
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Advancements in Edge Detection Techniques for Image Enhancement: A Comprehensive Review
Hewa Majeed Zangana, Ayaz Khalid Mohammed, Firas Mahmood Mustafa
International Journal of Artificial Intelligence & Robotics (IJAIR) (2024) Vol. 6, Iss. 1, pp. 29-39
Open Access | Times Cited: 8
Hewa Majeed Zangana, Ayaz Khalid Mohammed, Firas Mahmood Mustafa
International Journal of Artificial Intelligence & Robotics (IJAIR) (2024) Vol. 6, Iss. 1, pp. 29-39
Open Access | Times Cited: 8
Showing 8 citing articles:
The Role of Image Processing and Deep Learning in IoT-Based Systems: A Comprehensive Review
Isamadeen A. Khalifa, Faris Keti
Deleted Journal (2025) Vol. 3, Iss. 1, pp. 165-179
Closed Access
Isamadeen A. Khalifa, Faris Keti
Deleted Journal (2025) Vol. 3, Iss. 1, pp. 165-179
Closed Access
Automated Evidence Collection and Analysis Using AI
Luay Albtosh
Advances in information security, privacy, and ethics book series (2024), pp. 143-186
Closed Access | Times Cited: 2
Luay Albtosh
Advances in information security, privacy, and ethics book series (2024), pp. 143-186
Closed Access | Times Cited: 2
Combatting Deepfakes
Ngozi Tracy Aleke
Advances in information security, privacy, and ethics book series (2024), pp. 375-412
Closed Access | Times Cited: 1
Ngozi Tracy Aleke
Advances in information security, privacy, and ethics book series (2024), pp. 375-412
Closed Access | Times Cited: 1
Digital Forensic Data Mining and Pattern Recognition
Luay Albtosh
Advances in information security, privacy, and ethics book series (2024), pp. 245-294
Closed Access | Times Cited: 1
Luay Albtosh
Advances in information security, privacy, and ethics book series (2024), pp. 245-294
Closed Access | Times Cited: 1
The Role of Cybersecurity Legislation in Promoting Data Privacy
Ngozi Tracy Aleke
Advances in information security, privacy, and ethics book series (2024), pp. 205-244
Closed Access
Ngozi Tracy Aleke
Advances in information security, privacy, and ethics book series (2024), pp. 205-244
Closed Access
Advances in Cybersecurity and AI: Integrating Machine Learning, IoT, and Smart Systems for Resilience and Innovation Across Domains
Yara Shamoo
World Journal of Advanced Research and Reviews (2024) Vol. 23, Iss. 2, pp. 2450-2461
Open Access
Yara Shamoo
World Journal of Advanced Research and Reviews (2024) Vol. 23, Iss. 2, pp. 2450-2461
Open Access
Comparative Analysis of LLMs vs. Traditional Methods in Vulnerability Detection
Yara Shamoo
Advances in information security, privacy, and ethics book series (2024), pp. 335-374
Closed Access
Yara Shamoo
Advances in information security, privacy, and ethics book series (2024), pp. 335-374
Closed Access
Source Code Analysis With Deep Neural Networks
Rebet Jones
Advances in information security, privacy, and ethics book series (2024), pp. 355-378
Closed Access
Rebet Jones
Advances in information security, privacy, and ethics book series (2024), pp. 355-378
Closed Access