OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Zero-day attack detection: a systematic literature review
Rasheed Ahmad, Izzat Alsmadi, Wasim A. Al-Hamdani, et al.
Artificial Intelligence Review (2023) Vol. 56, Iss. 10, pp. 10733-10811
Closed Access | Times Cited: 61

Showing 1-25 of 61 citing articles:

A comprehensive and systematic literature review on intrusion detection systems in the internet of medical things: current status, challenges, and opportunities
Arezou Naghib, Farhad Soleimanian Gharehchopogh, Azadeh Zamanifar
Artificial Intelligence Review (2025) Vol. 58, Iss. 4
Open Access | Times Cited: 3

Digital deception: generative artificial intelligence in social engineering and phishing
Marc Schmitt, Ivan Fléchais
Artificial Intelligence Review (2024) Vol. 57, Iss. 12
Open Access | Times Cited: 11

A comprehensive review of vulnerabilities and AI-enabled defense against DDoS attacks for securing cloud services
Surendra Kumar, Mridula Dwivedi, Mohit Kumar, et al.
Computer Science Review (2024) Vol. 53, pp. 100661-100661
Closed Access | Times Cited: 9

Cascaded intrusion detection system using machine learning
Md. Khabir Uddin Ahamed, Abdul Karim
Systems and Soft Computing (2025), pp. 200182-200182
Open Access | Times Cited: 1

Enhanced Grey Wolf Optimization (EGWO) and random forest based mechanism for intrusion detection in IoT networks
Saad Said Alqahtany, Asadullah Shaikh, Ali Alqazzaz
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access | Times Cited: 1

Unknown web attack threat detection based on large language model
Yijia Xu, Qiang Zhang, Huaxin Deng, et al.
Applied Soft Computing (2025), pp. 112905-112905
Closed Access | Times Cited: 1

Enhanced Network Metric Prediction for Machine Learning-Based Cyber Security of a Software-Defined UAV Relay Network
Dennis Agnew, Álvaro Del Águila, Janise McNair
IEEE Access (2024) Vol. 12, pp. 54202-54219
Open Access | Times Cited: 7

Robust Botnet Detection Approach for Known and Unknown Attacks in IoT Networks Using Stacked Multi-classifier and Adaptive Thresholding
Deepa Krishnan, Pravin Shrinath
Arabian Journal for Science and Engineering (2024) Vol. 49, Iss. 9, pp. 12561-12577
Closed Access | Times Cited: 5

NERO: NEural algorithmic reasoning for zeRO-day attack detection in the IoT: A hybrid approach
Jesús F. Cevallos M., Alessandra Rizzardi, Sabrina Sicari, et al.
Computers & Security (2024) Vol. 142, pp. 103898-103898
Open Access | Times Cited: 5

Deep Reinforcement Learning for intrusion detection in Internet of Things: Best practices, lessons learnt, and open challenges
Jesús F. Cevallos M., Alessandra Rizzardi, Sabrina Sicari, et al.
Computer Networks (2023) Vol. 236, pp. 110016-110016
Closed Access | Times Cited: 13

High-Speed Network DDoS Attack Detection: A Survey
Rana Muhammad Abdul Haseeb-ur-rehman, Azana Hafizah Mohd Aman, Mohammad Kamrul Hasan, et al.
Sensors (2023) Vol. 23, Iss. 15, pp. 6850-6850
Open Access | Times Cited: 12

Social Media Zero-Day Attack Detection Using TensorFlow
Ahmet E. Topcu, Yehia Ibrahim Alzoubi, Ersin Elbaşi, et al.
Electronics (2023) Vol. 12, Iss. 17, pp. 3554-3554
Open Access | Times Cited: 11

Federated transfer learning for attack detection for Internet of Medical Things
Afnan Alharbi
International Journal of Information Security (2024) Vol. 23, Iss. 1, pp. 81-100
Closed Access | Times Cited: 4

An Ensemble Voting Classifier Based On Machine Learning Models for Phishing Detection
Enas Mohammed Hussien Saeed
International Journal of Scientific Research in Science Engineering and Technology (2025) Vol. 12, Iss. 1, pp. 15-27
Open Access

ORADS: One Class Rule-based Anomaly Detection System in Autonomous Vehicles
Anjanee Kumar, Tanmoy Kanti Das
IEEE Sensors Journal (2025) Vol. 25, Iss. 5, pp. 8988-8997
Closed Access

Detection of Zero-day Attacks via Sample Augmentation for the Internet of Vehicles
Bingfeng Xu, Jincheng Zhao, Bo Wang, et al.
Vehicular Communications (2025), pp. 100887-100887
Closed Access

An Explainable LSTM-Based Intrusion Detection System Optimized by Firefly Algorithm for IoT Networks
Taiwo Blessing Ogunseyi, G Thiyagarajan
Sensors (2025) Vol. 25, Iss. 7, pp. 2288-2288
Open Access

Zero Day Attack Detection Using Bayesian Optimized Random Forest Zero-Shot Machine Learning Model: A Design Science Research Methodology (DSRM)
Jovita Nsoh
Lecture notes on data engineering and communications technologies (2025), pp. 59-73
Closed Access

Variational Deep Clustering approaches for anomaly-based cyber-attack detection
Van Quân Nguyen, Viet Hung Nguyen, Long Thanh Ngo, et al.
Journal of Network and Computer Applications (2025), pp. 104182-104182
Closed Access

HERO: From High-dimensional network traffic to zERO-Day attack detection
Jesús F. Cevallos M., Alessandra Rizzardi, Sabrina Sicari, et al.
Computer Networks (2025), pp. 111264-111264
Open Access

Adaptive Intrusion Mitigation in Software-Defined Vehicles Using Deep Reinforcement Learning
Harrison Kurunathan, Hazem Ismail Ali, Gowhar Javanmardi, et al.
(2025), pp. 1-6
Closed Access

A Comparison of Neural-Network-Based Intrusion Detection against Signature-Based Detection in IoT Networks
Max Schrötter, Andreas Niemann, Bettina Schnor
Information (2024) Vol. 15, Iss. 3, pp. 164-164
Open Access | Times Cited: 3

A Comprehensive Analysis of the Machine Learning Algorithms in IoT IDS Systems
Erdal ÖZDOĞAN
IEEE Access (2024) Vol. 12, pp. 46785-46811
Open Access | Times Cited: 3

Page 1 - Next Page

Scroll to top