
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Systematic Review on Machine Learning and Deep Learning Models for Electronic Information Security in Mobile Networks
Chaitanya Gupta, Ishita Johri, Kathiravan Srinivasan, et al.
Sensors (2022) Vol. 22, Iss. 5, pp. 2017-2017
Open Access | Times Cited: 57
Chaitanya Gupta, Ishita Johri, Kathiravan Srinivasan, et al.
Sensors (2022) Vol. 22, Iss. 5, pp. 2017-2017
Open Access | Times Cited: 57
Showing 1-25 of 57 citing articles:
Explainable Artificial Intelligence in CyberSecurity: A Survey
Nicola Capuano, Giuseppe Fenza, Vincenzo Loia, et al.
IEEE Access (2022) Vol. 10, pp. 93575-93600
Open Access | Times Cited: 129
Nicola Capuano, Giuseppe Fenza, Vincenzo Loia, et al.
IEEE Access (2022) Vol. 10, pp. 93575-93600
Open Access | Times Cited: 129
Artificial Intelligence for Antimicrobial Resistance Prediction: Challenges and Opportunities towards Practical Implementation
Tabish Ali, Sarfaraz Ahmed, Muhammad Aslam
Antibiotics (2023) Vol. 12, Iss. 3, pp. 523-523
Open Access | Times Cited: 65
Tabish Ali, Sarfaraz Ahmed, Muhammad Aslam
Antibiotics (2023) Vol. 12, Iss. 3, pp. 523-523
Open Access | Times Cited: 65
Analysis of IoT Security Challenges and Its Solutions Using Artificial Intelligence
Tehseen Mazhar, Dhani Bux Talpur, Tamara Al Shloul, et al.
Brain Sciences (2023) Vol. 13, Iss. 4, pp. 683-683
Open Access | Times Cited: 59
Tehseen Mazhar, Dhani Bux Talpur, Tamara Al Shloul, et al.
Brain Sciences (2023) Vol. 13, Iss. 4, pp. 683-683
Open Access | Times Cited: 59
Current trends in AI and ML for cybersecurity: A state-of-the-art survey
Nachaat Mohamed
Cogent Engineering (2023) Vol. 10, Iss. 2
Open Access | Times Cited: 45
Nachaat Mohamed
Cogent Engineering (2023) Vol. 10, Iss. 2
Open Access | Times Cited: 45
A Comprehensive Survey: Evaluating the Efficiency of Artificial Intelligence and Machine Learning Techniques on Cyber Security Solutions
Merve Ozkan-Okay, Erdal Akin, Ömer Aslan, et al.
IEEE Access (2024) Vol. 12, pp. 12229-12256
Open Access | Times Cited: 42
Merve Ozkan-Okay, Erdal Akin, Ömer Aslan, et al.
IEEE Access (2024) Vol. 12, pp. 12229-12256
Open Access | Times Cited: 42
Application of big data technology in enterprise information security management
Ping Li, Limin Zhang
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access | Times Cited: 1
Ping Li, Limin Zhang
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access | Times Cited: 1
Design of Intrusion Detection System based on Cyborg intelligence for security of Cloud Network Traffic of Smart Cities
Edeh Michael Onyema, Surjeet Dalal, Carlos Andrés Tavera Romero, et al.
Journal of Cloud Computing Advances Systems and Applications (2022) Vol. 11, Iss. 1
Open Access | Times Cited: 45
Edeh Michael Onyema, Surjeet Dalal, Carlos Andrés Tavera Romero, et al.
Journal of Cloud Computing Advances Systems and Applications (2022) Vol. 11, Iss. 1
Open Access | Times Cited: 45
Leveraging Computational Intelligence Techniques for Defensive Deception: A Review, Recent Advances, Open Problems and Future Directions
Pilla Vaishno Mohan, Shriniket Dixit, Amogh Gyaneshwar, et al.
Sensors (2022) Vol. 22, Iss. 6, pp. 2194-2194
Open Access | Times Cited: 44
Pilla Vaishno Mohan, Shriniket Dixit, Amogh Gyaneshwar, et al.
Sensors (2022) Vol. 22, Iss. 6, pp. 2194-2194
Open Access | Times Cited: 44
A Study on Machine Learning-Enhanced Roadside Unit-Based Detection of Abnormal Driving in Autonomous Vehicles
Keon Yun, Heesun Yun, Sangmin Lee, et al.
Electronics (2024) Vol. 13, Iss. 2, pp. 288-288
Open Access | Times Cited: 8
Keon Yun, Heesun Yun, Sangmin Lee, et al.
Electronics (2024) Vol. 13, Iss. 2, pp. 288-288
Open Access | Times Cited: 8
Ultra-short-term wind power prediction method combining financial technology feature engineering and XGBoost algorithm
Shijie Guan, Yongsheng Wang, Limin Liu, et al.
Heliyon (2023) Vol. 9, Iss. 6, pp. e16938-e16938
Open Access | Times Cited: 19
Shijie Guan, Yongsheng Wang, Limin Liu, et al.
Heliyon (2023) Vol. 9, Iss. 6, pp. e16938-e16938
Open Access | Times Cited: 19
Identification and classification for multiple cyber attacks in power grids based on the deep capsule CNN
Guangdou Zhang, Jian Li, Olusola Bamisile, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 126, pp. 106771-106771
Closed Access | Times Cited: 16
Guangdou Zhang, Jian Li, Olusola Bamisile, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 126, pp. 106771-106771
Closed Access | Times Cited: 16
Enhancing Mobile Security through Comprehensive Penetration Testing
Maryam Roshanaei
Journal of Information Security (2024) Vol. 15, Iss. 02, pp. 63-86
Open Access | Times Cited: 5
Maryam Roshanaei
Journal of Information Security (2024) Vol. 15, Iss. 02, pp. 63-86
Open Access | Times Cited: 5
Large Language Models Meet Next-Generation Networking Technologies: A Review
Ching Nam Hang, Pei-Duo Yu, Roberto Morabito, et al.
Future Internet (2024) Vol. 16, Iss. 10, pp. 365-365
Open Access | Times Cited: 5
Ching Nam Hang, Pei-Duo Yu, Roberto Morabito, et al.
Future Internet (2024) Vol. 16, Iss. 10, pp. 365-365
Open Access | Times Cited: 5
Adaptive Q-Learning-Based Radio Resource Management Optimization in 5G and Beyond Heterogeneous-Homogeneous Networks: A Comprehensive Review
Abubakar Abdulkadir, Mahmoud T. Kabir, H. A. Abdulkareem, et al.
Asian Journal of Science Technology Engineering and Art (2025) Vol. 3, Iss. 1, pp. 137-154
Closed Access
Abubakar Abdulkadir, Mahmoud T. Kabir, H. A. Abdulkareem, et al.
Asian Journal of Science Technology Engineering and Art (2025) Vol. 3, Iss. 1, pp. 137-154
Closed Access
A customization design platform for school uniforms using the Kano model
Xue Li, Mei Meng, Xiaohu Ren, et al.
International Journal of Clothing Science and Technology (2025)
Closed Access
Xue Li, Mei Meng, Xiaohu Ren, et al.
International Journal of Clothing Science and Technology (2025)
Closed Access
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
Ahmed Yaser, Hamdy M. Mousa, Mahmoud Hussein
Future Internet (2022) Vol. 14, Iss. 8, pp. 240-240
Open Access | Times Cited: 22
Ahmed Yaser, Hamdy M. Mousa, Mahmoud Hussein
Future Internet (2022) Vol. 14, Iss. 8, pp. 240-240
Open Access | Times Cited: 22
An Intelligent Framework for Cyber–Physical Satellite System and IoT-Aided Aerial Vehicle Security Threat Detection
Nazik Alturki, Turki Aljrees, Muhammad Umer, et al.
Sensors (2023) Vol. 23, Iss. 16, pp. 7154-7154
Open Access | Times Cited: 14
Nazik Alturki, Turki Aljrees, Muhammad Umer, et al.
Sensors (2023) Vol. 23, Iss. 16, pp. 7154-7154
Open Access | Times Cited: 14
A Comprehensive Survey on Knowledge-Defined Networking
Patikiri Arachchige Don Shehan Nilmantha Wijesekara, Subodha Gunawardena
Telecom (2023) Vol. 4, Iss. 3, pp. 477-596
Open Access | Times Cited: 12
Patikiri Arachchige Don Shehan Nilmantha Wijesekara, Subodha Gunawardena
Telecom (2023) Vol. 4, Iss. 3, pp. 477-596
Open Access | Times Cited: 12
Towards an AI-Enhanced Cyber Threat Intelligence Processing Pipeline
Lampis Alevizos, Martijn Dekker
Electronics (2024) Vol. 13, Iss. 11, pp. 2021-2021
Open Access | Times Cited: 4
Lampis Alevizos, Martijn Dekker
Electronics (2024) Vol. 13, Iss. 11, pp. 2021-2021
Open Access | Times Cited: 4
Attack prevention in IoT through hybrid optimization mechanism and deep learning framework
Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, et al.
Measurement Sensors (2022) Vol. 24, pp. 100431-100431
Open Access | Times Cited: 15
Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, et al.
Measurement Sensors (2022) Vol. 24, pp. 100431-100431
Open Access | Times Cited: 15
Cyber-Internet Security Framework to Conquer Energy-Related Attacks on the Internet of Things with Machine Learning Techniques
Anand Kumar, Dharmesh Dhabliya, Pankaj Agarwal, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-13
Open Access | Times Cited: 15
Anand Kumar, Dharmesh Dhabliya, Pankaj Agarwal, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-13
Open Access | Times Cited: 15
A Review on the Effectiveness of Machine Learning and Deep Learning Algorithms for Collaborative Robot
Mohit Sajwan, Simranjit Singh
Archives of Computational Methods in Engineering (2023) Vol. 30, Iss. 6, pp. 3489-3508
Closed Access | Times Cited: 8
Mohit Sajwan, Simranjit Singh
Archives of Computational Methods in Engineering (2023) Vol. 30, Iss. 6, pp. 3489-3508
Closed Access | Times Cited: 8
Using Deep Learning Algorithm in Security Informatics
Rachid Tahril, Abdellatif Lasbahani, Abdessamad Jarrar, et al.
International Journal of Innovative Science and Research Technology (IJISRT) (2024), pp. 2933-2944
Open Access | Times Cited: 2
Rachid Tahril, Abdellatif Lasbahani, Abdessamad Jarrar, et al.
International Journal of Innovative Science and Research Technology (IJISRT) (2024), pp. 2933-2944
Open Access | Times Cited: 2
Malware Attack Detection in Large Scale Networks using the Ensemble Deep Restricted Boltzmann Machine
J. Anish Kumar, G. Ranganathan
Engineering Technology & Applied Science Research (2023) Vol. 13, Iss. 5, pp. 11773-11778
Open Access | Times Cited: 5
J. Anish Kumar, G. Ranganathan
Engineering Technology & Applied Science Research (2023) Vol. 13, Iss. 5, pp. 11773-11778
Open Access | Times Cited: 5
Machine-learning-based prediction of a diagnostic model using autophagy-related genes based on RNA sequencing for patients with papillary thyroid carcinoma
Lin Chen, G Tao, Mei Yang
Open Medicine (2024) Vol. 19, Iss. 1
Open Access | Times Cited: 1
Lin Chen, G Tao, Mei Yang
Open Medicine (2024) Vol. 19, Iss. 1
Open Access | Times Cited: 1