
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Artificial Intelligence for Cyber Security
Meghna Manoj Nair, Atharva Deshmukh, Amit Kumar Tyagi
(2023), pp. 83-114
Closed Access | Times Cited: 18
Meghna Manoj Nair, Atharva Deshmukh, Amit Kumar Tyagi
(2023), pp. 83-114
Closed Access | Times Cited: 18
Showing 18 citing articles:
Enhancing Cybersecurity through AI and ML: Strategies, Challenges, and Future Directions
Maryam Roshanaei, Mahir R. Khan, Natalie N. Sylvester
Journal of Information Security (2024) Vol. 15, Iss. 03, pp. 320-339
Open Access | Times Cited: 12
Maryam Roshanaei, Mahir R. Khan, Natalie N. Sylvester
Journal of Information Security (2024) Vol. 15, Iss. 03, pp. 320-339
Open Access | Times Cited: 12
A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review
Zaffar Ahmed Shaikh, Fahima Hajjej, Yeter Demir Uslu, et al.
IEEE Access (2024) Vol. 12, pp. 7156-7169
Open Access | Times Cited: 9
Zaffar Ahmed Shaikh, Fahima Hajjej, Yeter Demir Uslu, et al.
IEEE Access (2024) Vol. 12, pp. 7156-7169
Open Access | Times Cited: 9
Securing Trust: Ethical Considerations in AI for Cybersecurity
Naveen Vemuri, Naresh Thaneeru, Venkata Manoj Tatikonda
Journal of Knowledge Learning and Science Technology ISSN 2959-6386 (online) (2023) Vol. 2, Iss. 2, pp. 167-175
Open Access | Times Cited: 16
Naveen Vemuri, Naresh Thaneeru, Venkata Manoj Tatikonda
Journal of Knowledge Learning and Science Technology ISSN 2959-6386 (online) (2023) Vol. 2, Iss. 2, pp. 167-175
Open Access | Times Cited: 16
BenchMFC: A benchmark dataset for trustworthy malware family classification under concept drift
Yongkang Jiang, Gaolei Li, Shenghong Li, et al.
Computers & Security (2024) Vol. 139, pp. 103706-103706
Closed Access | Times Cited: 5
Yongkang Jiang, Gaolei Li, Shenghong Li, et al.
Computers & Security (2024) Vol. 139, pp. 103706-103706
Closed Access | Times Cited: 5
Artificial Intelligence (AI) and the Future of Marketing Trends
Ajay Sharma, Prashant Sharma, Ripudaman Gaur
Advances in computational intelligence and robotics book series (2025), pp. 23-46
Closed Access
Ajay Sharma, Prashant Sharma, Ripudaman Gaur
Advances in computational intelligence and robotics book series (2025), pp. 23-46
Closed Access
Future Trends in AI Security
Siva Raja Sindiramutty, N. Z. Jhanjhi, Navid Ali Khan
Advances in information security, privacy, and ethics book series (2025), pp. 229-262
Closed Access
Siva Raja Sindiramutty, N. Z. Jhanjhi, Navid Ali Khan
Advances in information security, privacy, and ethics book series (2025), pp. 229-262
Closed Access
Comprehensive study on object detection for security and surveillance: A concise review
Faisal Alamri
Multimedia Tools and Applications (2025)
Closed Access
Faisal Alamri
Multimedia Tools and Applications (2025)
Closed Access
Artificial intelligence and machine learning in cybersecurity: a deep dive into state-of-the-art techniques and future paradigms
Nachaat Mohamed
Knowledge and Information Systems (2025)
Open Access
Nachaat Mohamed
Knowledge and Information Systems (2025)
Open Access
Introduction to Artificial Intelligence in Cybersecurity and Forensic Science
Hewa Majeed Zangana, Marwan Omar, Derek Mohammed
Advances in information security, privacy, and ethics book series (2024), pp. 1-24
Closed Access | Times Cited: 3
Hewa Majeed Zangana, Marwan Omar, Derek Mohammed
Advances in information security, privacy, and ethics book series (2024), pp. 1-24
Closed Access | Times Cited: 3
Automated Evidence Collection and Analysis Using AI
Luay Albtosh
Advances in information security, privacy, and ethics book series (2024), pp. 143-186
Closed Access | Times Cited: 2
Luay Albtosh
Advances in information security, privacy, and ethics book series (2024), pp. 143-186
Closed Access | Times Cited: 2
AI and Machine Learning in E-Commerce Security
B. Girimurugan, V. Kumaresan, Suparna Gopi Nair, et al.
Advances in web technologies and engineering book series (2024), pp. 29-53
Closed Access | Times Cited: 1
B. Girimurugan, V. Kumaresan, Suparna Gopi Nair, et al.
Advances in web technologies and engineering book series (2024), pp. 29-53
Closed Access | Times Cited: 1
Generative AI for Threat Hunting and Behaviour Analysis
Siva Raja Sindiramutty, N. Z. Jhanjhi, Rehan Akbar, et al.
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 235-286
Closed Access | Times Cited: 1
Siva Raja Sindiramutty, N. Z. Jhanjhi, Rehan Akbar, et al.
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 235-286
Closed Access | Times Cited: 1
Digital Forensic Data Mining and Pattern Recognition
Luay Albtosh
Advances in information security, privacy, and ethics book series (2024), pp. 245-294
Closed Access | Times Cited: 1
Luay Albtosh
Advances in information security, privacy, and ethics book series (2024), pp. 245-294
Closed Access | Times Cited: 1
Network Forensics and Traffic Analysis With Machine Learning
Yara Shamoo
Advances in information security, privacy, and ethics book series (2024), pp. 79-116
Closed Access | Times Cited: 1
Yara Shamoo
Advances in information security, privacy, and ethics book series (2024), pp. 79-116
Closed Access | Times Cited: 1
A Novel Neural Networks-based Framework for APT Detection in Networked Autonomous Systems
Hassan El Alami, Danda B. Rawat
(2024), pp. 1-6
Closed Access
Hassan El Alami, Danda B. Rawat
(2024), pp. 1-6
Closed Access
Enhancing E-Commerce Data Privacy in India's Rapidly Evolving Cybersecurity Landscape Through AI-Driven Intrusion Detection Systems
B. Selvalakshmi, G. Sudhakar, Anand Anbalagan, et al.
Advances in electronic commerce (AEC) book series/Advances in electronic commerce series (2024), pp. 261-280
Closed Access
B. Selvalakshmi, G. Sudhakar, Anand Anbalagan, et al.
Advances in electronic commerce (AEC) book series/Advances in electronic commerce series (2024), pp. 261-280
Closed Access
AICyber-Chain: Combining AI and Blockchain for Improved Cybersecurity
Zia Ullah, Abdul Waheed, Muhammad Ismail Mohmand, et al.
IEEE Access (2024) Vol. 12, pp. 142194-142214
Open Access
Zia Ullah, Abdul Waheed, Muhammad Ismail Mohmand, et al.
IEEE Access (2024) Vol. 12, pp. 142194-142214
Open Access
The Role of Machine Learning and Deep Learning in Threat Detection
Omar Farouk
Advances in information security, privacy, and ethics book series (2024), pp. 25-54
Closed Access
Omar Farouk
Advances in information security, privacy, and ethics book series (2024), pp. 25-54
Closed Access
Using Natural Language Processing (NLP) for Phishing and Spam Detection
Yara Shamoo
Advances in information security, privacy, and ethics book series (2024), pp. 55-78
Closed Access
Yara Shamoo
Advances in information security, privacy, and ethics book series (2024), pp. 55-78
Closed Access