OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

An Intrusion Detection System Based on Normalized Mutual Information Antibodies Feature Selection and Adaptive Quantum Artificial Immune System
Ling Zhang, Zhang Jia Hao
International Journal on Semantic Web and Information Systems (2022) Vol. 18, Iss. 1, pp. 1-25
Open Access | Times Cited: 37

Showing 1-25 of 37 citing articles:

Navigating the security landscape of large language models in enterprise information systems
Brij B. Gupta, Akshat Gaurav, Varsha Arya
Enterprise Information Systems (2024) Vol. 18, Iss. 4
Closed Access | Times Cited: 15

Adversarial deep learning for improved abdominal organ segmentation in CT scans
Lakshmana Phaneendra Maguluri, Kuldeep Chouhan, R. Balamurali, et al.
Multimedia Tools and Applications (2024) Vol. 83, Iss. 35, pp. 82107-82129
Closed Access | Times Cited: 8

Engineering the application of machine learning in an IDS based on IoT traffic flow
Nuno Prazeres, Rogério Luís de C. Costa, Leonel Santos, et al.
Intelligent Systems with Applications (2023) Vol. 17, pp. 200189-200189
Open Access | Times Cited: 20

BP-AKAA: Blockchain-enforced Privacy-preserving Authentication and Key Agreement and Access Control for IIoT
Suhui Liu, Liquan Chen, Hongtao Yu, et al.
Journal of Information Security and Applications (2023) Vol. 73, pp. 103443-103443
Closed Access | Times Cited: 20

Recon: Efficient Intrusion Recovery for Web Applications
Mohamed Hammad, Nabil M. Hewahi, Wael Elmedany
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 6-8
Closed Access

Quantum Machine Learning in Intrusion Detection Systems: A Systematic Mapping Study
Osama Faker, Nergiz Ercil Çağıltay
Lecture notes in networks and systems (2024), pp. 99-113
Closed Access | Times Cited: 3

F-NIDS — A Network Intrusion Detection System based on federated learning
Jonathas A. de Oliveira, Vinícius P. Gonçalves, Rodolfo I. Meneguette, et al.
Computer Networks (2023) Vol. 236, pp. 110010-110010
Closed Access | Times Cited: 10

Blockchain-Based Lightweight Authentication Mechanisms for Industrial Internet of Things and Information Systems
M. Zhao, Chunjing Shi, Yixiao Yuan
International Journal on Semantic Web and Information Systems (2023) Vol. 20, Iss. 1, pp. 1-30
Open Access | Times Cited: 10

Analysis of cutting-edge technologies for enterprise information system and management
Brij B. Gupta, Akshat Gaurav, Prabin Kumar Panigrahi, et al.
Enterprise Information Systems (2023) Vol. 17, Iss. 11
Closed Access | Times Cited: 9

Early Network Intrusion Detection Enabled by Attention Mechanisms and RNNs
Taki Eddine Toufik Djaidja, Bouziane Brik, Sidi‐Mohammed Senouci, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 7783-7793
Closed Access | Times Cited: 3

Next Gen Security With Quantum-Safe Cryptography
N.P. Singh, Sunil K. Singh, Sudhakar Kumar, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 131-164
Closed Access | Times Cited: 3

Intrusion detection method based on improved social network search algorithm
Zhongjun Yang, Qi Wang, Xuejun Zong, et al.
Computers & Security (2024) Vol. 140, pp. 103781-103781
Closed Access | Times Cited: 2

Multi-order feature interaction-aware intrusion detection scheme for ensuring cyber security of intelligent connected vehicles
Weifeng Gong, Shichun Yang, Haoran Guang, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 135, pp. 108815-108815
Closed Access | Times Cited: 2

An exploratory data analysis of malware/ransomware cyberattacks: insights from an extensive cyber loss dataset
Farshid Javadnejad, Ahmed M. Abdelmagid, C. Ariel Pinto, et al.
Enterprise Information Systems (2024) Vol. 18, Iss. 9
Closed Access | Times Cited: 2

Novel modeling and optimization for joint Cybersecurity-vs-QoS Intrusion Detection Mechanisms in 5G networks
Arash Bozorgchenani, Charilaos C. Zarakovitis, Su Fong Chien, et al.
Computer Networks (2023) Vol. 237, pp. 110051-110051
Open Access | Times Cited: 5

A Network Intrusion Detection Method for Various Information Systems Based on Federated and Deep Learning
Qi Zhou, Chun Shi
International Journal on Semantic Web and Information Systems (2024) Vol. 20, Iss. 1, pp. 1-28
Open Access | Times Cited: 1

Personalized POI Recommendation Using CAGRU and Implicit Semantic Feature Extraction in LBSN
Haiqin Ye, Ying Chen
International Journal on Semantic Web and Information Systems (2024) Vol. 20, Iss. 1, pp. 1-20
Open Access | Times Cited: 1

A Semantic Web-Based Approach for Bat Trajectory Reconstruction With Human Keypoint Information
Zechen Jin, Yida Zheng, Jun Liu, et al.
International Journal on Semantic Web and Information Systems (2024) Vol. 20, Iss. 1, pp. 1-22
Open Access | Times Cited: 1

EfficientNet-deep quantum neural network-based economic denial of sustainability attack detection to enhance network security in cloud
M. Navaneethakrishnan, Maharajan Robinson Joel, Sriram Kalavai Palani, et al.
Network Computation in Neural Systems (2024), pp. 1-25
Closed Access | Times Cited: 1

Post-Quantum Authentication Against Cyber-Physical Attacks in V2X-Based Autonomous Vehicle Platoon
Dongyang Xu, Keping Yu, Lei Liu, et al.
IEEE Transactions on Intelligent Transportation Systems (2023) Vol. 25, Iss. 6, pp. 5034-5044
Closed Access | Times Cited: 3

FedDroidMeter: A Privacy Risk Evaluator for FL-Based Android Malware Classification Systems
Changnan Jiang, Chunhe Xia, Zhuodong Liu, et al.
Entropy (2023) Vol. 25, Iss. 7, pp. 1053-1053
Open Access | Times Cited: 2

Exploring the Intersection of Athletic Psychology and Emerging Technologies
Qiuying Li, Xiaodong Li, Kwok Tai Chui, et al.
International Journal on Semantic Web and Information Systems (2023) Vol. 19, Iss. 1, pp. 1-15
Open Access | Times Cited: 2

Hyperdimensional Consumer Pattern Analysis with Quantum Neural Architectures using Non-Hermitian Operators
Shivam Goyal, Sunil K. Singh, Sudhakar Kumar, et al.
(2023), pp. 1-5
Closed Access | Times Cited: 2

Dynamic decision-making analysis of Netflix's decision to not provide ad-supported subscriptions
Yufei Zhou, Sihan Wang, Nuo Zhang
Technological Forecasting and Social Change (2022) Vol. 187, pp. 122218-122218
Closed Access | Times Cited: 3

Page 1 - Next Page

Scroll to top