OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Zero-Day Vulnerabilities: Unveiling the Threat Landscape in Network Security
Raheela zaib
Deleted Journal (2022), pp. 57-64
Open Access | Times Cited: 7

Showing 7 citing articles:

Enhancing Mobile Security through Comprehensive Penetration Testing
Maryam Roshanaei
Journal of Information Security (2024) Vol. 15, Iss. 02, pp. 63-86
Open Access | Times Cited: 5

Social Engineering in the Era of AI: Unmasking the Changing Face of Cyber Threats
Mohamed Chawki
Studies in computational intelligence (2025), pp. 1-24
Closed Access

Formally Discovering and Reproducing Network Protocols Vulnerabilities
Christophe Crochet, John O. R. Aoga, Axel Legay
Lecture notes in computer science (2025), pp. 424-443
Closed Access

Feature Engineering and Model Optimization Based Classification Method for Network Intrusion Detection
Yujie Zhang, Zebin Wang
Applied Sciences (2023) Vol. 13, Iss. 16, pp. 9363-9363
Open Access | Times Cited: 7

Comprehensive Review of Advanced Machine Learning Techniques for Detecting and Mitigating Zero-Day Exploits
Nachaat Mohamed, Hamed Taherdoost, Mitra Madanchian
ICST Transactions on Scalable Information Systems (2024) Vol. 11
Open Access | Times Cited: 1

Application of GA-WELM Model Based on Stratified Cross-Validation in Intrusion Detection
Chen Chen, Xiangke Guo, Wei Zhang, et al.
Symmetry (2023) Vol. 15, Iss. 9, pp. 1719-1719
Open Access | Times Cited: 2

Linear Retention Convolutional Network for Few-Shot Network Threat Detection
Yong Ding, Zhi Li, Changsong Yang, et al.
(2024), pp. 75-82
Closed Access

Page 1

Scroll to top