OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Effectiveness Evaluation of Different IDSs Using Integrated Fuzzy MCDM Model
Hashem Alyami, Md Tarique Jamal Ansari, Abdullah Alharbi, et al.
Electronics (2022) Vol. 11, Iss. 6, pp. 859-859
Open Access | Times Cited: 26

Showing 1-25 of 26 citing articles:

Multi-Attribute Decision-Making for Intrusion Detection Systems: A Systematic Review
Amneh Alamleh, O. S. Albahri, A. A. Zaidan, et al.
International Journal of Information Technology & Decision Making (2022) Vol. 22, Iss. 01, pp. 589-636
Open Access | Times Cited: 31

Quantitative assessment of sustainable renewable energy through soft computing: Fuzzy AHP-TOPSIS method
Mohammed A. Alghassab
Energy Reports (2022) Vol. 8, pp. 12139-12152
Open Access | Times Cited: 31

Towards Design and Development of Security Assessment Framework for Internet of Medical Things
Fahad Ahmed Al-Zahrani, Masood Ahmad, Md Tarique Jamal Ansari
Applied Sciences (2022) Vol. 12, Iss. 16, pp. 8148-8148
Open Access | Times Cited: 29

Tier-Based Optimization for Synthesized Network Intrusion Detection System
Murtaza Ahmed Siddiqi, Wooguil Pak
IEEE Access (2022) Vol. 10, pp. 108530-108544
Open Access | Times Cited: 29

Fuzzy-Based Unified Decision-Making Technique to Evaluate Security Risks: A Healthcare Perspective
Abdulaziz Attaallah, Khalil al-Sulbi, Areej Alasiry, et al.
Mathematics (2023) Vol. 11, Iss. 11, pp. 2554-2554
Open Access | Times Cited: 15

Multiple Sustainability Criteria Mapping of Gas Station Incident Consequences and Subsequent Decision Optimisation
David Jones, О. П. Иванов, Olena О. Arsirii, et al.
European Journal of Operational Research (2025)
Open Access

Identification and selection of systems security engineering approach via bipolar fuzzy multi-criteria decision-making technique based on generalized power operators
Xiaopeng Yang, Ubaid ur Rehman, Kholood Alnefaie, et al.
Engineering Applications of Artificial Intelligence (2025) Vol. 152, pp. 110825-110825
Closed Access

Analysis and Ranking of IT Risk Factors Using Fuzzy TOPSIS-Based Approach
Haya Mesfer Alshahrani, Saud S. Alotaibi, Md Tarique Jamal Ansari, et al.
Applied Sciences (2022) Vol. 12, Iss. 12, pp. 5911-5911
Open Access | Times Cited: 16

A Multi-Criteria Decision-Making Process for the Selection of an Efficient and Reliable IoT Application
Bader Alojaiman
Processes (2023) Vol. 11, Iss. 5, pp. 1313-1313
Open Access | Times Cited: 9

Multi-Criteria Decision-Making Approach for Laptop Selection: A Case Study
Harpreet Kaur Channi, Ramandeep Sandhu, Mohammad Faiz, et al.
(2023), pp. 1-5
Closed Access | Times Cited: 7

Evaluating modern intrusion detection methods in the face of Gen V multi-vector attacks with fuzzy AHP-TOPSIS
Wajdi Alhakami
PLoS ONE (2024) Vol. 19, Iss. 5, pp. e0302559-e0302559
Open Access | Times Cited: 2

Environmental and Social Factors in Supplier Assessment: Fuzzy-Based Green Supplier Selection
Torky Althaqafi
Sustainability (2023) Vol. 15, Iss. 21, pp. 15643-15643
Open Access | Times Cited: 3

Understanding Medical 4.0 implementation through enablers: An integrated multi-criteria decision-making approach
Nahid Akhtar, Abid Haleem, Mohd Javaid, et al.
Informatics and Health (2023) Vol. 1, Iss. 1, pp. 29-39
Open Access | Times Cited: 3

Analyzing the Impact of Blockchain Models for Securing Intelligent Logistics through Unified Computational Techniques
Mohammed Alsaqer, Majid H. Alsulami, Rami N. Alkhawaji, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 77, Iss. 3, pp. 3943-3968
Open Access | Times Cited: 2

An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions
Mohamed Abdel‐Basset, Abduallah Gamal, Karam M. Sallam, et al.
Sensors (2022) Vol. 22, Iss. 11, pp. 4123-4123
Open Access | Times Cited: 4

Advancing Intrusion Detection Precision Through Analysis of Diverse Classification Algorithms
J Suriya Prakash, Snehitha Narasani, N. Thangadurai, et al.
(2024), pp. 1-6
Closed Access

Evaluating Sniffers, IDS, and IPS: A Systematic Literature Mapping
Raúl Bayón-Martínez, Laura Inyesto-Alonso, Adrián Campazas, et al.
Lecture notes in networks and systems (2024), pp. 157-167
Closed Access

IDS-DEEP: a strategy for selecting the best IDS for Drones with heterogeneous EmbEdded Platforms
Louis Morge-Rollet, Camélia Slimani, Laurent Lemarchand, et al.
(2024), pp. 138-147
Closed Access

Intelligent Robots and Cobots
G. Ganesh Kumar, S Kanakaprabha
(2024), pp. 131-157
Open Access

Impact of Globalization on Entrepreneurship Growth in India Under Industry 5.0
Suniti Chandiok, Amruta Yadav
Advances in business strategy and competitive advantage book series (2024), pp. 187-214
Closed Access

Advancements in Industry 5.0
Gurwinder Kaur Dua
Advances in human resources management and organizational development book series (2024), pp. 243-264
Closed Access

Page 1 - Next Page

Scroll to top