
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Review of Generative Models in Generating Synthetic Attack Data for Cybersecurity
Garima Agrawal, Amardeep Kaur, Sowmya Myneni
Electronics (2024) Vol. 13, Iss. 2, pp. 322-322
Open Access | Times Cited: 14
Garima Agrawal, Amardeep Kaur, Sowmya Myneni
Electronics (2024) Vol. 13, Iss. 2, pp. 322-322
Open Access | Times Cited: 14
Showing 14 citing articles:
Generative AI for Cyber Security: Analyzing the Potential of ChatGPT, DALL-E, and Other Models for Enhancing the Security Space
Siva Sai, Utkarsh Yashvardhan, Vinay Chamola, et al.
IEEE Access (2024) Vol. 12, pp. 53497-53516
Open Access | Times Cited: 17
Siva Sai, Utkarsh Yashvardhan, Vinay Chamola, et al.
IEEE Access (2024) Vol. 12, pp. 53497-53516
Open Access | Times Cited: 17
A novel deep synthesis-based insider intrusion detection (DS-IID) model for malicious insiders and AI-generated threats
Hazem M. Kotb, Tarek Gaber, Salem AlJanah, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Hazem M. Kotb, Tarek Gaber, Salem AlJanah, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Explainable deep learning approach for advanced persistent threats (APTs) detection in cybersecurity: a review
Noor Hazlina Abdul Mutalib, Aznul Qalid Md Sabri, Ainuddin Wahid Abdul Wahab, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 11
Open Access | Times Cited: 4
Noor Hazlina Abdul Mutalib, Aznul Qalid Md Sabri, Ainuddin Wahid Abdul Wahab, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 11
Open Access | Times Cited: 4
Real-Time Mouse Data Protection Method Using GANs for Image-Based User Authentication Based on GetCursorPos() and SetCursorPos() Functions
Jinwook Kim, Kyungroul Lee, Hanjo Jeong
Applied Sciences (2025) Vol. 15, Iss. 2, pp. 977-977
Open Access
Jinwook Kim, Kyungroul Lee, Hanjo Jeong
Applied Sciences (2025) Vol. 15, Iss. 2, pp. 977-977
Open Access
An Enhanced LSTM Approach for Detecting IoT-Based DDoS Attacks Using Honeypot Data
Arjun Kumar Bose Arnob, M. F. Mridha, Mejdl Safran, et al.
International Journal of Computational Intelligence Systems (2025) Vol. 18, Iss. 1
Open Access
Arjun Kumar Bose Arnob, M. F. Mridha, Mejdl Safran, et al.
International Journal of Computational Intelligence Systems (2025) Vol. 18, Iss. 1
Open Access
Balancing the Scale: Data Augmentation Techniques for Improved Supervised Learning in Cyberattack Detection
Kateryna Medvedieva, Tommaso Tosi, Enrico Barbierato, et al.
Eng—Advances in Engineering (2024) Vol. 5, Iss. 3, pp. 2170-2205
Open Access | Times Cited: 1
Kateryna Medvedieva, Tommaso Tosi, Enrico Barbierato, et al.
Eng—Advances in Engineering (2024) Vol. 5, Iss. 3, pp. 2170-2205
Open Access | Times Cited: 1
Towards Autonomous Cybersecurity: A Comparative Analysis of Agnostic and Hybrid AI Approaches for Advanced Persistent Threat Detection
Adrián Hernández-Rivas, Víctor Morales-Rocha, J. Patricia Sánchez-Solís
Studies in computational intelligence (2024), pp. 181-219
Closed Access | Times Cited: 1
Adrián Hernández-Rivas, Víctor Morales-Rocha, J. Patricia Sánchez-Solís
Studies in computational intelligence (2024), pp. 181-219
Closed Access | Times Cited: 1
Generating Attribute Similarity Graphs: A User Behavior-Based Approach from Real- Time Microblogging Data on Platform X
Md Ahsan Ul Hasan, Azuraliza Abu Bakar, Mohd Ridzwan Yaakub
Research Square (Research Square) (2024)
Open Access
Md Ahsan Ul Hasan, Azuraliza Abu Bakar, Mohd Ridzwan Yaakub
Research Square (Research Square) (2024)
Open Access
Guardians of the Digital Realm
Manas Kumar Yogi, Yamuna Mundru, Atti Manga Devi
Advances in computational intelligence and robotics book series (2024), pp. 289-321
Closed Access
Manas Kumar Yogi, Yamuna Mundru, Atti Manga Devi
Advances in computational intelligence and robotics book series (2024), pp. 289-321
Closed Access
Generative AI in Network Security and Intrusion Detection
Siva Raja Sindiramutty, Krishna Raj V. Prabagaran, N. Z. Jhanjhi, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 77-124
Closed Access
Siva Raja Sindiramutty, Krishna Raj V. Prabagaran, N. Z. Jhanjhi, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 77-124
Closed Access
Case Studies and Applications of Generative AI in Real-World Cybersecurity Scenarios
Azeem Khan, N. Z. Jhanjhi, Ghassan Ahmed Alı, et al.
Advances in human and social aspects of technology book series (2024), pp. 61-100
Closed Access
Azeem Khan, N. Z. Jhanjhi, Ghassan Ahmed Alı, et al.
Advances in human and social aspects of technology book series (2024), pp. 61-100
Closed Access
Introduction to Generative AI in Cybersecurity
Azeem Khan, N. Z. Jhanjhi, Ghassan Ahmed Ali Abdulhabeb, et al.
Advances in human and social aspects of technology book series (2024), pp. 1-44
Closed Access
Azeem Khan, N. Z. Jhanjhi, Ghassan Ahmed Ali Abdulhabeb, et al.
Advances in human and social aspects of technology book series (2024), pp. 1-44
Closed Access
Empowering Security Analysts With Generative AI Tools
Syeda Mariam Muzammal, Ruqia Bibi, Hira Waseem, et al.
Advances in human and social aspects of technology book series (2024), pp. 101-130
Closed Access
Syeda Mariam Muzammal, Ruqia Bibi, Hira Waseem, et al.
Advances in human and social aspects of technology book series (2024), pp. 101-130
Closed Access
Comparative Investigation of Traditional Machine-Learning Models and Transformer Models for Phishing Email Detection
René Meléndez, Michał Ptaszyński, Fumito Masui
Electronics (2024) Vol. 13, Iss. 24, pp. 4877-4877
Open Access
René Meléndez, Michał Ptaszyński, Fumito Masui
Electronics (2024) Vol. 13, Iss. 24, pp. 4877-4877
Open Access