
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
i-2NIDS Novel Intelligent Intrusion Detection Approach for a Strong Network Security
Sabrine Ennaji, Nabil El Akkad, Khalid Haddouch
International Journal of Information Security and Privacy (2023) Vol. 17, Iss. 1, pp. 1-17
Open Access | Times Cited: 8
Sabrine Ennaji, Nabil El Akkad, Khalid Haddouch
International Journal of Information Security and Privacy (2023) Vol. 17, Iss. 1, pp. 1-17
Open Access | Times Cited: 8
Showing 8 citing articles:
Efficient Braille Transformation for Secure Password Hashing
Hamza Touil, Nabil El Akkad, Khalid Satori, et al.
IEEE Access (2024) Vol. 12, pp. 5212-5221
Open Access | Times Cited: 7
Hamza Touil, Nabil El Akkad, Khalid Satori, et al.
IEEE Access (2024) Vol. 12, pp. 5212-5221
Open Access | Times Cited: 7
Hybrid Cryptography Based on Planets: Phobos & Deimos
Ayoub Kraicha, Hamza Touil, Nabil El Akkad
E3S Web of Conferences (2025) Vol. 601, pp. 00092-00092
Open Access
Ayoub Kraicha, Hamza Touil, Nabil El Akkad
E3S Web of Conferences (2025) Vol. 601, pp. 00092-00092
Open Access
An IIoT Temporal Data Anomaly Detection Method Combining Transformer and Adversarial Training
Yuan Tian, Wendong Wang, Jingyuan He
International Journal of Information Security and Privacy (2024) Vol. 18, Iss. 1, pp. 1-28
Open Access | Times Cited: 2
Yuan Tian, Wendong Wang, Jingyuan He
International Journal of Information Security and Privacy (2024) Vol. 18, Iss. 1, pp. 1-28
Open Access | Times Cited: 2
Campus Network Security Intrusion Detection Based on Feature Segmentation and Deep Learning
Zhe Chen
Journal of Cyber Security and Mobility (2024), pp. 775-802
Open Access
Zhe Chen
Journal of Cyber Security and Mobility (2024), pp. 775-802
Open Access
Hybrid Cryptography Based on Constellations: Cassiopeia
Ayoub Kraicha, Hamza Touil, Nabil El Akkad
Lecture notes in networks and systems (2024), pp. 310-320
Closed Access
Ayoub Kraicha, Hamza Touil, Nabil El Akkad
Lecture notes in networks and systems (2024), pp. 310-320
Closed Access
A Secure Approach for Next-Generation IoT Networks
Hafida Assmi, Azidine Guezzaz, Said Benkirane, et al.
Studies in computational intelligence (2024), pp. 197-207
Closed Access
Hafida Assmi, Azidine Guezzaz, Said Benkirane, et al.
Studies in computational intelligence (2024), pp. 197-207
Closed Access
Hybrid Cryptography Based on Constellations: Sagittarius
Ayoub Kraicha, Hamza Touil, Nabil El Akkad
Lecture notes in networks and systems (2024), pp. 724-735
Closed Access
Ayoub Kraicha, Hamza Touil, Nabil El Akkad
Lecture notes in networks and systems (2024), pp. 724-735
Closed Access
Exploration of Network Security Professional Classroom in Higher Vocational Colleges in the Era of Big Data
Chen Jicheng, Hongyou Ge, Long Zhao, et al.
International Journal of New Developments in Education (2023) Vol. 5, Iss. 19
Open Access
Chen Jicheng, Hongyou Ge, Long Zhao, et al.
International Journal of New Developments in Education (2023) Vol. 5, Iss. 19
Open Access