
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Introduction to The Data Mining Techniques in Cybersecurity
Israa Ezzat Salem, Maad M. Mijwil, Alaa Wagih Abdulqader, et al.
Deleted Journal (2022), pp. 28-37
Open Access | Times Cited: 22
Israa Ezzat Salem, Maad M. Mijwil, Alaa Wagih Abdulqader, et al.
Deleted Journal (2022), pp. 28-37
Open Access | Times Cited: 22
Showing 22 citing articles:
Towards Artificial Intelligence-Based Cybersecurity: The Practices and ChatGPT Generated Ways to Combat Cybercrime
Iraqi Journal for Computer Science and Mathematics (2023), pp. 65-70
Open Access | Times Cited: 93
Iraqi Journal for Computer Science and Mathematics (2023), pp. 65-70
Open Access | Times Cited: 93
ChatGPT and the Future of Academic Integrity in the Artificial Intelligence Era: A New Frontier
Maad M. Mijwil, Kamal Kant Hiran, Ruchi Doshi, et al.
Al-Salam Journal for Engineering and Technology (2023) Vol. 2, Iss. 2, pp. 116-127
Open Access | Times Cited: 78
Maad M. Mijwil, Kamal Kant Hiran, Ruchi Doshi, et al.
Al-Salam Journal for Engineering and Technology (2023) Vol. 2, Iss. 2, pp. 116-127
Open Access | Times Cited: 78
The Significance of Machine Learning and Deep Learning Techniques in Cybersecurity: A Comprehensive Review
Iraqi Journal for Computer Science and Mathematics (2023), pp. 87-101
Open Access | Times Cited: 69
Iraqi Journal for Computer Science and Mathematics (2023), pp. 87-101
Open Access | Times Cited: 69
Exploring the Top Five Evolving Threats in Cybersecurity: An In-Depth Overview
Maad M. Mijwil, Omega John Unogwu, Youssef Filali, et al.
Deleted Journal (2023), pp. 57-63
Open Access | Times Cited: 58
Maad M. Mijwil, Omega John Unogwu, Youssef Filali, et al.
Deleted Journal (2023), pp. 57-63
Open Access | Times Cited: 58
MobileNetV1-Based Deep Learning Model for Accurate Brain Tumor Classification
Maad M. Mijwil, Ruchi Doshi, Kamal Kant Hiran, et al.
Mesopotamian Journal of Computer Science (2023), pp. 32-41
Open Access | Times Cited: 58
Maad M. Mijwil, Ruchi Doshi, Kamal Kant Hiran, et al.
Mesopotamian Journal of Computer Science (2023), pp. 32-41
Open Access | Times Cited: 58
A REVIEW OF CYBERSECURITY STRATEGIES IN MODERN ORGANIZATIONS: EXAMINING THE EVOLUTION AND EFFECTIVENESS OF CYBERSECURITY MEASURES FOR DATA PROTECTION
Temitayo Oluwaseun Abrahams, Sarah Kuzankah Ewuga, Samuel Onimisi Dawodu, et al.
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 1, pp. 1-25
Open Access | Times Cited: 19
Temitayo Oluwaseun Abrahams, Sarah Kuzankah Ewuga, Samuel Onimisi Dawodu, et al.
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 1, pp. 1-25
Open Access | Times Cited: 19
The Purpose of Cybersecurity Governance in the Digital Transformation of Public Services and Protecting the Digital Environment
Maad M. Mijwil, Youssef Filali, Mohammad Aljanabi, et al.
Deleted Journal (2023), pp. 1-6
Open Access | Times Cited: 30
Maad M. Mijwil, Youssef Filali, Mohammad Aljanabi, et al.
Deleted Journal (2023), pp. 1-6
Open Access | Times Cited: 30
Advancing Construction with IoT and RFID Technology in Civil Engineering: A Technology Review
Maad M. Mijwil, Kamal Kant Hiran, Ruchi Doshi, et al.
Al-Salam Journal for Engineering and Technology (2023) Vol. 2, Iss. 2, pp. 54-62
Open Access | Times Cited: 22
Maad M. Mijwil, Kamal Kant Hiran, Ruchi Doshi, et al.
Al-Salam Journal for Engineering and Technology (2023) Vol. 2, Iss. 2, pp. 54-62
Open Access | Times Cited: 22
Predicting Carbon Dioxide Emissions with the Orange Application: An Empirical Analysis
israa ezzat, Alaa Wagih Abdulqader
Mesopotamian Journal of Computer Science (2023), pp. 56-66
Open Access | Times Cited: 17
israa ezzat, Alaa Wagih Abdulqader
Mesopotamian Journal of Computer Science (2023), pp. 56-66
Open Access | Times Cited: 17
DLTN-LOSP: A Novel Deep-Linear-Transition-Network-Based Resource Allocation Model with the Logic Overhead Security Protocol for Cloud Systems
Divya Ramachandran, Syed Muhammad Naqi, Ganeshkumar Perumal, et al.
Sensors (2023) Vol. 23, Iss. 20, pp. 8448-8448
Open Access | Times Cited: 9
Divya Ramachandran, Syed Muhammad Naqi, Ganeshkumar Perumal, et al.
Sensors (2023) Vol. 23, Iss. 20, pp. 8448-8448
Open Access | Times Cited: 9
Analysing the Connection Between AI and Industry 4.0 from a Cybersecurity Perspective: Defending the Smart Revolution
Indu Bala, Maad M. Mijwil, Guma Ali, et al.
Mesopotamian Journal of Big Data (2023), pp. 63-69
Open Access | Times Cited: 8
Indu Bala, Maad M. Mijwil, Guma Ali, et al.
Mesopotamian Journal of Big Data (2023), pp. 63-69
Open Access | Times Cited: 8
Future Trends in Cybersecurity: Exploring Emerging Technologies and Strategies
Arkan A. Ghaib
International Research Journal of Modernization in Engineering Technology and Science (2024)
Open Access | Times Cited: 1
Arkan A. Ghaib
International Research Journal of Modernization in Engineering Technology and Science (2024)
Open Access | Times Cited: 1
Effectual Text Classification in Data Mining: A Practical Approach
Israa Ezzat Salem, Alaa Wagih Abdulqader, Atheel Sabih Shaker
Mesopotamian Journal of Big Data (2023), pp. 46-52
Open Access | Times Cited: 2
Israa Ezzat Salem, Alaa Wagih Abdulqader, Atheel Sabih Shaker
Mesopotamian Journal of Big Data (2023), pp. 46-52
Open Access | Times Cited: 2
Unveiling the Optimal Approach for Credit Card Fraud Detection: A Thorough Analysis of Deep Learning and Machine Learning Methods
Ubaida Fatima, Sadia Kiran, Muhammad Akhter, et al.
Research Square (Research Square) (2024)
Open Access
Ubaida Fatima, Sadia Kiran, Muhammad Akhter, et al.
Research Square (Research Square) (2024)
Open Access
CLUSTER ANALYSIS FOR RESEARCHING DIGITAL FOOTPRINTS OF STUDENTS IN EDUCATIONAL INSTITUTIONS
Valeriy Lakhno, Semen Voloshyn, Serhii Mamchenko, et al.
Cybersecurity Education Science Technique (2024) Vol. 3, Iss. 23, pp. 31-41
Open Access
Valeriy Lakhno, Semen Voloshyn, Serhii Mamchenko, et al.
Cybersecurity Education Science Technique (2024) Vol. 3, Iss. 23, pp. 31-41
Open Access
Web Data Mining for Cyber Security Threat Detection
Tejal Bhimraj Ghuge, Sammip Sunil Biradar
2022 International Conference on Inventive Computation Technologies (ICICT) (2024)
Closed Access
Tejal Bhimraj Ghuge, Sammip Sunil Biradar
2022 International Conference on Inventive Computation Technologies (ICICT) (2024)
Closed Access
A Thorough Examination of the Importance of Machine Learning and Deep Learning Methodologies in the Realm of Cybersecurity: An Exhaustive Analysis
Ramsha Khalid, Muhammad Naqi Raza
Journal of Engineering Research and Sciences (2024) Vol. 3, Iss. 7, pp. 11-22
Closed Access
Ramsha Khalid, Muhammad Naqi Raza
Journal of Engineering Research and Sciences (2024) Vol. 3, Iss. 7, pp. 11-22
Closed Access
Tech Guardians: Comprehensive Defense against Cyber Threats
Preethi K. M, M. Ambika, S Vickma, et al.
(2024), pp. 549-551
Closed Access
Preethi K. M, M. Ambika, S Vickma, et al.
(2024), pp. 549-551
Closed Access
A Systematic Survey on the Research of AI-predictive Models for Wastewater Treatment Processes
Iraqi Journal for Computer Science and Mathematics (2023), pp. 102-113
Open Access | Times Cited: 1
Iraqi Journal for Computer Science and Mathematics (2023), pp. 102-113
Open Access | Times Cited: 1
Automated Root Cause Analysis with Observability Data - A Comprehensive Review
Ankur Mahida
Journal of Engineering and Applied Sciences Technology (2023), pp. 1-4
Open Access | Times Cited: 1
Ankur Mahida
Journal of Engineering and Applied Sciences Technology (2023), pp. 1-4
Open Access | Times Cited: 1
A Brief Overview of Cyber Security Advances and Techniques Along With a Glimpse on Quantum Cryptography
Vineeta Singh, Vandana Dixit Kaushik
Advances in digital crime, forensics, and cyber terrorism book series (2023), pp. 40-64
Closed Access
Vineeta Singh, Vandana Dixit Kaushik
Advances in digital crime, forensics, and cyber terrorism book series (2023), pp. 40-64
Closed Access
ODTT: Optimized Dynamic Taxonomy Tree with Differential Privacy
Yijie Gui, Qizhi Chen, Wensheng Gan, et al.
2021 IEEE International Conference on Big Data (Big Data) (2023), pp. 3264-3273
Closed Access
Yijie Gui, Qizhi Chen, Wensheng Gan, et al.
2021 IEEE International Conference on Big Data (Big Data) (2023), pp. 3264-3273
Closed Access