
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Cyberattack detection in wireless sensor networks using a hybrid feature reduction technique with AI and machine learning methods
Mohamed H. Behiry, Mohammed Aly
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 15
Mohamed H. Behiry, Mohammed Aly
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 15
Showing 15 citing articles:
Weakly-supervised thyroid ultrasound segmentation: Leveraging multi-scale consistency, contextual features, and bounding box supervision for accurate target delineation
Mohammed Aly
Computers in Biology and Medicine (2025) Vol. 186, pp. 109669-109669
Closed Access
Mohammed Aly
Computers in Biology and Medicine (2025) Vol. 186, pp. 109669-109669
Closed Access
Harnessing Machine Learning Intelligence Against Cyber Threats
Bhupinder Singh, Christian Kaunert, Ritu Gautam
Advances in business strategy and competitive advantage book series (2024), pp. 319-352
Closed Access | Times Cited: 4
Bhupinder Singh, Christian Kaunert, Ritu Gautam
Advances in business strategy and competitive advantage book series (2024), pp. 319-352
Closed Access | Times Cited: 4
Enhancing Clustering Efficiency in Heterogeneous Wireless Sensor Network Protocols Using the K-Nearest Neighbours Algorithm
Abdulla Juwaied, Lidia Jackowska-Strumiłło, Artur Sierszeń
Sensors (2025) Vol. 25, Iss. 4, pp. 1029-1029
Open Access
Abdulla Juwaied, Lidia Jackowska-Strumiłło, Artur Sierszeń
Sensors (2025) Vol. 25, Iss. 4, pp. 1029-1029
Open Access
‘As of my last knowledge update’: How is content generated by ChatGPT infiltrating scientific papers published in premier journals?
Artur Strzelecki
Learned Publishing (2024) Vol. 38, Iss. 1
Open Access | Times Cited: 2
Artur Strzelecki
Learned Publishing (2024) Vol. 38, Iss. 1
Open Access | Times Cited: 2
Reinforcing Network Security: Network Attack Detection Using Random Grove Blend in Weighted MLP Layers
Adel Binbusayyis
Mathematics (2024) Vol. 12, Iss. 11, pp. 1720-1720
Open Access | Times Cited: 1
Adel Binbusayyis
Mathematics (2024) Vol. 12, Iss. 11, pp. 1720-1720
Open Access | Times Cited: 1
Revolutionizing online education: Advanced facial expression recognition for real-time student progress tracking via deep learning model
Mohammed Aly
Multimedia Tools and Applications (2024)
Open Access | Times Cited: 1
Mohammed Aly
Multimedia Tools and Applications (2024)
Open Access | Times Cited: 1
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
Mohammed Ahmed Subhi, Omar Fitian Rashid, Safa Ahmed Abdulsahib, et al.
Deleted Journal (2024) Vol. 4, Iss. 2, pp. 120-128
Open Access | Times Cited: 1
Mohammed Ahmed Subhi, Omar Fitian Rashid, Safa Ahmed Abdulsahib, et al.
Deleted Journal (2024) Vol. 4, Iss. 2, pp. 120-128
Open Access | Times Cited: 1
Text Mining Algorithm Naive Bayes Classifier to Improve Quality Sentiment Analysis Passport Mobile Application
M. Alvi Syahrin, W Wilonotomo, Budy Mulyawan, et al.
(2024)
Open Access
M. Alvi Syahrin, W Wilonotomo, Budy Mulyawan, et al.
(2024)
Open Access
A New Framework for Resource Allocation in Wireless Sensor Networks Using Machine Learning Techniques
Ratish Sharma, Namit Gupta, Taskeen Zaidi
(2024), pp. 1-6
Closed Access
Ratish Sharma, Namit Gupta, Taskeen Zaidi
(2024), pp. 1-6
Closed Access
Performance optimization for hybrid TS/PS SWIPT UAV in cooperative NOMA IoT networks
Van Nhan Vo, Viet-Hung Dang, Hung Tran, et al.
Alexandria Engineering Journal (2024) Vol. 107, pp. 559-567
Open Access
Van Nhan Vo, Viet-Hung Dang, Hung Tran, et al.
Alexandria Engineering Journal (2024) Vol. 107, pp. 559-567
Open Access
Scouting the Juncture of Internet of Things (IoT), Deep Learning, and Cybercrime
Bhupinder Singh, Christian Kaunert
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 363-398
Closed Access
Bhupinder Singh, Christian Kaunert
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 363-398
Closed Access
Exploring Effective Strategies for Combatting Cybercrime and Intersection of IoT, Deep Learning
Bhupinder Singh, Christian Kaunert
Advances in human and social aspects of technology book series (2024), pp. 141-172
Closed Access
Bhupinder Singh, Christian Kaunert
Advances in human and social aspects of technology book series (2024), pp. 141-172
Closed Access
Navigating Cryptocurrency Regulation
Bhupinder Singh, Christian Kaunert
Advances in hospitality, tourism and the services industry (AHTSI) book series (2024), pp. 133-160
Closed Access
Bhupinder Singh, Christian Kaunert
Advances in hospitality, tourism and the services industry (AHTSI) book series (2024), pp. 133-160
Closed Access
Secure Wireless Sensor Networks: A Weighted K-NN and RNN-based Approach for Attack Detection and Localization
S. Sivakumar, M. Mercy Theresa, Kattakgoundar Govindaraj Sudha, et al.
IETE Journal of Research (2024), pp. 1-12
Closed Access
S. Sivakumar, M. Mercy Theresa, Kattakgoundar Govindaraj Sudha, et al.
IETE Journal of Research (2024), pp. 1-12
Closed Access
Protecting Autonomous UAVs from GPS Spoofing and Jamming: A Comparative Analysis of Detection and Mitigation Techniques
Princess Chimmy Joeaneke, Onyinye Obioha-Val, Oluwaseun Oladeji Olaniyi, et al.
SSRN Electronic Journal (2024)
Closed Access
Princess Chimmy Joeaneke, Onyinye Obioha-Val, Oluwaseun Oladeji Olaniyi, et al.
SSRN Electronic Journal (2024)
Closed Access