OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Comprehensive Tutorial and Survey of Applications of Deep Learning for Cyber Security
Vinayakumar Ravi, Soman KP, Mamoun Alazab, et al.
(2020)
Open Access | Times Cited: 14

Showing 14 citing articles:

Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review
Priyanka Dixit, Sanjay Silakari
Computer Science Review (2020) Vol. 39, pp. 100317-100317
Closed Access | Times Cited: 179

Machine Learning and Deep Learning Techniques for Cybersecurity: A Review
Said A. Salloum, Muhammad Turki Alshurideh, Ashraf Elnagar, et al.
Advances in intelligent systems and computing (2020), pp. 50-57
Closed Access | Times Cited: 124

NLP methods in host-based intrusion detection systems: A systematic review and future directions
Zarrin Tasnim Sworna, Zahra Mousavi, Muhammad Ali Babar
Journal of Network and Computer Applications (2023) Vol. 220, pp. 103761-103761
Open Access | Times Cited: 22

INNES: An intelligent network penetration testing model based on deep reinforcement learning
Qianyu Li, Miao Hu, Hao Hao, et al.
Applied Intelligence (2023) Vol. 53, Iss. 22, pp. 27110-27127
Closed Access | Times Cited: 11

Robust Malware Detection using Residual Attention Network
Shamika Ganesan, Vinayakumar Ravi, Moez Krichen, et al.
2023 IEEE International Conference on Consumer Electronics (ICCE) (2021), pp. 1-6
Open Access | Times Cited: 18

Feature Selection Improves Tree-based Classification for Wireless Intrusion Detection
Shilpa Bhandari, Avinash K. Kukreja, Alina Lazar, et al.
(2020)
Open Access | Times Cited: 20

A Pragmatic Optimal Approach for Detection of Cyber Attacks using Genetic Programming
Nikhil S. Mane, Anjali Verma, Arti Arya
(2020)
Closed Access | Times Cited: 7

Robust Malware Detection using Residual Attention Network
Shamika Ganesan, R. Vinayakumar, Moez Krichen, et al.
(2020)
Open Access | Times Cited: 4

FriendlyFoe: Adversarial Machine Learning as a Practical Architectural Defense against Side Channel Attacks
Hyoungwook Nam, Raghavendra Pradyumna Pothukuchi, Bo Li, et al.
(2024) Vol. 22, pp. 338-350
Closed Access

High-performance network attack detection in unknown scenarios based on improved vertical model
Shuxun Hou, Xiao Gao, Huiying Zhou
Cluster Computing (2024) Vol. 28, Iss. 1
Closed Access

Robust Malware Detection using Residual Attention Network
Shamika Ganesan, R. Vinayakumar, Moez Krichen, et al.
(2020)
Open Access | Times Cited: 1

Efficient and Secure Statistical Port Scan Detection Scheme
Hussein Majed, Hassan Noura, Ola Salman, et al.
Lecture notes in computer science (2021), pp. 72-88
Closed Access | Times Cited: 1

A Systematic Literature Review on Malicious Use of Reinforcement Learning
Torstein Meyer, Nektaria Kaloudi, Jingyue Li
(2021), pp. 21-28
Closed Access | Times Cited: 1

RETRACTED ARTICLE: A User-Centric Machine Learning for Learning Support System with Adequate Cyber Security
Fang Liu, Juan Wang
Wireless Personal Communications (2021) Vol. 127, Iss. S1, pp. 19-19
Closed Access

Page 1

Scroll to top