
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Analysing Influential Factors in Student Academic Achievement: Prediction Modelling and Insight
Fahmida Faiza Ananna, Ruchira Nowreen, Sakhar Saad Rashid Al Jahwari, et al.
International Journal of Emerging Multidisciplinaries Computer Science & Artificial Intelligence (2023) Vol. 2, Iss. 1
Open Access | Times Cited: 17
Fahmida Faiza Ananna, Ruchira Nowreen, Sakhar Saad Rashid Al Jahwari, et al.
International Journal of Emerging Multidisciplinaries Computer Science & Artificial Intelligence (2023) Vol. 2, Iss. 1
Open Access | Times Cited: 17
Showing 17 citing articles:
Data Security and Privacy Concerns in Drone Operations
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 236-290
Closed Access | Times Cited: 13
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 236-290
Closed Access | Times Cited: 13
Eyes in the Sky
Siva Raja Sindiramutty, Chong Eng Tan, Wei Wei Goh
Advances in information security, privacy, and ethics book series (2024), pp. 405-451
Closed Access | Times Cited: 7
Siva Raja Sindiramutty, Chong Eng Tan, Wei Wei Goh
Advances in information security, privacy, and ethics book series (2024), pp. 405-451
Closed Access | Times Cited: 7
Future Trends and Emerging Threats in Drone Cybersecurity
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 148-195
Closed Access | Times Cited: 7
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 148-195
Closed Access | Times Cited: 7
Detecting Cyber Threats With a Graph-Based NIDPS
Brendan Ooi Tze Wen, Najihah Syahriza, Nicholas Chan Wei Xian, et al.
Advances in logistics, operations, and management science book series (2023), pp. 36-74
Closed Access | Times Cited: 16
Brendan Ooi Tze Wen, Najihah Syahriza, Nicholas Chan Wei Xian, et al.
Advances in logistics, operations, and management science book series (2023), pp. 36-74
Closed Access | Times Cited: 16
Ethical Considerations in Drone Cybersecurity
Siva Raja Sindiramutty, Chong Eng Tan, Bhavin Shah, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 42-87
Closed Access | Times Cited: 6
Siva Raja Sindiramutty, Chong Eng Tan, Bhavin Shah, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 42-87
Closed Access | Times Cited: 6
Securing the Supply Chain
Siva Raja Sindiramutty, Chong Eng Tan, Wei Wei Goh, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 300-365
Closed Access | Times Cited: 2
Siva Raja Sindiramutty, Chong Eng Tan, Wei Wei Goh, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 300-365
Closed Access | Times Cited: 2
Sustainability in the Digital Age
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in logistics, operations, and management science book series (2024), pp. 89-132
Closed Access | Times Cited: 1
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in logistics, operations, and management science book series (2024), pp. 89-132
Closed Access | Times Cited: 1
Sustainability Metrics and Measurement in Industry 4.0-Enabled SCM
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in logistics, operations, and management science book series (2024), pp. 176-233
Closed Access | Times Cited: 1
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in logistics, operations, and management science book series (2024), pp. 176-233
Closed Access | Times Cited: 1
Overview of Generative AI Techniques for Cybersecurity
Siva Raja Sindiramutty, Krishna Raj V. Prabagaran, Rehan Akbar, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 1-52
Closed Access | Times Cited: 1
Siva Raja Sindiramutty, Krishna Raj V. Prabagaran, Rehan Akbar, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 1-52
Closed Access | Times Cited: 1
Ethics and Transparency in Secure Web Model Generation
Siva Raja Sindiramutty, Krishna Raj V. Prabagaran, N. Z. Jhanjhi, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 411-464
Closed Access
Siva Raja Sindiramutty, Krishna Raj V. Prabagaran, N. Z. Jhanjhi, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 411-464
Closed Access
Generative AI for Threat Hunting and Behaviour Analysis
Siva Raja Sindiramutty, N. Z. Jhanjhi, Rehan Akbar, et al.
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 235-286
Closed Access
Siva Raja Sindiramutty, N. Z. Jhanjhi, Rehan Akbar, et al.
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 235-286
Closed Access
Generative AI for Threat Intelligence and Information Sharing
Siva Raja Sindiramutty, Krishna Raj V. Prabagaran, N. Z. Jhanjhi, et al.
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 191-234
Closed Access
Siva Raja Sindiramutty, Krishna Raj V. Prabagaran, N. Z. Jhanjhi, et al.
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 191-234
Closed Access
Risk Assessment and Mitigation With Generative AI Models
Siva Raja Sindiramutty, N. Z. Jhanjhi, Rehan Akbar, et al.
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 29-82
Closed Access
Siva Raja Sindiramutty, N. Z. Jhanjhi, Rehan Akbar, et al.
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 29-82
Closed Access
Generative AI for Secure User Interface (UI) Design
Siva Raja Sindiramutty, Krishna Raj V. Prabagaran, Rehan Akbar, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 333-394
Closed Access
Siva Raja Sindiramutty, Krishna Raj V. Prabagaran, Rehan Akbar, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 333-394
Closed Access
Generative AI in Network Security and Intrusion Detection
Siva Raja Sindiramutty, Krishna Raj V. Prabagaran, N. Z. Jhanjhi, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 77-124
Closed Access
Siva Raja Sindiramutty, Krishna Raj V. Prabagaran, N. Z. Jhanjhi, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 77-124
Closed Access
Security Considerations in Generative AI for Web Applications
Siva Raja Sindiramutty, Krishna Raj V. Prabagaran, N. Z. Jhanjhi, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 281-332
Closed Access
Siva Raja Sindiramutty, Krishna Raj V. Prabagaran, N. Z. Jhanjhi, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 281-332
Closed Access
Effects of office hours on the academic performance of students in Mogadishu universities, Somalia
Ahmed Absuge Gabow, Abdirahman Ibrahim Abdi
Cogent Education (2024) Vol. 12, Iss. 1
Open Access
Ahmed Absuge Gabow, Abdirahman Ibrahim Abdi
Cogent Education (2024) Vol. 12, Iss. 1
Open Access