
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Detection of Malicious Cloud Bandwidth Consumption in Cloud Computing Using Machine Learning Techniques
D. Veeraiah, Rajanikanta Mohanty, Shakti Kundu, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-9
Open Access | Times Cited: 17
D. Veeraiah, Rajanikanta Mohanty, Shakti Kundu, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-9
Open Access | Times Cited: 17
Showing 17 citing articles:
Prediction of Cardiovascular Diseases with Retinal Images Using Deep Learning
Tumu Vineetha, Danda Rami Reddy, K. V. N. S. Mahendra, et al.
2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (2024), pp. 1-9
Closed Access | Times Cited: 1
Tumu Vineetha, Danda Rami Reddy, K. V. N. S. Mahendra, et al.
2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (2024), pp. 1-9
Closed Access | Times Cited: 1
MRI Scans for Deep Learning-Based Chronic Nephropathy Detection: A Comparison of CNN, MobileNet, VGG16, and ResNet-50 Models
Md. Amanatulla, Gundala Swathi, M. Pallavi, et al.
(2024), pp. 1-6
Closed Access | Times Cited: 1
Md. Amanatulla, Gundala Swathi, M. Pallavi, et al.
(2024), pp. 1-6
Closed Access | Times Cited: 1
Deep Learning Driven Food Recognition and Calorie Estimation Using Mobile Net Architecture
N. Srikanth, K. Sagar, Ch. Sravanthi, et al.
(2024), pp. 1-7
Closed Access | Times Cited: 1
N. Srikanth, K. Sagar, Ch. Sravanthi, et al.
(2024), pp. 1-7
Closed Access | Times Cited: 1
Enhanced Healthcare Security: Integrating Blockchain and IoT for Patient Data Protection and Remote Vital Sign Monitoring
D. Veeraiah, V. Sowjanya, S. Nagababu, et al.
(2024), pp. 1434-1441
Closed Access
D. Veeraiah, V. Sowjanya, S. Nagababu, et al.
(2024), pp. 1434-1441
Closed Access
Enhancing Communication for Deaf and Dumb Individuals through Sign Language Detection: A Comprehensive Dataset and SVM-Based Model Approach
D. Veeraiah, Shaik Johny Basha, Korlimarla Sree Deepthi, et al.
(2024), pp. 947-954
Closed Access
D. Veeraiah, Shaik Johny Basha, Korlimarla Sree Deepthi, et al.
(2024), pp. 947-954
Closed Access
Enhancement of Voice Quality and System Capacity by Error Detection and Correction Method in Wireless Digital Communication
Shaista Kahkeshan, Zulieka Homavazir
(2023) Vol. 20, pp. 1-7
Closed Access | Times Cited: 1
Shaista Kahkeshan, Zulieka Homavazir
(2023) Vol. 20, pp. 1-7
Closed Access | Times Cited: 1
Enabling DNS Security through Permissioned Blockchain
D. Veeraiah, Shaik Johny Basha, Shaik Beebi Fathima, et al.
2022 International Conference on Inventive Computation Technologies (ICICT) (2024)
Closed Access
D. Veeraiah, Shaik Johny Basha, Shaik Beebi Fathima, et al.
2022 International Conference on Inventive Computation Technologies (ICICT) (2024)
Closed Access
Cyber Attack Detection and Prediction System
O.Venkata Siva, Karanki Neeraja, D Sai Pavan Kalyan, et al.
2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (2024), pp. 1-8
Closed Access
O.Venkata Siva, Karanki Neeraja, D Sai Pavan Kalyan, et al.
2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (2024), pp. 1-8
Closed Access
An In-Depth Analysis of Contemporary Security Breaches using Time Series Analysis
A. Sree Rama Chandra Murthy, Muthyala Sravani, Gajaganti Ruthmani, et al.
Advances in computer science research (2024), pp. 701-709
Open Access
A. Sree Rama Chandra Murthy, Muthyala Sravani, Gajaganti Ruthmani, et al.
Advances in computer science research (2024), pp. 701-709
Open Access
Enhancing cloud security with intelligent load balancing and malicious request classification
Krishna Sowjanya K, S K Mouleeswaran
Cluster Computing (2024) Vol. 28, Iss. 1
Closed Access
Krishna Sowjanya K, S K Mouleeswaran
Cluster Computing (2024) Vol. 28, Iss. 1
Closed Access
Analysis of the Integration of 5G with Artificial Intelligence
Preetam Singh Gaur, Deependra Rastogi
(2022), pp. 1-6
Closed Access | Times Cited: 1
Preetam Singh Gaur, Deependra Rastogi
(2022), pp. 1-6
Closed Access | Times Cited: 1
Fuzzy Authentication System for Online Transaction Fraud Detection Using Geo Location
Jaydip Kumar
Proceeding International Conference on Science and Engineering (2023) Vol. 11, Iss. 1, pp. 1396-1406
Open Access
Jaydip Kumar
Proceeding International Conference on Science and Engineering (2023) Vol. 11, Iss. 1, pp. 1396-1406
Open Access
System State Estimation Using Weighted Least Square Method
Chetan Sheth Mohmadishak Sheikh
Proceeding International Conference on Science and Engineering (2023) Vol. 11, Iss. 1, pp. 1294-1299
Open Access
Chetan Sheth Mohmadishak Sheikh
Proceeding International Conference on Science and Engineering (2023) Vol. 11, Iss. 1, pp. 1294-1299
Open Access
Enhancement of Energy Utilization by Reliable Routing and Secure Data Transmission in Heterogeneous WSN
Renu Jain, Varsha Agarwal
(2023), pp. 1-9
Closed Access
Renu Jain, Varsha Agarwal
(2023), pp. 1-9
Closed Access
Accuracy of Machine Learning for Classifying Malicious URL
Muhammad Risaldi, Satria Gunawan Zain, Jumadi Mabe Parenreng
(2023), pp. 141-146
Closed Access
Muhammad Risaldi, Satria Gunawan Zain, Jumadi Mabe Parenreng
(2023), pp. 141-146
Closed Access
An Evaluation of Intelligent Network Data Analytics Based on Machine Learning In 5G Data Networks
Parth Batra, Vikas Sagar, Kanishk Kandoi
(2022), pp. 1-6
Closed Access
Parth Batra, Vikas Sagar, Kanishk Kandoi
(2022), pp. 1-6
Closed Access
A Comparative Study of Artificial Intelligence and Machine Learning In 5G Innovation
Sesha S. Srinivasan, Ashutosh Singh
(2022), pp. 1-6
Closed Access
Sesha S. Srinivasan, Ashutosh Singh
(2022), pp. 1-6
Closed Access