OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies
Mahdi Rabbani, Yongli Wang, Reza Khoshkangini, et al.
Entropy (2021) Vol. 23, Iss. 5, pp. 529-529
Open Access | Times Cited: 37

Showing 1-25 of 37 citing articles:

A Novel Approach for Network Intrusion Detection Using Multistage Deep Learning Image Recognition
Jevgenijus Toldinas, Algimantas Venčkauskas, Robertas Damaševičius, et al.
Electronics (2021) Vol. 10, Iss. 15, pp. 1854-1854
Open Access | Times Cited: 91

A Systematic Review on Machine Learning and Deep Learning Models for Electronic Information Security in Mobile Networks
Chaitanya Gupta, Ishita Johri, Kathiravan Srinivasan, et al.
Sensors (2022) Vol. 22, Iss. 5, pp. 2017-2017
Open Access | Times Cited: 57

ID-RDRL: a deep reinforcement learning-based feature selection intrusion detection model
Kezhou Ren, Yifan Zeng, Zhiqin Cao, et al.
Scientific Reports (2022) Vol. 12, Iss. 1
Open Access | Times Cited: 38

A comprehensive review of machine learning's role in enhancing network security and threat detection
Akoh Atadoga, Enoch Oluwademilade Sodiya, Uchenna Joseph Umoga, et al.
World Journal of Advanced Research and Reviews (2024) Vol. 21, Iss. 2, pp. 877-886
Open Access | Times Cited: 10

Deep learning hybridization for improved malware detection in smart Internet of Things
Abdulwahab Ali Almazroi, Nasir Ayub
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 9

Dual replay memory reinforcement learning framework for minority attack detection
Ankit Sharma, Manjeet Singh
Engineering Applications of Artificial Intelligence (2025) Vol. 144, pp. 110083-110083
Closed Access

Network Anomaly Detection Using Quantum Neural Networks on Noisy Quantum Computers
Alon Kukliansky, Marko Orescanin, Chad Bollmann, et al.
IEEE Transactions on Quantum Engineering (2024) Vol. 5, pp. 1-11
Open Access | Times Cited: 4

Playing to Save Sisters: How Female Gaming Communities Foster Social Support within Different Cultural Contexts
Zizhong Zhang, Haixin Mu, Sida Huang
Journal of Broadcasting & Electronic Media (2023) Vol. 67, Iss. 5, pp. 693-713
Closed Access | Times Cited: 8

Framing Network Flow for Anomaly Detection Using Image Recognition and Federated Learning
Jevgenijus Toldinas, Algimantas Venčkauskas, Agnius Liutkevičius, et al.
Electronics (2022) Vol. 11, Iss. 19, pp. 3138-3138
Open Access | Times Cited: 13

Proactive Threat Hunting in Critical Infrastructure Protection through Hybrid Machine Learning Algorithm Application
Shan Ali, Seunghwan Myeong
Sensors (2024) Vol. 24, Iss. 15, pp. 4888-4888
Open Access | Times Cited: 2

Non-Targeted Analytical Technology in Herbal Medicines: Applications, Challenges, and Perspectives
Chaoping Li, Yuanzhong Wang
Critical Reviews in Analytical Chemistry (2022) Vol. 54, Iss. 7, pp. 1951-1970
Closed Access | Times Cited: 11

Contrastive Learning Over Random Fourier Features for IoT Network Intrusion Detection
Manuel López-Martín, Antonio Sánchez-Esguevillas, Juan Ignacio Arribas, et al.
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 10, pp. 8505-8513
Closed Access | Times Cited: 10

An efficient blockchain‐based approach to improve the accuracy of intrusion detection systems
Ahmed Aliyu, Jinshuo Liu, Ezekia Gilliard
Electronics Letters (2023) Vol. 59, Iss. 18
Open Access | Times Cited: 4

Extensive Review of Security and Privacy Issues in Heterogeneous Networks
Mmasi Patience Robai
World Journal of Advanced Research and Reviews (2024) Vol. 23, Iss. 1, pp. 2955-2984
Open Access | Times Cited: 1

Zero Trust Cybersecurity: Procedures and Considerations in Context
Brady Lund, Tae-Hee Lee, Ziang Wang, et al.
Encyclopedia (2024) Vol. 4, Iss. 4, pp. 1520-1533
Open Access

Malicious behavior detection in cloud using self‐optimized dynamic kernel convolutional neural network
Abrar M. Alajlan, Marwah Almasri
Transactions on Emerging Telecommunications Technologies (2022) Vol. 33, Iss. 5
Closed Access | Times Cited: 3

A Comprehensive Review of Anomaly Detection in Web Logs
Mehryar Majd, Pejman Najafi, Seyed Ali Alhosseini, et al.
(2022), pp. 158-165
Closed Access | Times Cited: 3

Detecting Malicious Accounts in Cyberspace: Enhancing Security in ChatGPT and Beyond
Said A. Salloum
Studies in big data (2024), pp. 653-666
Closed Access

Improving credit card fraud detection using machine learning and GAN technology
Najwan Thair Ali, Shahad Jasim Hasan, Ahmad Ghandour, et al.
BIO Web of Conferences (2024) Vol. 97, pp. 00076-00076
Open Access

Evaluating the Performance and Challenges of Machine Learning Models in Network Anomaly Detection
Sakshi Bakhare, Sudhir W. Mohod
International Journal of Scientific Research in Science Engineering and Technology (2024) Vol. 11, Iss. 3, pp. 42-52
Open Access

Cyber Sentinels: Illuminating Malicious Intent in Social Networks Using Dual-Powered CHAM
Sailaja Terumalasetti, S R Reeja
(2024), pp. 58-74
Closed Access

A Study on Network Anomaly Detection Using Stacking-Based Machine Learning Algorithms for ASNM Datasets
M. Thangavel, Het Patel, Adil Mustafa Khokhawala, et al.
Lecture notes in networks and systems (2024), pp. 501-512
Closed Access

Novel Intrusion Detection Approach in Unbalanced Network Traffic Using Modified Random Forest Algorithm
Pallam Ravi, N. Saravanan, D. Sriramu, et al.
(2024), pp. 78-87
Closed Access

Page 1 - Next Page

Scroll to top