
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Deep Learning for Cyber Security Applications: A Comprehensive Survey
R. Vinayakumar, Mamoun Alazab, Soman KP, et al.
(2021)
Open Access | Times Cited: 9
R. Vinayakumar, Mamoun Alazab, Soman KP, et al.
(2021)
Open Access | Times Cited: 9
Showing 9 citing articles:
Explainable Artificial Intelligence in CyberSecurity: A Survey
Nicola Capuano, Giuseppe Fenza, Vincenzo Loia, et al.
IEEE Access (2022) Vol. 10, pp. 93575-93600
Open Access | Times Cited: 134
Nicola Capuano, Giuseppe Fenza, Vincenzo Loia, et al.
IEEE Access (2022) Vol. 10, pp. 93575-93600
Open Access | Times Cited: 134
Harnessing Machine Learning Intelligence Against Cyber Threats
Bhupinder Singh, Christian Kaunert, Ritu Gautam
Advances in business strategy and competitive advantage book series (2024), pp. 319-352
Closed Access | Times Cited: 4
Bhupinder Singh, Christian Kaunert, Ritu Gautam
Advances in business strategy and competitive advantage book series (2024), pp. 319-352
Closed Access | Times Cited: 4
Unmasking Fake Social Network Accounts with Explainable Intelligence
Eman Alnagi, Ashraf Ahmad, Qasem Abu AlāHaija, et al.
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 3
Open Access | Times Cited: 1
Eman Alnagi, Ashraf Ahmad, Qasem Abu AlāHaija, et al.
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 3
Open Access | Times Cited: 1
Scouting the Juncture of Internet of Things (IoT), Deep Learning, and Cybercrime
Bhupinder Singh, Christian Kaunert
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 363-398
Closed Access
Bhupinder Singh, Christian Kaunert
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 363-398
Closed Access
Exploring Effective Strategies for Combatting Cybercrime and Intersection of IoT, Deep Learning
Bhupinder Singh, Christian Kaunert
Advances in human and social aspects of technology book series (2024), pp. 141-172
Closed Access
Bhupinder Singh, Christian Kaunert
Advances in human and social aspects of technology book series (2024), pp. 141-172
Closed Access
Slice-aware 5G Network Orchestration Framework Based on Dual-Slice Isolation and Management Strategy (D-SIMS)
V. Sujitha, Thiruvenkadam Sriniva, Oh-Sung Lee, et al.
Research Square (Research Square) (2023)
Open Access | Times Cited: 1
V. Sujitha, Thiruvenkadam Sriniva, Oh-Sung Lee, et al.
Research Square (Research Square) (2023)
Open Access | Times Cited: 1
Deep Learning Based Cryptanalysis on SLIM Cipher
Vignesh Rajakumar, Lakshmy KV, Chungath Srinivasan
(2023), pp. 1-6
Closed Access | Times Cited: 1
Vignesh Rajakumar, Lakshmy KV, Chungath Srinivasan
(2023), pp. 1-6
Closed Access | Times Cited: 1
Applications of Deep Learning Models in Diverse Streams of IoT
Atul Srivastava, Haider Rizvi, Surbhi Bhatia, et al.
(2023), pp. 197-231
Closed Access
Atul Srivastava, Haider Rizvi, Surbhi Bhatia, et al.
(2023), pp. 197-231
Closed Access
Deep Learning Methods in Web Intrusion Detection: A Systematic Review
Hassan I. Halim, Mohamed Kholief, Fahima A. Maghraby
Research Square (Research Square) (2022)
Open Access
Hassan I. Halim, Mohamed Kholief, Fahima A. Maghraby
Research Square (Research Square) (2022)
Open Access