OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions towards automation, intelligence and transparent cybersecurity modeling for critical infrastructures
Iqbal H. Sarker, Helge Janicke, Mohamed Amine Ferrag, et al.
Internet of Things (2024) Vol. 25, pp. 101110-101110
Open Access | Times Cited: 20

Showing 20 citing articles:

Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects
Iqbal H. Sarker, Helge Janicke, Ahmad Mohsin, et al.
ICT Express (2024) Vol. 10, Iss. 4, pp. 935-958
Open Access | Times Cited: 21

Generative AI in Cybersecurity: A Comprehensive Review of LLM Applications and Vulnerabilities
Mohamed Amine Ferrag, Fatima Alwahedi, Ammar Battah, et al.
Internet of Things and Cyber-Physical Systems (2025)
Open Access | Times Cited: 2

A hybrid machine learning model for intrusion detection in wireless sensor networks leveraging data balancing and dimensionality reduction
Md. Alamin Talukder, Majdi Khalid, Nasrin Sultana
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access | Times Cited: 1

Examining the Role of Artificial Intelligence in Cyber Security (CS): A Systematic Review for Preventing Prospective Solutions in Financial Transactions
Mahfujur Rahman Faraji, Fisan Shikder, Md. Hasibul Hasan, et al.
International Journal of Religion (2024) Vol. 5, Iss. 10, pp. 4766-4782
Open Access | Times Cited: 5

Cybersecurity in microgrids: A review on advanced techniques and practical implementation of resilient energy systems
Ijaz Ahmed, Ali M. El‐Rifaie, F. Akhtar, et al.
Energy Strategy Reviews (2025) Vol. 58, pp. 101654-101654
Open Access

Impact of Cybersecurity on Old-Type Steel Manufacturing Industrial Processes
Erzsébet Cserta, Krisztián Wizner, István Háber, et al.
Advanced sciences and technologies for security applications (2025), pp. 261-270
Closed Access

AI-Powered Cybersecurity Governance: The Role of Business Analysts in Ethical AI Deployment
Comfort Claire Adaji, Alliy Adewale Bello, Chioma Emmanuela Ukatu, et al.
(2025), pp. 1384-1396
Closed Access

Towards a framework for improving cyber security resilience of critical infrastructure against cyber threats: a dynamic capabilities approach
Jonna Järveläinen, Duong Dang, Mike Mekkanen, et al.
Journal of Decision System (2025) Vol. 34, Iss. 1
Open Access

AI-Powered Cybersecurity Governance: The Role of Business Analysts in Ethical AI Deployment
Comfort Claire Adaji, Alliy Adewale Bello, Chioma Emmanuela Ukatu, et al.
(2025), pp. 1384-1396
Closed Access

Future Trends in AI Security
Siva Raja Sindiramutty, N. Z. Jhanjhi, Navid Ali Khan
Advances in information security, privacy, and ethics book series (2025), pp. 229-262
Closed Access

Cybersecurity for AI-Enhanced Supervisory Control and Data Acquisition (SCADA) Systems
C. V. Suresh Babu, Sudhir Manohoran, P. Andrew Simon
Advances in computational intelligence and robotics book series (2025), pp. 263-298
Closed Access

Research on the Application Framework of Generative AI in Emergency Response Decision Support Systems for Emergencies
Siqing Shan, Yinong Li
International Journal of Human-Computer Interaction (2024), pp. 1-18
Closed Access | Times Cited: 3

Cybersecurity Threats and Mitigation Measures in Agriculture 4.0 and 5.0
Chrysanthos Maraveas, Muttukrishnan Rajarajan, Konstantinos G. Arvanitis, et al.
Smart Agricultural Technology (2024), pp. 100616-100616
Open Access | Times Cited: 2

Generative AI for Threat Intelligence and Information Sharing
Siva Raja Sindiramutty, Krishna Raj V. Prabagaran, N. Z. Jhanjhi, et al.
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 191-234
Closed Access | Times Cited: 1

Adaptive Management of Multi-Scenario Projects in Cybersecurity: Models and Algorithms for Decision-Making
В С Тынченко, Alexander Lomazov, Vadim Lomazov, et al.
Big Data and Cognitive Computing (2024) Vol. 8, Iss. 11, pp. 150-150
Open Access | Times Cited: 1

AI Cyber Defense and eBPF
Alex Mathew
World Journal of Advanced Research and Reviews (2024) Vol. 22, Iss. 1, pp. 1983-1989
Open Access

Predictive Modeling of UHPC Compressive Strength: Integration of Support Vector Regression and Arithmetic Optimization Algorithm
Liuyan Wang, Jiuyong Li, Dong Dai, et al.
Applied Sciences (2024) Vol. 14, Iss. 17, pp. 8083-8083
Open Access

Case Studies and Applications of Generative AI in Real-World Cybersecurity Scenarios
Azeem Khan, N. Z. Jhanjhi, Ghassan Ahmed Alı, et al.
Advances in human and social aspects of technology book series (2024), pp. 61-100
Closed Access

An intelligent rule-based decision-making system for preliminary truck dispatching within open-pit mines
Arman Hazrathosseini, Ali Moradi Afrapoli
Mining Technology Transactions of the Institutions of Mining and Metallurgy (2024)
Closed Access

Classification of Cancer Pathology Reports Using Rule-Based Approaches: A Review
Hicham Ouchene, Melyara Mezzi, Lamia Oukid, et al.
(2024), pp. 1-8
Closed Access

Page 1

Scroll to top