
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree
Surjeet Dalal, Umesh Kumar Lilhore, Neetu Faujdar, et al.
Journal of Cloud Computing Advances Systems and Applications (2023) Vol. 12, Iss. 1
Open Access | Times Cited: 17
Surjeet Dalal, Umesh Kumar Lilhore, Neetu Faujdar, et al.
Journal of Cloud Computing Advances Systems and Applications (2023) Vol. 12, Iss. 1
Open Access | Times Cited: 17
Showing 17 citing articles:
An active learning framework using deep Q-network for zero-day attack detection
Yali Wu, Yanghu Hu, Junhu Wang, et al.
Computers & Security (2024) Vol. 139, pp. 103713-103713
Closed Access | Times Cited: 4
Yali Wu, Yanghu Hu, Junhu Wang, et al.
Computers & Security (2024) Vol. 139, pp. 103713-103713
Closed Access | Times Cited: 4
Sentiment classification for insider threat identification using metaheuristic optimized machine learning classifiers
Djordje Mladenovic, Miloš Antonijević, Luka Jovanovic, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 3
Djordje Mladenovic, Miloš Antonijević, Luka Jovanovic, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 3
Detection of cyber attacks on IoT based cyber physical systems
G. Anusha, Gouse Baigmohammad, Uma Mageswari
MATEC Web of Conferences (2024) Vol. 392, pp. 01166-01166
Open Access | Times Cited: 3
G. Anusha, Gouse Baigmohammad, Uma Mageswari
MATEC Web of Conferences (2024) Vol. 392, pp. 01166-01166
Open Access | Times Cited: 3
Cybercrime Risk Found in Employee Behavior Big Data Using Semi-Supervised Machine Learning with Personality Theories
Kenneth David Strang
Big Data and Cognitive Computing (2024) Vol. 8, Iss. 4, pp. 37-37
Open Access | Times Cited: 3
Kenneth David Strang
Big Data and Cognitive Computing (2024) Vol. 8, Iss. 4, pp. 37-37
Open Access | Times Cited: 3
A Simultaneous Wireless Information and Power Transfer-Based Multi-Hop Uneven Clustering Routing Protocol for EH-Cognitive Radio Sensor Networks
Jihong Wang, Zhuo Wang, Lidong Zhang
Big Data and Cognitive Computing (2024) Vol. 8, Iss. 2, pp. 15-15
Open Access | Times Cited: 2
Jihong Wang, Zhuo Wang, Lidong Zhang
Big Data and Cognitive Computing (2024) Vol. 8, Iss. 2, pp. 15-15
Open Access | Times Cited: 2
An adaptive detection framework based on artificial immune for IoT intrusion detection system
Ming Ma, Geying Yang, Junjiang He, et al.
Applied Soft Computing (2024) Vol. 166, pp. 112152-112152
Closed Access | Times Cited: 1
Ming Ma, Geying Yang, Junjiang He, et al.
Applied Soft Computing (2024) Vol. 166, pp. 112152-112152
Closed Access | Times Cited: 1
Energy-Efficient Anomaly Detection and Chaoticity in Electric Vehicle Driving Behavior
Efe Savran, Esin Karpat, Fatih Karpat
Sensors (2024) Vol. 24, Iss. 17, pp. 5628-5628
Open Access | Times Cited: 1
Efe Savran, Esin Karpat, Fatih Karpat
Sensors (2024) Vol. 24, Iss. 17, pp. 5628-5628
Open Access | Times Cited: 1
Securing the internet of things: Safeguarding connectivity in the cyber age
Mukund Kuthe, Rushi Parhad, Rohit Kindarle, et al.
AIP conference proceedings (2024) Vol. 3242, pp. 060004-060004
Closed Access | Times Cited: 1
Mukund Kuthe, Rushi Parhad, Rohit Kindarle, et al.
AIP conference proceedings (2024) Vol. 3242, pp. 060004-060004
Closed Access | Times Cited: 1
An optimized neural network with AdaHessian for cryptojacking attack prediction for Securing Crypto Exchange Operations of MEC applications
Uma Rani, Sunil Kumar, Neeraj Dahiya, et al.
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access
Uma Rani, Sunil Kumar, Neeraj Dahiya, et al.
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access
Pearson Correlation Coefficient based Improved Least Square - Support Vector Machine for Cyber-Attack Detection in Internet of Things
A. Senthilkumar, S. Joshika, L. Santhi, et al.
(2024) Vol. 15, pp. 1-4
Closed Access
A. Senthilkumar, S. Joshika, L. Santhi, et al.
(2024) Vol. 15, pp. 1-4
Closed Access
Body Region Sampling Areas- and Phaneroptics-Associated Hair Fiber Phenotypes in Canarian Camel Versus Merino Sheep
Carlos Iglesias Pastrana, Francisco Javier Navas González, Elena Ciani, et al.
Journal of Natural Fibers (2024) Vol. 21, Iss. 1
Open Access
Carlos Iglesias Pastrana, Francisco Javier Navas González, Elena Ciani, et al.
Journal of Natural Fibers (2024) Vol. 21, Iss. 1
Open Access
Fog-assisted de-duplicated data exchange in distributed edge computing networks
Ghawar Said, Anwar Ghani, Ata Ullah, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
Ghawar Said, Anwar Ghani, Ata Ullah, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
RCLNet: an effective anomaly-based intrusion detection for securing the IoMT system
Jamshed Ali Shaikh, Chengliang Wang, Wajeeh Us Sima Muhammad, et al.
Frontiers in Digital Health (2024) Vol. 6
Open Access
Jamshed Ali Shaikh, Chengliang Wang, Wajeeh Us Sima Muhammad, et al.
Frontiers in Digital Health (2024) Vol. 6
Open Access
Artificial intelligence driven cyberattack detection system using integration of deep belief network with convolution neural network on industrial IoT
Mahmoud Ragab, Mohammed Basheri, Nasser Albogami, et al.
Alexandria Engineering Journal (2024) Vol. 110, pp. 438-450
Open Access
Mahmoud Ragab, Mohammed Basheri, Nasser Albogami, et al.
Alexandria Engineering Journal (2024) Vol. 110, pp. 438-450
Open Access
ENSURING A SAFE TOMORROW: CONCLUSIONS FROM THE ANALYSIS OF THE LEADING CYBER ATTACKS AND THEIR IMPACT ON INFORMATION SECURITY
A. R. Yerboluly, T. K. Tusipova
Bulletin of Shakarim University Technical Sciences (2024), Iss. 3(15), pp. 5-15
Closed Access
A. R. Yerboluly, T. K. Tusipova
Bulletin of Shakarim University Technical Sciences (2024), Iss. 3(15), pp. 5-15
Closed Access
A hybrid machine learning model with self-improved optimization algorithm for trust and privacy preservation in cloud environment
Himani Saini, Gopal Singh, Sandeep Dalal, et al.
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access
Himani Saini, Gopal Singh, Sandeep Dalal, et al.
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access
Correction to: Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree
Surjeet Dalal, Umesh Kumar Lilhore, Neetu Faujdar, et al.
Journal of Cloud Computing Advances Systems and Applications (2023) Vol. 12, Iss. 1
Open Access
Surjeet Dalal, Umesh Kumar Lilhore, Neetu Faujdar, et al.
Journal of Cloud Computing Advances Systems and Applications (2023) Vol. 12, Iss. 1
Open Access