
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A novel model for Sybil attack detection in online social network using optimal three-stream double attention network
Blessy Antony, S. Revathy
The Journal of Supercomputing (2023) Vol. 80, Iss. 6, pp. 7433-7482
Closed Access | Times Cited: 5
Blessy Antony, S. Revathy
The Journal of Supercomputing (2023) Vol. 80, Iss. 6, pp. 7433-7482
Closed Access | Times Cited: 5
Showing 5 citing articles:
A file archival integrity check method based on the BiLSTM + CNN model and deep learning
J. Q. Li, Tingjun Wang, Chao Ma, et al.
Egyptian Informatics Journal (2025) Vol. 29, pp. 100597-100597
Closed Access | Times Cited: 2
J. Q. Li, Tingjun Wang, Chao Ma, et al.
Egyptian Informatics Journal (2025) Vol. 29, pp. 100597-100597
Closed Access | Times Cited: 2
Protecting social networks against Dual-Vector attacks using Swarm OpenAI, Large Language Models, Swarm Intelligence, and Transformers
Muhammad Nadeem, Hongsong Chen
Expert Systems with Applications (2025), pp. 127307-127307
Closed Access
Muhammad Nadeem, Hongsong Chen
Expert Systems with Applications (2025), pp. 127307-127307
Closed Access
ASRL: Adaptive Swarm Reinforcement Learning For Enhanced OSN Intrusion Detection
Edward Kwadwo Boahen, Rexford Nii Ayitey Sosu, Selasi Kwame Ocansey, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 10258-10272
Closed Access | Times Cited: 1
Edward Kwadwo Boahen, Rexford Nii Ayitey Sosu, Selasi Kwame Ocansey, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 10258-10272
Closed Access | Times Cited: 1
Online social network automation attack detection methods for energy analysis and consumption modelling
Romil Rawat, Ranjana Sikarwar, Prakash Kumar Maravi, et al.
International Journal of Information Technology (2024)
Closed Access
Romil Rawat, Ranjana Sikarwar, Prakash Kumar Maravi, et al.
International Journal of Information Technology (2024)
Closed Access
A Systematic Security Analysis of Existing Sybil Attack-Resilient Defensive Methodologies in Blockchain Network
Sparsh Kasana, Monika Sharma, S. P. Gupta
Advances in information security, privacy, and ethics book series (2024), pp. 191-224
Closed Access
Sparsh Kasana, Monika Sharma, S. P. Gupta
Advances in information security, privacy, and ethics book series (2024), pp. 191-224
Closed Access