
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning—A Review
Mostofa Ahsan, Kendall E. Nygard, Rahul Gomes, et al.
Journal of Cybersecurity and Privacy (2022) Vol. 2, Iss. 3, pp. 527-555
Open Access | Times Cited: 87
Mostofa Ahsan, Kendall E. Nygard, Rahul Gomes, et al.
Journal of Cybersecurity and Privacy (2022) Vol. 2, Iss. 3, pp. 527-555
Open Access | Times Cited: 87
Showing 1-25 of 87 citing articles:
Analysis of Cyber Security Attacks and Its Solutions for the Smart grid Using Machine Learning and Blockchain Methods
Tehseen Mazhar, Hafiz Muhammad Irfan, Sunawar Khan, et al.
Future Internet (2023) Vol. 15, Iss. 2, pp. 83-83
Open Access | Times Cited: 82
Tehseen Mazhar, Hafiz Muhammad Irfan, Sunawar Khan, et al.
Future Internet (2023) Vol. 15, Iss. 2, pp. 83-83
Open Access | Times Cited: 82
Securing Industrial Control Systems: Components, Cyber Threats, and Machine Learning-Driven Defense Strategies
Mary Nankya, Robin Chataut, Robert Akl
Sensors (2023) Vol. 23, Iss. 21, pp. 8840-8840
Open Access | Times Cited: 27
Mary Nankya, Robin Chataut, Robert Akl
Sensors (2023) Vol. 23, Iss. 21, pp. 8840-8840
Open Access | Times Cited: 27
Global Digital Convergence: Impact of Cybersecurity, Business Transparency, Economic Transformation, and AML Efficiency
Aleksandra Kuzior, Tetiana Anatoliivna Vasylieva, Оlha Кuzmenko, et al.
Journal of Open Innovation Technology Market and Complexity (2022) Vol. 8, Iss. 4, pp. 195-195
Open Access | Times Cited: 31
Aleksandra Kuzior, Tetiana Anatoliivna Vasylieva, Оlha Кuzmenko, et al.
Journal of Open Innovation Technology Market and Complexity (2022) Vol. 8, Iss. 4, pp. 195-195
Open Access | Times Cited: 31
Multiverse Recurrent Expansion With Multiple Repeats: A Representation Learning Algorithm for Electricity Theft Detection in Smart Grids
Tarek Berghout, Mohamed Benbouzid, Mohamed Amine Ferrag
IEEE Transactions on Smart Grid (2023) Vol. 14, Iss. 6, pp. 4693-4703
Closed Access | Times Cited: 17
Tarek Berghout, Mohamed Benbouzid, Mohamed Amine Ferrag
IEEE Transactions on Smart Grid (2023) Vol. 14, Iss. 6, pp. 4693-4703
Closed Access | Times Cited: 17
Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation
Mirza Akhi Khatun, Sanober Farheen Memon, Ciarán Eising, et al.
IEEE Access (2023) Vol. 11, pp. 145869-145896
Open Access | Times Cited: 17
Mirza Akhi Khatun, Sanober Farheen Memon, Ciarán Eising, et al.
IEEE Access (2023) Vol. 11, pp. 145869-145896
Open Access | Times Cited: 17
An intelligent context-aware threat detection and response model for smart cyber-physical systems
Zainab Noor, Sadaf Hina, Faisal Hayat, et al.
Internet of Things (2023) Vol. 23, pp. 100843-100843
Open Access | Times Cited: 16
Zainab Noor, Sadaf Hina, Faisal Hayat, et al.
Internet of Things (2023) Vol. 23, pp. 100843-100843
Open Access | Times Cited: 16
Employing Deep Reinforcement Learning to Cyber-Attack Simulation for Enhancing Cybersecurity
Sang Ho Oh, Jeongyoon Kim, Jae Hoon Nah, et al.
Electronics (2024) Vol. 13, Iss. 3, pp. 555-555
Open Access | Times Cited: 6
Sang Ho Oh, Jeongyoon Kim, Jae Hoon Nah, et al.
Electronics (2024) Vol. 13, Iss. 3, pp. 555-555
Open Access | Times Cited: 6
Attack classification in network intrusion detection system based on optimization strategy and deep learning methodology
Et al. Ch. Kodanda Ramu, T. Srinivasa Rao, E. Uma Shankar Rao
Multimedia Tools and Applications (2024) Vol. 83, Iss. 31, pp. 75533-75555
Closed Access | Times Cited: 5
Et al. Ch. Kodanda Ramu, T. Srinivasa Rao, E. Uma Shankar Rao
Multimedia Tools and Applications (2024) Vol. 83, Iss. 31, pp. 75533-75555
Closed Access | Times Cited: 5
A Comprehensive Review on Cybersecurity Issues and Their Mitigation Measures in FinTech
Guma Ali, Maad M. Mijwil, Bosco Apparatus Buruga, et al.
Iraqi Journal for Computer Science and Mathematics (2024) Vol. 5, Iss. 3
Open Access | Times Cited: 5
Guma Ali, Maad M. Mijwil, Bosco Apparatus Buruga, et al.
Iraqi Journal for Computer Science and Mathematics (2024) Vol. 5, Iss. 3
Open Access | Times Cited: 5
Advanced Computational Techniques for Analyzing Cybersecurity Event Datasets Using Artificial Intelligence and Machine Learning
Neelam Kumari, Ashok Kumar
SCT Proceedings in Interdisciplinary Insights and Innovations. (2025) Vol. 3, pp. 524-524
Closed Access
Neelam Kumari, Ashok Kumar
SCT Proceedings in Interdisciplinary Insights and Innovations. (2025) Vol. 3, pp. 524-524
Closed Access
Mitigating Cyber Attacks for Organization Assets using UEBA (User and Entity Behavior Analytics) and other Machine Learning Solutions from Cloud Security Threats: A Literature Review
Eric Blancaflor, Keith Christian Esteron, Andrade Cy, et al.
Network Security (2025) Vol. 2024, Iss. 9, pp. 25-31
Closed Access
Eric Blancaflor, Keith Christian Esteron, Andrade Cy, et al.
Network Security (2025) Vol. 2024, Iss. 9, pp. 25-31
Closed Access
Detecting Malware C&C Communication Traffic Using Artificial Intelligence Techniques
Mohamed Ali Kazi
Journal of Cybersecurity and Privacy (2025) Vol. 5, Iss. 1, pp. 4-4
Open Access
Mohamed Ali Kazi
Journal of Cybersecurity and Privacy (2025) Vol. 5, Iss. 1, pp. 4-4
Open Access
Enhancing security of mobile crowd sensing in unmanned aerial vehicle ecosystems
Sara Sumaidaa, Hamda Almenhali, Mohammed Alazzani, et al.
Frontiers in Communications and Networks (2025) Vol. 6
Open Access
Sara Sumaidaa, Hamda Almenhali, Mohammed Alazzani, et al.
Frontiers in Communications and Networks (2025) Vol. 6
Open Access
AI and Healthcare Analytics
Sunil Kumar Gupta, Monit Kapoor, Sanjoy Kumar Debnath
(2025), pp. 87-100
Closed Access
Sunil Kumar Gupta, Monit Kapoor, Sanjoy Kumar Debnath
(2025), pp. 87-100
Closed Access
COUNTERMEASURE TO MAN-IN-THE-MIDDLE ATTACK BASED ON EMAIL HIJACKING USING TRY-HYBRID SUPERVISED LEARNING TECHNIQUES
Mohammed Nasir, Danlami Gabi, Salihu Alhassan Libata, et al.
FUDMA Journal of Sciences (2025) Vol. 9, Iss. 2, pp. 66-74
Closed Access
Mohammed Nasir, Danlami Gabi, Salihu Alhassan Libata, et al.
FUDMA Journal of Sciences (2025) Vol. 9, Iss. 2, pp. 66-74
Closed Access
Arquitectura de seguridad multinivel con enfoque predictivo para sistemas de almacenamiento distribuido en infraestructuras Cloud
Diana Carolina Decimavilla-Alarcón, Enrique Joel Murillo-Ávila
Deleted Journal (2025) Vol. 3, Iss. 1, pp. 125-136
Closed Access
Diana Carolina Decimavilla-Alarcón, Enrique Joel Murillo-Ávila
Deleted Journal (2025) Vol. 3, Iss. 1, pp. 125-136
Closed Access
Machine Learning for Cybersecurity: Ransomware Detection with SVM
Wira Zanoramy A. Zakaria, Muzzamil Aziz, Sharifah Roziah Mohd Kassim
(2025), pp. 2173-2180
Closed Access
Wira Zanoramy A. Zakaria, Muzzamil Aziz, Sharifah Roziah Mohd Kassim
(2025), pp. 2173-2180
Closed Access
Machine Learning Approaches in Cybersecurity to Enhance Security in Future Network Technologies
Sultan Ahmad, Md. Alimul Haque, Hikmat A. M. Abdeljaber, et al.
SN Computer Science (2025) Vol. 6, Iss. 4
Closed Access
Sultan Ahmad, Md. Alimul Haque, Hikmat A. M. Abdeljaber, et al.
SN Computer Science (2025) Vol. 6, Iss. 4
Closed Access
Deep learning technology of computer network security detection based on artificial intelligence
Qinghui Liu, Tianping Zhang
Computers & Electrical Engineering (2023) Vol. 110, pp. 108813-108813
Closed Access | Times Cited: 13
Qinghui Liu, Tianping Zhang
Computers & Electrical Engineering (2023) Vol. 110, pp. 108813-108813
Closed Access | Times Cited: 13
CybAttT: A Dataset of Cyberattack News Tweets for Enhanced Threat Intelligence
Huda Lughbi, Mourad Mars, Khaled H. Almotairi
Data (2024) Vol. 9, Iss. 3, pp. 39-39
Open Access | Times Cited: 4
Huda Lughbi, Mourad Mars, Khaled H. Almotairi
Data (2024) Vol. 9, Iss. 3, pp. 39-39
Open Access | Times Cited: 4
Enhancing threat detection in Identity and Access Management (IAM) systems
Nikhil Ghadge
International Journal of Science and Research Archive (2024) Vol. 11, Iss. 2, pp. 2050-2057
Open Access | Times Cited: 4
Nikhil Ghadge
International Journal of Science and Research Archive (2024) Vol. 11, Iss. 2, pp. 2050-2057
Open Access | Times Cited: 4
Deep Reinforcement Learning for Adaptive Cyber Defense in Network Security
Atheer Alaa Hammad, Saadaldeen Rashid Ahmed, Mohammad K. Abdul-Hussein, et al.
(2024), pp. 292-297
Closed Access | Times Cited: 4
Atheer Alaa Hammad, Saadaldeen Rashid Ahmed, Mohammad K. Abdul-Hussein, et al.
(2024), pp. 292-297
Closed Access | Times Cited: 4
Understanding APT detection using Machine learning algorithms: Is superior accuracy a thing?
Sydul Arefin, Md Minhaz Chowdhury, Rezwanul Parvez, et al.
(2024), pp. 532-537
Closed Access | Times Cited: 4
Sydul Arefin, Md Minhaz Chowdhury, Rezwanul Parvez, et al.
(2024), pp. 532-537
Closed Access | Times Cited: 4
The types of hackers and cyberattacks in the aviation industry
Lázaro Florido-Benítez
Journal of Transportation Security (2024) Vol. 17, Iss. 1
Open Access | Times Cited: 4
Lázaro Florido-Benítez
Journal of Transportation Security (2024) Vol. 17, Iss. 1
Open Access | Times Cited: 4
Combining Markov and Semi-Markov Modelling for Assessing Availability and Cybersecurity of Cloud and IoT Systems
Vyacheslav Kharchenko, Yuriy Ponochovnyi, Oleg Ivanchenko, et al.
Cryptography (2022) Vol. 6, Iss. 3, pp. 44-44
Open Access | Times Cited: 19
Vyacheslav Kharchenko, Yuriy Ponochovnyi, Oleg Ivanchenko, et al.
Cryptography (2022) Vol. 6, Iss. 3, pp. 44-44
Open Access | Times Cited: 19