OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning—A Review
Mostofa Ahsan, Kendall E. Nygard, Rahul Gomes, et al.
Journal of Cybersecurity and Privacy (2022) Vol. 2, Iss. 3, pp. 527-555
Open Access | Times Cited: 87

Showing 1-25 of 87 citing articles:

Analysis of Cyber Security Attacks and Its Solutions for the Smart grid Using Machine Learning and Blockchain Methods
Tehseen Mazhar, Hafiz Muhammad Irfan, Sunawar Khan, et al.
Future Internet (2023) Vol. 15, Iss. 2, pp. 83-83
Open Access | Times Cited: 82

Securing Industrial Control Systems: Components, Cyber Threats, and Machine Learning-Driven Defense Strategies
Mary Nankya, Robin Chataut, Robert Akl
Sensors (2023) Vol. 23, Iss. 21, pp. 8840-8840
Open Access | Times Cited: 27

Global Digital Convergence: Impact of Cybersecurity, Business Transparency, Economic Transformation, and AML Efficiency
Aleksandra Kuzior, Tetiana Anatoliivna Vasylieva, Оlha Кuzmenko, et al.
Journal of Open Innovation Technology Market and Complexity (2022) Vol. 8, Iss. 4, pp. 195-195
Open Access | Times Cited: 31

Multiverse Recurrent Expansion With Multiple Repeats: A Representation Learning Algorithm for Electricity Theft Detection in Smart Grids
Tarek Berghout, Mohamed Benbouzid, Mohamed Amine Ferrag
IEEE Transactions on Smart Grid (2023) Vol. 14, Iss. 6, pp. 4693-4703
Closed Access | Times Cited: 17

Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation
Mirza Akhi Khatun, Sanober Farheen Memon, Ciarán Eising, et al.
IEEE Access (2023) Vol. 11, pp. 145869-145896
Open Access | Times Cited: 17

An intelligent context-aware threat detection and response model for smart cyber-physical systems
Zainab Noor, Sadaf Hina, Faisal Hayat, et al.
Internet of Things (2023) Vol. 23, pp. 100843-100843
Open Access | Times Cited: 16

Employing Deep Reinforcement Learning to Cyber-Attack Simulation for Enhancing Cybersecurity
Sang Ho Oh, Jeongyoon Kim, Jae Hoon Nah, et al.
Electronics (2024) Vol. 13, Iss. 3, pp. 555-555
Open Access | Times Cited: 6

Attack classification in network intrusion detection system based on optimization strategy and deep learning methodology
Et al. Ch. Kodanda Ramu, T. Srinivasa Rao, E. Uma Shankar Rao
Multimedia Tools and Applications (2024) Vol. 83, Iss. 31, pp. 75533-75555
Closed Access | Times Cited: 5

A Comprehensive Review on Cybersecurity Issues and Their Mitigation Measures in FinTech
Guma Ali, Maad M. Mijwil, Bosco Apparatus Buruga, et al.
Iraqi Journal for Computer Science and Mathematics (2024) Vol. 5, Iss. 3
Open Access | Times Cited: 5

Advanced Computational Techniques for Analyzing Cybersecurity Event Datasets Using Artificial Intelligence and Machine Learning
Neelam Kumari, Ashok Kumar
SCT Proceedings in Interdisciplinary Insights and Innovations. (2025) Vol. 3, pp. 524-524
Closed Access

Mitigating Cyber Attacks for Organization Assets using UEBA (User and Entity Behavior Analytics) and other Machine Learning Solutions from Cloud Security Threats: A Literature Review
Eric Blancaflor, Keith Christian Esteron, Andrade Cy, et al.
Network Security (2025) Vol. 2024, Iss. 9, pp. 25-31
Closed Access

Detecting Malware C&C Communication Traffic Using Artificial Intelligence Techniques
Mohamed Ali Kazi
Journal of Cybersecurity and Privacy (2025) Vol. 5, Iss. 1, pp. 4-4
Open Access

Enhancing security of mobile crowd sensing in unmanned aerial vehicle ecosystems
Sara Sumaidaa, Hamda Almenhali, Mohammed Alazzani, et al.
Frontiers in Communications and Networks (2025) Vol. 6
Open Access

AI and Healthcare Analytics
Sunil Kumar Gupta, Monit Kapoor, Sanjoy Kumar Debnath
(2025), pp. 87-100
Closed Access

COUNTERMEASURE TO MAN-IN-THE-MIDDLE ATTACK BASED ON EMAIL HIJACKING USING TRY-HYBRID SUPERVISED LEARNING TECHNIQUES
Mohammed Nasir, Danlami Gabi, Salihu Alhassan Libata, et al.
FUDMA Journal of Sciences (2025) Vol. 9, Iss. 2, pp. 66-74
Closed Access

Arquitectura de seguridad multinivel con enfoque predictivo para sistemas de almacenamiento distribuido en infraestructuras Cloud
Diana Carolina Decimavilla-Alarcón, Enrique Joel Murillo-Ávila
Deleted Journal (2025) Vol. 3, Iss. 1, pp. 125-136
Closed Access

Machine Learning for Cybersecurity: Ransomware Detection with SVM
Wira Zanoramy A. Zakaria, Muzzamil Aziz, Sharifah Roziah Mohd Kassim
(2025), pp. 2173-2180
Closed Access

Machine Learning Approaches in Cybersecurity to Enhance Security in Future Network Technologies
Sultan Ahmad, Md. Alimul Haque, Hikmat A. M. Abdeljaber, et al.
SN Computer Science (2025) Vol. 6, Iss. 4
Closed Access

Deep learning technology of computer network security detection based on artificial intelligence
Qinghui Liu, Tianping Zhang
Computers & Electrical Engineering (2023) Vol. 110, pp. 108813-108813
Closed Access | Times Cited: 13

CybAttT: A Dataset of Cyberattack News Tweets for Enhanced Threat Intelligence
Huda Lughbi, Mourad Mars, Khaled H. Almotairi
Data (2024) Vol. 9, Iss. 3, pp. 39-39
Open Access | Times Cited: 4

Enhancing threat detection in Identity and Access Management (IAM) systems
Nikhil Ghadge
International Journal of Science and Research Archive (2024) Vol. 11, Iss. 2, pp. 2050-2057
Open Access | Times Cited: 4

Deep Reinforcement Learning for Adaptive Cyber Defense in Network Security
Atheer Alaa Hammad, Saadaldeen Rashid Ahmed, Mohammad K. Abdul-Hussein, et al.
(2024), pp. 292-297
Closed Access | Times Cited: 4

Understanding APT detection using Machine learning algorithms: Is superior accuracy a thing?
Sydul Arefin, Md Minhaz Chowdhury, Rezwanul Parvez, et al.
(2024), pp. 532-537
Closed Access | Times Cited: 4

The types of hackers and cyberattacks in the aviation industry
Lázaro Florido-Benítez
Journal of Transportation Security (2024) Vol. 17, Iss. 1
Open Access | Times Cited: 4

Combining Markov and Semi-Markov Modelling for Assessing Availability and Cybersecurity of Cloud and IoT Systems
Vyacheslav Kharchenko, Yuriy Ponochovnyi, Oleg Ivanchenko, et al.
Cryptography (2022) Vol. 6, Iss. 3, pp. 44-44
Open Access | Times Cited: 19

Page 1 - Next Page

Scroll to top