer Science (2023) Vol. 3, Iss. 4, pp. 1-5
Open Access | Times Cited: 2
Mubarak Himmat, Mnahel Ahmed Ibrahim, Nazar Hammam, et al.
European Journal of Information Technologies and Computer Science (2023) Vol. 3, Iss. 4, pp. 1-5
Open Access | Times Cited: 2
Using Graph Representation in Host-Based Intrusion Detection
Zhichao Hu, Likun Liu, Haining Yu, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-13
Open Access | Times Cited: 4
Zhichao Hu, Likun Liu, Haining Yu, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-13
Open Access | Times Cited: 4
ICT Security through Games
Anton Baláž, Emília Pietriková, Branislav Madoš, et al.
(2024), pp. 000447-000454
Closed Access
Anton Baláž, Emília Pietriková, Branislav Madoš, et al.
(2024), pp. 000447-000454
Closed Access