
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Review of Machine Learning Algorithms for Cloud Computing Security
Umer Ahmed Butt, Muhammad Mehmood, Syed Bilal Hussain Shah, et al.
Electronics (2020) Vol. 9, Iss. 9, pp. 1379-1379
Open Access | Times Cited: 147
Umer Ahmed Butt, Muhammad Mehmood, Syed Bilal Hussain Shah, et al.
Electronics (2020) Vol. 9, Iss. 9, pp. 1379-1379
Open Access | Times Cited: 147
Showing 1-25 of 147 citing articles:
Comparative analysis of deep learning image detection algorithms
Shrey Srivastava, Amit Vishvas Divekar, Chandu Anilkumar, et al.
Journal Of Big Data (2021) Vol. 8, Iss. 1
Open Access | Times Cited: 232
Shrey Srivastava, Amit Vishvas Divekar, Chandu Anilkumar, et al.
Journal Of Big Data (2021) Vol. 8, Iss. 1
Open Access | Times Cited: 232
Coronavirus and Migration: Analysis of Human Mobility and the Spread of Covid-19
İbrahim Sirkeci, M. Murat Yüceşahin
MIGRATION LETTERS (2020) Vol. 17, Iss. 2, pp. 379-398
Closed Access | Times Cited: 151
İbrahim Sirkeci, M. Murat Yüceşahin
MIGRATION LETTERS (2020) Vol. 17, Iss. 2, pp. 379-398
Closed Access | Times Cited: 151
DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU)
Saif Ur Rehman, Mubashir Khaliq, Syed Ibrahim Imtiaz, et al.
Future Generation Computer Systems (2021) Vol. 118, pp. 453-466
Open Access | Times Cited: 133
Saif Ur Rehman, Mubashir Khaliq, Syed Ibrahim Imtiaz, et al.
Future Generation Computer Systems (2021) Vol. 118, pp. 453-466
Open Access | Times Cited: 133
Multi-Objective Task Scheduling Optimization for Load Balancing in Cloud Computing Environment Using Hybrid Artificial Bee Colony Algorithm With Reinforcement Learning
Boonhatai Kruekaew, Warangkhana Kimpan
IEEE Access (2022) Vol. 10, pp. 17803-17818
Open Access | Times Cited: 121
Boonhatai Kruekaew, Warangkhana Kimpan
IEEE Access (2022) Vol. 10, pp. 17803-17818
Open Access | Times Cited: 121
Achieving Balance Between Innovation and Security in the Cloud With Artificial Intelligence of Things
R. Sundar, P. Balaji Srikaanth, Darshana A. Naik, et al.
Advances in web technologies and engineering book series (2024), pp. 1-26
Closed Access | Times Cited: 14
R. Sundar, P. Balaji Srikaanth, Darshana A. Naik, et al.
Advances in web technologies and engineering book series (2024), pp. 1-26
Closed Access | Times Cited: 14
p73 in Cancer
Alessandro Rufini, Massimiliano Agostini, Francesca Grespi, et al.
Genes & Cancer (2011) Vol. 2, Iss. 4, pp. 491-502
Open Access | Times Cited: 135
Alessandro Rufini, Massimiliano Agostini, Francesca Grespi, et al.
Genes & Cancer (2011) Vol. 2, Iss. 4, pp. 491-502
Open Access | Times Cited: 135
Machine Learning for Cloud Security: A Systematic Review
Ali Bou Nassif, Manar Abu Talib, Qassim Nasir, et al.
IEEE Access (2021) Vol. 9, pp. 20717-20735
Open Access | Times Cited: 97
Ali Bou Nassif, Manar Abu Talib, Qassim Nasir, et al.
IEEE Access (2021) Vol. 9, pp. 20717-20735
Open Access | Times Cited: 97
A Survey on Securing Federated Learning: Analysis of Applications, Attacks, Challenges, and Trends
Helio N. Cunha Neto, Jernej Hribar, Ivana Dusparić, et al.
IEEE Access (2023) Vol. 11, pp. 41928-41953
Open Access | Times Cited: 30
Helio N. Cunha Neto, Jernej Hribar, Ivana Dusparić, et al.
IEEE Access (2023) Vol. 11, pp. 41928-41953
Open Access | Times Cited: 30
Towards an Intelligent Intrusion Detection System to Detect Malicious Activities in Cloud Computing
Hanaa Attou, Mouaad Mohy-eddine, Azidine Guezzaz, et al.
Applied Sciences (2023) Vol. 13, Iss. 17, pp. 9588-9588
Open Access | Times Cited: 30
Hanaa Attou, Mouaad Mohy-eddine, Azidine Guezzaz, et al.
Applied Sciences (2023) Vol. 13, Iss. 17, pp. 9588-9588
Open Access | Times Cited: 30
Information Security Risk Assessment Methods in Cloud Computing: Comprehensive Review
Tarek Ali, Mohammed Al-Khalidi, Rabab Al-Zaidi
Journal of Computer Information Systems (2024), pp. 1-28
Open Access | Times Cited: 11
Tarek Ali, Mohammed Al-Khalidi, Rabab Al-Zaidi
Journal of Computer Information Systems (2024), pp. 1-28
Open Access | Times Cited: 11
Resource allocation with efficient task scheduling in cloud computing using hierarchical auto-associative polynomial convolutional neural network
Sumathi Gurusamy, Rajesh Selvaraj
Expert Systems with Applications (2024) Vol. 249, pp. 123554-123554
Closed Access | Times Cited: 8
Sumathi Gurusamy, Rajesh Selvaraj
Expert Systems with Applications (2024) Vol. 249, pp. 123554-123554
Closed Access | Times Cited: 8
A comprehensive survey on digital video forensics: Taxonomy, challenges, and future directions
Abdul Rehman Javed, Zunera Jalil, Wisha Zehra, et al.
Engineering Applications of Artificial Intelligence (2021) Vol. 106, pp. 104456-104456
Open Access | Times Cited: 52
Abdul Rehman Javed, Zunera Jalil, Wisha Zehra, et al.
Engineering Applications of Artificial Intelligence (2021) Vol. 106, pp. 104456-104456
Open Access | Times Cited: 52
Applying different resampling strategies in machine learning models to predict head-cut gully erosion susceptibility
Fengjie Wang, Mehebub Sahana, Bahareh Pahlevanzadeh, et al.
Alexandria Engineering Journal (2021) Vol. 60, Iss. 6, pp. 5813-5829
Open Access | Times Cited: 48
Fengjie Wang, Mehebub Sahana, Bahareh Pahlevanzadeh, et al.
Alexandria Engineering Journal (2021) Vol. 60, Iss. 6, pp. 5813-5829
Open Access | Times Cited: 48
Artificial Intelligence for Metaverse: A Framework
Yuchen Guo, Tao Yu, Jiamin Wu, et al.
CAAI Artificial Intelligence Research (2022) Vol. 1, Iss. 1, pp. 54-67
Open Access | Times Cited: 35
Yuchen Guo, Tao Yu, Jiamin Wu, et al.
CAAI Artificial Intelligence Research (2022) Vol. 1, Iss. 1, pp. 54-67
Open Access | Times Cited: 35
A performance comparison study on PM2.5 prediction at industrial areas using different training algorithms of feedforward-backpropagation neural network (FBNN)
Pavithra Chinatamby, Jegalakshimi Jewaratnam
Chemosphere (2023) Vol. 317, pp. 137788-137788
Open Access | Times Cited: 21
Pavithra Chinatamby, Jegalakshimi Jewaratnam
Chemosphere (2023) Vol. 317, pp. 137788-137788
Open Access | Times Cited: 21
Research trends in deep learning and machine learning for cloud computing security
Yehia Ibrahim Alzoubi, Alok Mishra, Ahmet E. Topcu
Artificial Intelligence Review (2024) Vol. 57, Iss. 5
Closed Access | Times Cited: 5
Yehia Ibrahim Alzoubi, Alok Mishra, Ahmet E. Topcu
Artificial Intelligence Review (2024) Vol. 57, Iss. 5
Closed Access | Times Cited: 5
A New Secure Model for Cloud Environments Using RBFNN and AdaBoost
Hanaa Attou, Azidine Guezzaz, Said Benkirane, et al.
SN Computer Science (2025) Vol. 6, Iss. 2
Closed Access
Hanaa Attou, Azidine Guezzaz, Said Benkirane, et al.
SN Computer Science (2025) Vol. 6, Iss. 2
Closed Access
D2MIF: A Malicious Model Detection Mechanism for Federated-Learning-Empowered Artificial Intelligence of Things
Wenxin Liu, Hui Lin, Xiaoding Wang, et al.
IEEE Internet of Things Journal (2021) Vol. 10, Iss. 3, pp. 2141-2151
Closed Access | Times Cited: 36
Wenxin Liu, Hui Lin, Xiaoding Wang, et al.
IEEE Internet of Things Journal (2021) Vol. 10, Iss. 3, pp. 2141-2151
Closed Access | Times Cited: 36
Towards the Development of a Cloud Computing Intrusion Detection Framework Using an Ensemble Hybrid Feature Selection Approach
Noah Oghenefego Ogwara, Krassie Petrova, Mee Loong Yang
Journal of Computer Networks and Communications (2022) Vol. 2022, pp. 1-16
Open Access | Times Cited: 23
Noah Oghenefego Ogwara, Krassie Petrova, Mee Loong Yang
Journal of Computer Networks and Communications (2022) Vol. 2022, pp. 1-16
Open Access | Times Cited: 23
Recent Trends in Cloud Computing and IoT Platforms for IT Management and Development: A Review
Faizan Qaisar, Hammad Shahab, Muhammad Iqbal, et al.
Pakistan Journal of Engineering and Technology (2023) Vol. 6, Iss. 1, pp. 98-105
Open Access | Times Cited: 15
Faizan Qaisar, Hammad Shahab, Muhammad Iqbal, et al.
Pakistan Journal of Engineering and Technology (2023) Vol. 6, Iss. 1, pp. 98-105
Open Access | Times Cited: 15
Data security techniques in cloud computing based on machine learning algorithms and cryptographic algorithms: Lightweight algorithms and genetics algorithms
Fursan Thabit, Özgü Can, Rizwan Uz Zaman Wani, et al.
Concurrency and Computation Practice and Experience (2023) Vol. 35, Iss. 21
Closed Access | Times Cited: 15
Fursan Thabit, Özgü Can, Rizwan Uz Zaman Wani, et al.
Concurrency and Computation Practice and Experience (2023) Vol. 35, Iss. 21
Closed Access | Times Cited: 15
An Intelligent Framework for Cyber–Physical Satellite System and IoT-Aided Aerial Vehicle Security Threat Detection
Nazik Alturki, Turki Aljrees, Muhammad Umer, et al.
Sensors (2023) Vol. 23, Iss. 16, pp. 7154-7154
Open Access | Times Cited: 14
Nazik Alturki, Turki Aljrees, Muhammad Umer, et al.
Sensors (2023) Vol. 23, Iss. 16, pp. 7154-7154
Open Access | Times Cited: 14
Current Development, Challenges, and Future Trends in Cloud Computing: A Survey
Hazzaa Alshareef
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 3
Open Access | Times Cited: 13
Hazzaa Alshareef
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 3
Open Access | Times Cited: 13
Enhancing Cloud Security
Tarun Kumar Vashishth, Vikas Sharma, Kewal Krishan Sharma, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 85-112
Closed Access | Times Cited: 4
Tarun Kumar Vashishth, Vikas Sharma, Kewal Krishan Sharma, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 85-112
Closed Access | Times Cited: 4
An Intrusion System for Internet of Things Security Breaches Using Machine Learning Techniques
Temitope Samson Adekunle, Oluwaseyi Omotayo Alabı, Morolake Oladayo Lawrence, et al.
Artificial Intelligence and Applications (2024) Vol. 2, Iss. 3, pp. 188-194
Open Access | Times Cited: 4
Temitope Samson Adekunle, Oluwaseyi Omotayo Alabı, Morolake Oladayo Lawrence, et al.
Artificial Intelligence and Applications (2024) Vol. 2, Iss. 3, pp. 188-194
Open Access | Times Cited: 4