
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Comparing Metaheuristic Search Techniques in Addressing the Effectiveness of Clustering-Based DDoS Attack Detection Methods
Alireza Zeinalpour, C. McElroy
Electronics (2024) Vol. 13, Iss. 5, pp. 899-899
Open Access | Times Cited: 4
Alireza Zeinalpour, C. McElroy
Electronics (2024) Vol. 13, Iss. 5, pp. 899-899
Open Access | Times Cited: 4
Showing 4 citing articles:
Advancing cybersecurity: a comprehensive review of AI-driven detection techniques
A Salem, Safaa M. Azzam, O. E. Emam, et al.
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 19
A Salem, Safaa M. Azzam, O. E. Emam, et al.
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 19
Mathematical Modeling and Clustering Framework for Cyber Threat Analysis Across Industries
Fahim Sufi, Musleh Alsulami
Mathematics (2025) Vol. 13, Iss. 4, pp. 655-655
Open Access | Times Cited: 1
Fahim Sufi, Musleh Alsulami
Mathematics (2025) Vol. 13, Iss. 4, pp. 655-655
Open Access | Times Cited: 1
A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies
Khalid Bennouk, Nawal Ait Aali, Younès El Bouzekri El Idrissi, et al.
Journal of Cybersecurity and Privacy (2024) Vol. 4, Iss. 4, pp. 853-908
Open Access | Times Cited: 1
Khalid Bennouk, Nawal Ait Aali, Younès El Bouzekri El Idrissi, et al.
Journal of Cybersecurity and Privacy (2024) Vol. 4, Iss. 4, pp. 853-908
Open Access | Times Cited: 1
Advancements in detecting, preventing, and mitigating DDoS attacks in cloud environments: A comprehensive systematic review of state-of-the-art approaches
Mohamed Ouhssini, Karim Afdel, Mohamed Akouhar, et al.
Egyptian Informatics Journal (2024) Vol. 27, pp. 100517-100517
Open Access
Mohamed Ouhssini, Karim Afdel, Mohamed Akouhar, et al.
Egyptian Informatics Journal (2024) Vol. 27, pp. 100517-100517
Open Access