OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Machine Learning-Based Anomaly Detection in NFV: A Comprehensive Survey
Sehar Zehra, Ummay Faseeha, Hassan Jamil Syed, et al.
Sensors (2023) Vol. 23, Iss. 11, pp. 5340-5340
Open Access | Times Cited: 23

Showing 23 citing articles:

Similaritycheck-Time series anomaly detection based on GAN-VAE
Shibo Liao, Chunshan Liu, Yongxiang Xia, et al.
Data Science and Informetrics (2025)
Open Access

End-to-end anomaly detection of service function chain through multi-source data in cloud-native systems
Xuefei Chen, Jinfeng Kou, Haiqiang Li, et al.
Computers & Security (2025), pp. 104461-104461
Closed Access

Outlier detection in temporal and spatial sequences via correlation analysis based on graph neural networks
Yan Gao, Qingquan Lin, Shuang Ye, et al.
Displays (2024) Vol. 84, pp. 102775-102775
Closed Access | Times Cited: 3

Fault Diagnosis in the Network Function Virtualization: A Survey, Taxonomy, and Future Directions
Jiahui Li, Xiaogang Qi, Jiliang Li, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 11, pp. 19121-19142
Closed Access | Times Cited: 2

Using Machine Learning Algorithms in Intrusion Detection Systems: A Review
Mazin S. Mohammed, Hasanien Ali Talib
Tikrit Journal of Pure Science (2024) Vol. 29, Iss. 3, pp. 63-74
Open Access | Times Cited: 2

Anomaly Detection in Intrusion Detection Systems
Siamak Parhizkari
Artificial intelligence (2023)
Open Access | Times Cited: 5

Water quality prediction: a data-driven approach exploiting advanced machine learning algorithms with data augmentation
K. Karthick, S. Krishnan, R. Manikandan
Journal of Water and Climate Change (2023) Vol. 15, Iss. 2, pp. 431-452
Open Access | Times Cited: 5

Revolutionizing Generalized Anxiety Disorder Detection using a Deep Learning Approach with MGADHF Architecture on Social Media
Faisal Alshanketi
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 1
Open Access | Times Cited: 1

Credit Card Fraud Detection with Machine Learning and Big Data Analytics: A PySpark Framework Implementation
Leonidas Theodorakopoulos, Alexandra Theodoropoulou, Fotini Zakka, et al.
(2024)
Open Access | Times Cited: 1

Detecting Network Anomalies in NetFlow Traffic with Machine Learning Algorithms
Quoc Bao Vo, Philippe Ea, Osman Salem, et al.
(2024), pp. 1-8
Closed Access | Times Cited: 1

Artificial intelligence (AI)-based optimization of power electronic converters for improved power system stability and performance
Ioana-Cornelia Gros, Xiaoshu Lü, Claudiu Oprea, et al.
(2023) Vol. 24, pp. 204-210
Closed Access | Times Cited: 2

Network Traffic Monitoring and Analysis
Tulsi Pawan Fowdur, Lavesh Babooram
Apress eBooks (2024), pp. 51-96
Closed Access

Efficient SFC Protection Method against Network Attack Risks in Air Traffic Information Networks
Yong Jie Yang, Buhong Wang, Jiwei Tian, et al.
Electronics (2024) Vol. 13, Iss. 13, pp. 2664-2664
Open Access

Anomalous Network Behaviour Detection in Interoperable Health Systems using Machine Learning in Resource Limited Areas
Marseline Michael Mtey -, Anael Sam, Mussa Ally Dida
International Journal For Multidisciplinary Research (2024) Vol. 6, Iss. 4
Open Access

Real-Time Anomaly Detection in IoT Networks Using Deep Neural Networks
Lydia D. Isaac, V. Mohanraj, V. Sathiyamoorthi, et al.
Advances in computational intelligence and robotics book series (2024), pp. 1-14
Closed Access

Machine Learning-Based Network Anomaly Detection: Design, Implementation, and Evaluation
Pilar Schummer, Alberto del Río, Javier Serrano, et al.
AI (2024) Vol. 5, Iss. 4, pp. 2967-2983
Open Access

Security and Privacy Issues in Network Function Virtualization: A Review from Architectural Perspective
Bilal Zahran, Naveed Ahmed, Abdel Rahman Alzoubaidi, et al.
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 6
Open Access

Cognitive routing in software defined networks using learning models with latency and throughput constraints
Nagaraju Tumakuru Anadanaiah, Malode Vishwanatha Panduranga Rao
IAES International Journal of Artificial Intelligence (2023) Vol. 13, Iss. 1, pp. 756-756
Open Access

An efficient fraud detection mechanism based on machine learning and blockchain technology
Shirin Sultana, Md. Saifur Rahman, Maharin Afroj
2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) (2023) Vol. 12, pp. 162-168
Closed Access

Page 1

Scroll to top