OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Detecting anomalous cryptocurrency transactions: An AML/CFT application of machine learning-based forensics
Nadia Pocher, Mirko Zichichi, Fabio Merizzi, et al.
Electronic Markets (2023) Vol. 33, Iss. 1
Open Access | Times Cited: 34

Showing 26-50 of 34 citing articles:

Identification of Suspicious Addresses in Public Blockchains: a Survey
Д.А. Зенюк
Cifrovaâ èkonomika. (2024), Iss. 3(29), pp. 45-53
Closed Access

Anomaly Detection in Blockchain Using Multi-source Embedding and Attention Mechanism
Ao Xiong, Chenbin Qiao, Baozhen Qi, et al.
Lecture notes in computer science (2024), pp. 357-372
Closed Access

Exploring Effective Strategies for Combatting Cybercrime and Intersection of IoT, Deep Learning
Bhupinder Singh, Christian Kaunert
Advances in human and social aspects of technology book series (2024), pp. 141-172
Closed Access

A Timeline and Analysis of Recent Bitcoin Money-Laundering Detection Methods
Rebeca Tonu, Ciprian Pungilă
Lecture notes in networks and systems (2024), pp. 15-24
Closed Access

Navigating Cryptocurrency Regulation
Bhupinder Singh, Christian Kaunert
Advances in hospitality, tourism and the services industry (AHTSI) book series (2024), pp. 133-160
Closed Access

Reflections on Decentralization in Decentralized Financial Applications
Martin Brennecke, Eduard Hartwich, Emanuela Podda, et al.
(2024), pp. 239-246
Closed Access

Bitcoin Fraudulent Transaction Detection Vulnerability
Takashi Ehara, Hiroshi Takahashi
Smart innovation, systems and technologies (2023), pp. 183-193
Closed Access | Times Cited: 1

Ontology-Driven Digital Profiling for Identification and Linking Evidence Across Social Media Platform
Šarūnas Grigaliūnas, Rasa Brūzgienė, Algimantas Venčkauskas
IEEE Access (2023) Vol. 11, pp. 111672-111691
Open Access | Times Cited: 1

Text security by using a combination of the vigenere cipher and the rubik's cube method of size 4×4×4
Raudhatun Safitri, Puguh Wahyu Prasetyo, Dian Eka Wijayanti, et al.
Al-Jabar Jurnal Pendidikan Matematika (2023) Vol. 14, Iss. 2, pp. 281-281
Open Access

Previous Page - Page 2

Scroll to top