OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

An autoML network traffic analyzer for cyber threat detection
Αλέξανδρος Παπανικολάου, Aggelos Alevizopoulos, Christos Ilioudis, et al.
International Journal of Information Security (2023) Vol. 22, Iss. 5, pp. 1511-1530
Closed Access | Times Cited: 11

Showing 11 citing articles:

Novel Class Probability Features for Optimizing Network Attack Detection With Machine Learning
Ali Raza, Kashif Munir, Mubarak Almutairi, et al.
IEEE Access (2023) Vol. 11, pp. 98685-98694
Open Access | Times Cited: 28

Zero-touch networks: Towards next-generation network automation
Mirna El Rajab, Li Yang, Abdallah Shami
Computer Networks (2024) Vol. 243, pp. 110294-110294
Open Access | Times Cited: 15

An Overview of Privacy Dimensions on the Industrial Internet of Things (IIoT)
Vasiliki Demertzi, Stavros Demertzis, Konstantinos Demertzis
Algorithms (2023) Vol. 16, Iss. 8, pp. 378-378
Open Access | Times Cited: 18

Exploración integral de la seguridad en redes de proveedores de servicios de internet: Una revisión sistemática de literatura
Chrystian Viteri Hernández, Diego Ávila
Revista Perspectivas (2024) Vol. 6, Iss. 1
Open Access | Times Cited: 1

Analysis of Encrypted Network Traffic for Enhancing Cyber-security in Dynamic Environments
Faeiz Alserhani
Applied Artificial Intelligence (2024) Vol. 38, Iss. 1
Open Access | Times Cited: 1

The Missing Piece in the Zero Trust Sphere Knowledge Management Perspectives on Safeguarding Business Data
Mona A. Mohamed, Beenish Moalla Chaudhry, Joyram Chakraborty, et al.
(2024)
Closed Access

Real-Time Anomaly Detection System for Network Administrators
Ashwinee Barbadekar, Akshara Amrutkar, Ashfan Khan
Lecture notes in networks and systems (2024), pp. 315-326
Closed Access

ENSURING A SAFE TOMORROW: CONCLUSIONS FROM THE ANALYSIS OF THE LEADING CYBER ATTACKS AND THEIR IMPACT ON INFORMATION SECURITY
A. R. Yerboluly, T. K. Tusipova
Bulletin of Shakarim University Technical Sciences (2024), Iss. 3(15), pp. 5-15
Closed Access

Lambda Architecture-Based Big Data System for Large-Scale Targeted Social Engineering Email Detection
Mustafa Umut Demirezen, Tuğba Selcen Navruz
International Journal of Information Security Science (2023) Vol. 12, Iss. 3, pp. 29-59
Open Access | Times Cited: 1

Investigating the Benefits of Adopting Secure Shell (SSH) in Wireless Network Security
C Gavathri, Vivek D. Patil, Dhiraj Kumar Singh, et al.
(2023), pp. 309-315
Closed Access

Page 1

Scroll to top