
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Leveraging Computational Intelligence Techniques for Defensive Deception: A Review, Recent Advances, Open Problems and Future Directions
Pilla Vaishno Mohan, Shriniket Dixit, Amogh Gyaneshwar, et al.
Sensors (2022) Vol. 22, Iss. 6, pp. 2194-2194
Open Access | Times Cited: 44
Pilla Vaishno Mohan, Shriniket Dixit, Amogh Gyaneshwar, et al.
Sensors (2022) Vol. 22, Iss. 6, pp. 2194-2194
Open Access | Times Cited: 44
Showing 1-25 of 44 citing articles:
A comprehensive survey on cyber deception techniques to improve honeypot performance
Amir Javadpour, Forough Ja’fari, Tarik Taleb, et al.
Computers & Security (2024) Vol. 140, pp. 103792-103792
Open Access | Times Cited: 24
Amir Javadpour, Forough Ja’fari, Tarik Taleb, et al.
Computers & Security (2024) Vol. 140, pp. 103792-103792
Open Access | Times Cited: 24
Design of Intrusion Detection System based on Cyborg intelligence for security of Cloud Network Traffic of Smart Cities
Edeh Michael Onyema, Surjeet Dalal, Carlos Andrés Tavera Romero, et al.
Journal of Cloud Computing Advances Systems and Applications (2022) Vol. 11, Iss. 1
Open Access | Times Cited: 45
Edeh Michael Onyema, Surjeet Dalal, Carlos Andrés Tavera Romero, et al.
Journal of Cloud Computing Advances Systems and Applications (2022) Vol. 11, Iss. 1
Open Access | Times Cited: 45
Industrial internet of things in intelligent manufacturing: a review, approaches, opportunities, open challenges, and future directions
Priyanshi Gupta, Chaitanya Krishna, Rahul Rajesh, et al.
International Journal on Interactive Design and Manufacturing (IJIDeM) (2022)
Closed Access | Times Cited: 39
Priyanshi Gupta, Chaitanya Krishna, Rahul Rajesh, et al.
International Journal on Interactive Design and Manufacturing (IJIDeM) (2022)
Closed Access | Times Cited: 39
Cyber expert feedback: Experiences, expectations, and opinions about cyber deception
Kimberly Ferguson‐Walter, Maxine Major, Chelsea K. Johnson, et al.
Computers & Security (2023) Vol. 130, pp. 103268-103268
Closed Access | Times Cited: 11
Kimberly Ferguson‐Walter, Maxine Major, Chelsea K. Johnson, et al.
Computers & Security (2023) Vol. 130, pp. 103268-103268
Closed Access | Times Cited: 11
Elements of Deterrence
Erik Gartzke, Jon R. Lindsay
Oxford University Press eBooks (2024)
Closed Access | Times Cited: 3
Erik Gartzke, Jon R. Lindsay
Oxford University Press eBooks (2024)
Closed Access | Times Cited: 3
Addressing Cybersecurity Issues in ERP Systems – Emerging Trends
Liana-Elena Anica-Popa, Marinela Vrîncianu, Irina-Bogdana Pugna, et al.
Proceedings of the ... International Conference on Business Excellence (2024) Vol. 18, Iss. 1, pp. 1306-1323
Closed Access | Times Cited: 1
Liana-Elena Anica-Popa, Marinela Vrîncianu, Irina-Bogdana Pugna, et al.
Proceedings of the ... International Conference on Business Excellence (2024) Vol. 18, Iss. 1, pp. 1306-1323
Closed Access | Times Cited: 1
Application Layer Cyber Deception Without Developer Interaction
Mario Kahlhofer, Stefan Raß
(2024), pp. 416-429
Open Access | Times Cited: 1
Mario Kahlhofer, Stefan Raß
(2024), pp. 416-429
Open Access | Times Cited: 1
Improvement of Linear and Nonlinear Control for PMSM Using Computational Intelligence and Reinforcement Learning
Marcel Nicola, Claudiu-Ionel Nicola
Mathematics (2022) Vol. 10, Iss. 24, pp. 4667-4667
Open Access | Times Cited: 8
Marcel Nicola, Claudiu-Ionel Nicola
Mathematics (2022) Vol. 10, Iss. 24, pp. 4667-4667
Open Access | Times Cited: 8
Explainable AI in Military Training Applications
Azeem Khan, N. Z. Jhanjhi, Dayang Hajah Tiawa Binti Awang Haji Hamid, et al.
Advances in computational intelligence and robotics book series (2024), pp. 199-234
Closed Access | Times Cited: 1
Azeem Khan, N. Z. Jhanjhi, Dayang Hajah Tiawa Binti Awang Haji Hamid, et al.
Advances in computational intelligence and robotics book series (2024), pp. 199-234
Closed Access | Times Cited: 1
Green manufacturing via machine learning enabled approaches
Aditya Raj, Amogh Gyaneshwar, Utkarsh Chadha, et al.
International Journal on Interactive Design and Manufacturing (IJIDeM) (2022)
Closed Access | Times Cited: 7
Aditya Raj, Amogh Gyaneshwar, Utkarsh Chadha, et al.
International Journal on Interactive Design and Manufacturing (IJIDeM) (2022)
Closed Access | Times Cited: 7
AI-driven container security approaches for 5G and beyond: A survey
Ilter Taha Aktolga, Elif Sena Kuru, Yiğit Sever, et al.
ITU Journal on Future and Evolving Technologies (2023) Vol. 4, Iss. 2, pp. 364-382
Open Access | Times Cited: 3
Ilter Taha Aktolga, Elif Sena Kuru, Yiğit Sever, et al.
ITU Journal on Future and Evolving Technologies (2023) Vol. 4, Iss. 2, pp. 364-382
Open Access | Times Cited: 3
IoDM: A Study on a IoT-Based Organizational Deception Modeling with Adaptive General-Sum Game Competition
Sang Seo, Dohoon Kim
Electronics (2022) Vol. 11, Iss. 10, pp. 1623-1623
Open Access | Times Cited: 5
Sang Seo, Dohoon Kim
Electronics (2022) Vol. 11, Iss. 10, pp. 1623-1623
Open Access | Times Cited: 5
Harnessing AI and Machine Learning for Intrusion Detection in Cyber Security
S.M.S. Chahal
International Journal of Science and Research (IJSR) (2023) Vol. 12, Iss. 5, pp. 2639-2645
Open Access | Times Cited: 2
S.M.S. Chahal
International Journal of Science and Research (IJSR) (2023) Vol. 12, Iss. 5, pp. 2639-2645
Open Access | Times Cited: 2
Applying Clustering to Predict Attackers Trace in Deceptive Ecosystem by Harmonizing Multiple Decoys Interactions Logs
Jalaj Pateria, Laxmi Ahuja, Subhranil Som, et al.
International Journal of Information Technology and Computer Science (2023) Vol. 15, Iss. 5, pp. 35-44
Open Access | Times Cited: 2
Jalaj Pateria, Laxmi Ahuja, Subhranil Som, et al.
International Journal of Information Technology and Computer Science (2023) Vol. 15, Iss. 5, pp. 35-44
Open Access | Times Cited: 2
Preface
Erik Gartzke, Jon R. Lindsay
Oxford University Press eBooks (2024), pp. xiii-xviii
Closed Access
Erik Gartzke, Jon R. Lindsay
Oxford University Press eBooks (2024), pp. xiii-xviii
Closed Access
Cyber Deception versus Nuclear Deterrence
Erik Gartzke, Jon R. Lindsay
Oxford University Press eBooks (2024), pp. 165-192
Closed Access
Erik Gartzke, Jon R. Lindsay
Oxford University Press eBooks (2024), pp. 165-192
Closed Access
Gray Zone
J. Andrés Gannon, Peter Schram
Oxford University Press eBooks (2024), pp. 340-372
Closed Access
J. Andrés Gannon, Peter Schram
Oxford University Press eBooks (2024), pp. 340-372
Closed Access
Cyberspace Is Unsuitable for the Strategy of War
Erik Gartzke, Jon R. Lindsay
Oxford University Press eBooks (2024), pp. 109-132
Closed Access
Erik Gartzke, Jon R. Lindsay
Oxford University Press eBooks (2024), pp. 109-132
Closed Access
Land
Erik Gartzke, Jon R. Lindsay, Koji Kagotani
Oxford University Press eBooks (2024), pp. 195-223
Closed Access
Erik Gartzke, Jon R. Lindsay, Koji Kagotani
Oxford University Press eBooks (2024), pp. 195-223
Closed Access
Trade
Erik Gartzke, Jon R. Lindsay, Oliver Westerwinter
Oxford University Press eBooks (2024), pp. 303-318
Closed Access
Erik Gartzke, Jon R. Lindsay, Oliver Westerwinter
Oxford University Press eBooks (2024), pp. 303-318
Closed Access
What Is Deterrence?
Erik Gartzke, Jon R. Lindsay
Oxford University Press eBooks (2024), pp. 17-39
Closed Access
Erik Gartzke, Jon R. Lindsay
Oxford University Press eBooks (2024), pp. 17-39
Closed Access
Air
Erik Gartzke, Jon R. Lindsay, James Igoe Walsh
Oxford University Press eBooks (2024), pp. 252-281
Closed Access
Erik Gartzke, Jon R. Lindsay, James Igoe Walsh
Oxford University Press eBooks (2024), pp. 252-281
Closed Access
Deterrence Is Not (Just) One Thing
Erik Gartzke, Jon R. Lindsay
Oxford University Press eBooks (2024), pp. 40-72
Closed Access
Erik Gartzke, Jon R. Lindsay
Oxford University Press eBooks (2024), pp. 40-72
Closed Access