OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Showing 15 citing articles:

Harnessing Machine Learning Intelligence Against Cyber Threats
Bhupinder Singh, Christian Kaunert, Ritu Gautam
Advances in business strategy and competitive advantage book series (2024), pp. 319-352
Closed Access | Times Cited: 4

Enhancing Clustering Efficiency in Heterogeneous Wireless Sensor Network Protocols Using the K-Nearest Neighbours Algorithm
Abdulla Juwaied, Lidia Jackowska-Strumiłło, Artur Sierszeń
Sensors (2025) Vol. 25, Iss. 4, pp. 1029-1029
Open Access

Reinforcing Network Security: Network Attack Detection Using Random Grove Blend in Weighted MLP Layers
Adel Binbusayyis
Mathematics (2024) Vol. 12, Iss. 11, pp. 1720-1720
Open Access | Times Cited: 1

A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
Mohammed Ahmed Subhi, Omar Fitian Rashid, Safa Ahmed Abdulsahib, et al.
Deleted Journal (2024) Vol. 4, Iss. 2, pp. 120-128
Open Access | Times Cited: 1

A New Framework for Resource Allocation in Wireless Sensor Networks Using Machine Learning Techniques
Ratish Sharma, Namit Gupta, Taskeen Zaidi
(2024), pp. 1-6
Closed Access

Performance optimization for hybrid TS/PS SWIPT UAV in cooperative NOMA IoT networks
Van Nhan Vo, Viet-Hung Dang, Hung Tran, et al.
Alexandria Engineering Journal (2024) Vol. 107, pp. 559-567
Open Access

Scouting the Juncture of Internet of Things (IoT), Deep Learning, and Cybercrime
Bhupinder Singh, Christian Kaunert
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 363-398
Closed Access

Exploring Effective Strategies for Combatting Cybercrime and Intersection of IoT, Deep Learning
Bhupinder Singh, Christian Kaunert
Advances in human and social aspects of technology book series (2024), pp. 141-172
Closed Access

Navigating Cryptocurrency Regulation
Bhupinder Singh, Christian Kaunert
Advances in hospitality, tourism and the services industry (AHTSI) book series (2024), pp. 133-160
Closed Access

Secure Wireless Sensor Networks: A Weighted K-NN and RNN-based Approach for Attack Detection and Localization
S. Sivakumar, M. Mercy Theresa, Kattakgoundar Govindaraj Sudha, et al.
IETE Journal of Research (2024), pp. 1-12
Closed Access

Protecting Autonomous UAVs from GPS Spoofing and Jamming: A Comparative Analysis of Detection and Mitigation Techniques
Princess Chimmy Joeaneke, Onyinye Obioha-Val, Oluwaseun Oladeji Olaniyi, et al.
SSRN Electronic Journal (2024)
Closed Access

Page 1

Scroll to top