OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Detection of Malicious Cloud Bandwidth Consumption in Cloud Computing Using Machine Learning Techniques
D. Veeraiah, Rajanikanta Mohanty, Shakti Kundu, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-9
Open Access | Times Cited: 17

Showing 17 citing articles:

Prediction of Cardiovascular Diseases with Retinal Images Using Deep Learning
Tumu Vineetha, Danda Rami Reddy, K. V. N. S. Mahendra, et al.
2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (2024), pp. 1-9
Closed Access | Times Cited: 1

MRI Scans for Deep Learning-Based Chronic Nephropathy Detection: A Comparison of CNN, MobileNet, VGG16, and ResNet-50 Models
Md. Amanatulla, Gundala Swathi, M. Pallavi, et al.
(2024), pp. 1-6
Closed Access | Times Cited: 1

Deep Learning Driven Food Recognition and Calorie Estimation Using Mobile Net Architecture
N. Srikanth, K. Sagar, Ch. Sravanthi, et al.
(2024), pp. 1-7
Closed Access | Times Cited: 1

Enhancing Communication for Deaf and Dumb Individuals through Sign Language Detection: A Comprehensive Dataset and SVM-Based Model Approach
D. Veeraiah, Shaik Johny Basha, Korlimarla Sree Deepthi, et al.
(2024), pp. 947-954
Closed Access

Enhancement of Voice Quality and System Capacity by Error Detection and Correction Method in Wireless Digital Communication
Shaista Kahkeshan, Zulieka Homavazir
(2023) Vol. 20, pp. 1-7
Closed Access | Times Cited: 1

Enabling DNS Security through Permissioned Blockchain
D. Veeraiah, Shaik Johny Basha, Shaik Beebi Fathima, et al.
2022 International Conference on Inventive Computation Technologies (ICICT) (2024)
Closed Access

Cyber Attack Detection and Prediction System
O.Venkata Siva, Karanki Neeraja, D Sai Pavan Kalyan, et al.
2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (2024), pp. 1-8
Closed Access

An In-Depth Analysis of Contemporary Security Breaches using Time Series Analysis
A. Sree Rama Chandra Murthy, Muthyala Sravani, Gajaganti Ruthmani, et al.
Advances in computer science research (2024), pp. 701-709
Open Access

Enhancing cloud security with intelligent load balancing and malicious request classification
Krishna Sowjanya K, S K Mouleeswaran
Cluster Computing (2024) Vol. 28, Iss. 1
Closed Access

Analysis of the Integration of 5G with Artificial Intelligence
Preetam Singh Gaur, Deependra Rastogi
(2022), pp. 1-6
Closed Access | Times Cited: 1

Fuzzy Authentication System for Online Transaction Fraud Detection Using Geo Location
Jaydip Kumar
Proceeding International Conference on Science and Engineering (2023) Vol. 11, Iss. 1, pp. 1396-1406
Open Access

System State Estimation Using Weighted Least Square Method
Chetan Sheth Mohmadishak Sheikh
Proceeding International Conference on Science and Engineering (2023) Vol. 11, Iss. 1, pp. 1294-1299
Open Access

Accuracy of Machine Learning for Classifying Malicious URL
Muhammad Risaldi, Satria Gunawan Zain, Jumadi Mabe Parenreng
(2023), pp. 141-146
Closed Access

An Evaluation of Intelligent Network Data Analytics Based on Machine Learning In 5G Data Networks
Parth Batra, Vikas Sagar, Kanishk Kandoi
(2022), pp. 1-6
Closed Access

A Comparative Study of Artificial Intelligence and Machine Learning In 5G Innovation
Sesha S. Srinivasan, Ashutosh Singh
(2022), pp. 1-6
Closed Access

Page 1

Scroll to top