
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Machine Learning for Intelligent Data Analysis and Automation in Cybersecurity: Current and Future Prospects
Iqbal H. Sarker
(2022)
Open Access | Times Cited: 17
Iqbal H. Sarker
(2022)
Open Access | Times Cited: 17
Showing 17 citing articles:
Artificial intelligence in cybersecurity: Protecting national infrastructure: A USA review
Adebunmi Okechukwu Adewusi, Ugochukwu Ikechukwu Okoli, Temidayo Olorunsogo, et al.
World Journal of Advanced Research and Reviews (2024) Vol. 21, Iss. 1, pp. 2263-2275
Open Access | Times Cited: 16
Adebunmi Okechukwu Adewusi, Ugochukwu Ikechukwu Okoli, Temidayo Olorunsogo, et al.
World Journal of Advanced Research and Reviews (2024) Vol. 21, Iss. 1, pp. 2263-2275
Open Access | Times Cited: 16
Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions towards automation, intelligence and transparent cybersecurity modeling for critical infrastructures
Iqbal H. Sarker, Helge Janicke, Mohamed Amine Ferrag, et al.
Internet of Things (2024) Vol. 25, pp. 101110-101110
Open Access | Times Cited: 16
Iqbal H. Sarker, Helge Janicke, Mohamed Amine Ferrag, et al.
Internet of Things (2024) Vol. 25, pp. 101110-101110
Open Access | Times Cited: 16
Analyse and Predict the Detection of the Cyber - Attack Process by Using a Machine-Learning Approach
Charanjeet Singh, Ravinjit Singh, Shivaputra Shivaputra, et al.
EAI Endorsed Transactions on Internet of Things (2024) Vol. 10
Open Access | Times Cited: 4
Charanjeet Singh, Ravinjit Singh, Shivaputra Shivaputra, et al.
EAI Endorsed Transactions on Internet of Things (2024) Vol. 10
Open Access | Times Cited: 4
Integrating Machine Learning for Sustaining Cybersecurity in Digital Banks
Muath Asmar, Alia Tuqan
Heliyon (2024), pp. e37571-e37571
Open Access | Times Cited: 1
Muath Asmar, Alia Tuqan
Heliyon (2024), pp. e37571-e37571
Open Access | Times Cited: 1
AI Potentiality and Awareness: A Position Paper from the Perspective of Human-AI Teaming in Cybersecurity
Iqbal H. Sarker, Helge Janicke, Nazeeruddin Mohammad, et al.
Lecture notes in networks and systems (2024), pp. 140-149
Closed Access | Times Cited: 1
Iqbal H. Sarker, Helge Janicke, Nazeeruddin Mohammad, et al.
Lecture notes in networks and systems (2024), pp. 140-149
Closed Access | Times Cited: 1
Comparison of Machine Learning Algorithms Trained Under Differential Privacy for Intrusion Detection Systems
Ioannis Siachos, Konstantinos Kaltakis, Konstantina Papachristopoulou, et al.
(2023), pp. 654-658
Closed Access | Times Cited: 3
Ioannis Siachos, Konstantinos Kaltakis, Konstantina Papachristopoulou, et al.
(2023), pp. 654-658
Closed Access | Times Cited: 3
Harnessing Machine Learning for Effective Cyber security Classifiers
Tamanna Jena, Achyut Shankar, Adyesha Singhdeo
Asian Journal of Research in Computer Science (2023) Vol. 16, Iss. 4, pp. 453-464
Open Access | Times Cited: 2
Tamanna Jena, Achyut Shankar, Adyesha Singhdeo
Asian Journal of Research in Computer Science (2023) Vol. 16, Iss. 4, pp. 453-464
Open Access | Times Cited: 2
Construction of Power System Network Security Defense Behavior Decision-making Model based on Artificial Intelligence Technology
Feilu Hang, Linjiang Xie, Zhenhong Zhang, et al.
Scalable Computing Practice and Experience (2024) Vol. 25, Iss. 4, pp. 2614-2620
Open Access
Feilu Hang, Linjiang Xie, Zhenhong Zhang, et al.
Scalable Computing Practice and Experience (2024) Vol. 25, Iss. 4, pp. 2614-2620
Open Access
AI/ML, Data Science, and Automation in Cybersecurity: Methods and Applications in Healthcare
Cheryl Ann Alexander
Online Journal of Robotics & Automation Technology (2024) Vol. 3, Iss. 1
Open Access
Cheryl Ann Alexander
Online Journal of Robotics & Automation Technology (2024) Vol. 3, Iss. 1
Open Access
Review of Intrusion Detection Systems for Supervisor Control and Data Acquisition: A Machine Learning Approach
Hermenegildo da Conceição Aberto, Jean Marie Dembélé, Idy Diop, et al.
Communications in computer and information science (2024), pp. 28-51
Closed Access
Hermenegildo da Conceição Aberto, Jean Marie Dembélé, Idy Diop, et al.
Communications in computer and information science (2024), pp. 28-51
Closed Access
The Future of AI in Predicting Cybersecurity Threats
P. Pavan Kumar, Mankala Satish, Sunitha Devi Bigul, et al.
Lecture notes in electrical engineering (2024), pp. 1382-1395
Closed Access
P. Pavan Kumar, Mankala Satish, Sunitha Devi Bigul, et al.
Lecture notes in electrical engineering (2024), pp. 1382-1395
Closed Access
Auction-Based Optimization with Machine Learning for Cyber Threat Detection and Classification Model
Hamed Alqahtani
Lecture notes in networks and systems (2024), pp. 561-579
Closed Access
Hamed Alqahtani
Lecture notes in networks and systems (2024), pp. 561-579
Closed Access
Analysis of machine learning-based approaches for securing the Internet of Things in the smart industry: a multivocal state of knowledge review
Ricardo Emmanuel Reyes-Acosta, Carlos-Alberto Domínguez-Báez, Ricardo Mendoza-González, et al.
International Journal of Information Security (2024) Vol. 24, Iss. 1
Closed Access
Ricardo Emmanuel Reyes-Acosta, Carlos-Alberto Domínguez-Báez, Ricardo Mendoza-González, et al.
International Journal of Information Security (2024) Vol. 24, Iss. 1
Closed Access
Aeronautic maturity cybersecurity: a framework
Guillermo Brito Acuña
DYNA (2023) Vol. 90, Iss. 227, pp. 24-34
Open Access | Times Cited: 1
Guillermo Brito Acuña
DYNA (2023) Vol. 90, Iss. 227, pp. 24-34
Open Access | Times Cited: 1
A Hybrid Federated Learning Framework and Multi-Party Communication for Cyber-Security Analysis
Fahad Alqurashi
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 7
Open Access | Times Cited: 1
Fahad Alqurashi
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 7
Open Access | Times Cited: 1
A novel application of XAI in squinting models: A position paper
Kenneth Wenger, Katayoun Hossein Abadi, Damian Fozard, et al.
Machine Learning with Applications (2023) Vol. 13, pp. 100491-100491
Open Access
Kenneth Wenger, Katayoun Hossein Abadi, Damian Fozard, et al.
Machine Learning with Applications (2023) Vol. 13, pp. 100491-100491
Open Access