
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Anomaly Detection in 6G Networks Using Machine Learning Methods
Mamoon M. Saeed, Rashid A. Saeed, Maha Abdelhaq, et al.
Electronics (2023) Vol. 12, Iss. 15, pp. 3300-3300
Open Access | Times Cited: 34
Mamoon M. Saeed, Rashid A. Saeed, Maha Abdelhaq, et al.
Electronics (2023) Vol. 12, Iss. 15, pp. 3300-3300
Open Access | Times Cited: 34
Showing 1-25 of 34 citing articles:
6G Networks and the AI Revolution—Exploring Technologies, Applications, and Emerging Challenges
Robin Chataut, Mary Nankya, Robert Akl
Sensors (2024) Vol. 24, Iss. 6, pp. 1888-1888
Open Access | Times Cited: 33
Robin Chataut, Mary Nankya, Robert Akl
Sensors (2024) Vol. 24, Iss. 6, pp. 1888-1888
Open Access | Times Cited: 33
CYBERSECURITY ANALYTICS IN PROTECTING SATELLITE TELECOMMUNICATIONS NETWORKS: A CONCEPTUAL DEVELOPMENT OF CURRENT TRENDS, CHALLENGES, AND STRATEGIC RESPONSES
Enyinaya Stefano Okafor, Olatunji Akinrinola, Favour Oluwadamilare Usman, et al.
International Journal of Applied Research in Social Sciences (2024) Vol. 6, Iss. 3, pp. 254-266
Open Access | Times Cited: 29
Enyinaya Stefano Okafor, Olatunji Akinrinola, Favour Oluwadamilare Usman, et al.
International Journal of Applied Research in Social Sciences (2024) Vol. 6, Iss. 3, pp. 254-266
Open Access | Times Cited: 29
From Efficiency to Sustainability: Exploring the Potential of 6G for a Greener Future
Rohit Kumar, Saurav Kumar Gupta, Hwang-Cheng Wang, et al.
Sustainability (2023) Vol. 15, Iss. 23, pp. 16387-16387
Open Access | Times Cited: 34
Rohit Kumar, Saurav Kumar Gupta, Hwang-Cheng Wang, et al.
Sustainability (2023) Vol. 15, Iss. 23, pp. 16387-16387
Open Access | Times Cited: 34
A cognitive security framework for detecting intrusions in IoT and 5G utilizing deep learning
Umesh Kumar Lilhore, Surjeet Dalal, Sarita Simaiya
Computers & Security (2023) Vol. 136, pp. 103560-103560
Closed Access | Times Cited: 26
Umesh Kumar Lilhore, Surjeet Dalal, Sarita Simaiya
Computers & Security (2023) Vol. 136, pp. 103560-103560
Closed Access | Times Cited: 26
A Systematic Survey on 5G and 6G Security Considerations, Challenges, Trends, and Research Areas
Paul Scalise, Matthew Boeding, Michael Hempel, et al.
Future Internet (2024) Vol. 16, Iss. 3, pp. 67-67
Open Access | Times Cited: 10
Paul Scalise, Matthew Boeding, Michael Hempel, et al.
Future Internet (2024) Vol. 16, Iss. 3, pp. 67-67
Open Access | Times Cited: 10
Real-time fusion multi-tier DNN-based collaborative IDPS with complementary features for secure UAV-enabled 6G networks
Hassan Jalil Hadi, Yue Cao, Sifan Li, et al.
Expert Systems with Applications (2024) Vol. 252, pp. 124215-124215
Closed Access | Times Cited: 10
Hassan Jalil Hadi, Yue Cao, Sifan Li, et al.
Expert Systems with Applications (2024) Vol. 252, pp. 124215-124215
Closed Access | Times Cited: 10
Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges
Ziadoon Kamil Maseer, Qusay Kanaan Kadhim, Baidaa Al‐Bander, et al.
IET Networks (2024) Vol. 13, Iss. 5-6, pp. 339-376
Open Access | Times Cited: 6
Ziadoon Kamil Maseer, Qusay Kanaan Kadhim, Baidaa Al‐Bander, et al.
IET Networks (2024) Vol. 13, Iss. 5-6, pp. 339-376
Open Access | Times Cited: 6
Artificial intelligence advances in anomaly detection for telecom networks
Enerst Edozie, Aliyu Nuhu Shuaibu, Bashir Olaniyi Sadiq, et al.
Artificial Intelligence Review (2025) Vol. 58, Iss. 4
Open Access
Enerst Edozie, Aliyu Nuhu Shuaibu, Bashir Olaniyi Sadiq, et al.
Artificial Intelligence Review (2025) Vol. 58, Iss. 4
Open Access
Enhancing Medical Services Through Machine Learning and UAV Technology
Rashid A. Saeed, Mamoon M. Saeed, Zeinab E. Ahmed, et al.
Advances in computational intelligence and robotics book series (2024), pp. 307-343
Open Access | Times Cited: 3
Rashid A. Saeed, Mamoon M. Saeed, Zeinab E. Ahmed, et al.
Advances in computational intelligence and robotics book series (2024), pp. 307-343
Open Access | Times Cited: 3
Enhancing anomaly detection: A comprehensive approach with MTBO feature selection and TVETBO Optimized Quad-LSTM classification
RajaSekhar Reddy N V, N SreeDivya, J. N., et al.
Computers & Electrical Engineering (2024) Vol. 119, pp. 109536-109536
Closed Access | Times Cited: 3
RajaSekhar Reddy N V, N SreeDivya, J. N., et al.
Computers & Electrical Engineering (2024) Vol. 119, pp. 109536-109536
Closed Access | Times Cited: 3
TinyML for 5G networks
Mamoon M. Saeed, Rashid A. Saeed, Zeinab E. Ahmed
Elsevier eBooks (2024), pp. 167-229
Closed Access | Times Cited: 2
Mamoon M. Saeed, Rashid A. Saeed, Zeinab E. Ahmed
Elsevier eBooks (2024), pp. 167-229
Closed Access | Times Cited: 2
Blockchain and AI for Collaborative Intrusion Detection in 6G-enabled IoT Networks
Massinissa Chelghoum, Gueltoum Bendiab, Mohamed Aymen Labiod, et al.
(2024), pp. 179-184
Closed Access | Times Cited: 2
Massinissa Chelghoum, Gueltoum Bendiab, Mohamed Aymen Labiod, et al.
(2024), pp. 179-184
Closed Access | Times Cited: 2
Energy Efficient CH Selection Scheme Based on ABC and Q-Learning Approaches for IoUT Applications
Elmustafa Sayed Ali, Rashid A. Saeed, Ibrahim Khider Eltahir, et al.
Systems (2023) Vol. 11, Iss. 11, pp. 529-529
Open Access | Times Cited: 6
Elmustafa Sayed Ali, Rashid A. Saeed, Ibrahim Khider Eltahir, et al.
Systems (2023) Vol. 11, Iss. 11, pp. 529-529
Open Access | Times Cited: 6
AI Technologies in Engineering Education
Mamoon M. Saeed, Rashid A. Saeed, Zeinab E. Ahmed, et al.
Advances in educational technologies and instructional design book series (2024), pp. 61-87
Closed Access | Times Cited: 1
Mamoon M. Saeed, Rashid A. Saeed, Zeinab E. Ahmed, et al.
Advances in educational technologies and instructional design book series (2024), pp. 61-87
Closed Access | Times Cited: 1
Support Vector Machine (SVM) to Predict Risk Factors in the 6G Cyber Digital Transformation Process of Enterprises
Yizhou Zhao, Caishuang Hu, Rukai Wang
Wireless Personal Communications (2024)
Closed Access | Times Cited: 1
Yizhou Zhao, Caishuang Hu, Rukai Wang
Wireless Personal Communications (2024)
Closed Access | Times Cited: 1
6G Cyber Physical System Based Smart Healthcare Modelling by Mobile Edge Network and Artificial Intelligence
Kama Ramudu, Sushil Kumar, C. K. Shahnazeer, et al.
Wireless Personal Communications (2024)
Closed Access | Times Cited: 1
Kama Ramudu, Sushil Kumar, C. K. Shahnazeer, et al.
Wireless Personal Communications (2024)
Closed Access | Times Cited: 1
Federated LSTM Model for Enhanced Anomaly Detection in Cyber Security: A Novel Approach for Distributed Threat
Aradhana Sahu, Yousef A. Baker El‐Ebiary, K. Saravanan, et al.
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 6
Open Access | Times Cited: 1
Aradhana Sahu, Yousef A. Baker El‐Ebiary, K. Saravanan, et al.
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 6
Open Access | Times Cited: 1
Enhancing early attack detection: novel hybrid density-based isolation forest for improved anomaly detection
M. Nalini, B. Yamini, C. Ambhika, et al.
International Journal of Machine Learning and Cybernetics (2024)
Closed Access | Times Cited: 1
M. Nalini, B. Yamini, C. Ambhika, et al.
International Journal of Machine Learning and Cybernetics (2024)
Closed Access | Times Cited: 1
Machine Learning Techniques for Detecting DDOS Attacks
Mamoon M. Saeed, Husam Nedhal Rashad Mohammed, Othman Abdulkafi Hazaea Gazem, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 4
Mamoon M. Saeed, Husam Nedhal Rashad Mohammed, Othman Abdulkafi Hazaea Gazem, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 4
Deep Error-Correcting Output Codes
Lina Wang, Hongxu Wei, Yuchen Zheng, et al.
Algorithms (2023) Vol. 16, Iss. 12, pp. 555-555
Open Access | Times Cited: 2
Lina Wang, Hongxu Wei, Yuchen Zheng, et al.
Algorithms (2023) Vol. 16, Iss. 12, pp. 555-555
Open Access | Times Cited: 2
Administrative Management Data Anomaly Access Detection Method, Based on 6G IoT
Yangmin Tu, Tao Zou
Wireless Personal Communications (2024)
Closed Access
Yangmin Tu, Tao Zou
Wireless Personal Communications (2024)
Closed Access
A Probabilistic Trust Model and Control Algorithm to Protect 6G Networks against Malicious Data Injection Attacks in Edge Computing Environments
Borja Bordel, Ramón Alcarria, Tomás Robles
Computer Modeling in Engineering & Sciences (2024) Vol. 141, Iss. 1, pp. 631-654
Open Access
Borja Bordel, Ramón Alcarria, Tomás Robles
Computer Modeling in Engineering & Sciences (2024) Vol. 141, Iss. 1, pp. 631-654
Open Access
Machine Learning Based Real-Time Self-Driving Car for Sudanese Autonomous Vehicular Markets
Mayada A. Ahmed, Rashid A. Saeed, Omer A. Mohammed, et al.
(2024), pp. 584-589
Closed Access
Mayada A. Ahmed, Rashid A. Saeed, Omer A. Mohammed, et al.
(2024), pp. 584-589
Closed Access
Multi-Access Edge Computing Using Intelligent Mobile User Resource Allocation In 6G
Mamoon M. Saeed, Rashid A. Saeed, Rania A. Mokhtar, et al.
(2024), pp. 369-374
Closed Access
Mamoon M. Saeed, Rashid A. Saeed, Rania A. Mokhtar, et al.
(2024), pp. 369-374
Closed Access
Overview on Technologies for Combating Interference and Noise Management in 5G and Beyond Network
Enoch Adama Jiya, Muhammad B. Muhammad, Stephen Korede Abolaji, et al.
Engineering and Technology Journal (2024) Vol. 09, Iss. 08
Open Access
Enoch Adama Jiya, Muhammad B. Muhammad, Stephen Korede Abolaji, et al.
Engineering and Technology Journal (2024) Vol. 09, Iss. 08
Open Access