OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

DLTN-LOSP: A Novel Deep-Linear-Transition-Network-Based Resource Allocation Model with the Logic Overhead Security Protocol for Cloud Systems
Divya Ramachandran, Syed Muhammad Naqi, Ganeshkumar Perumal, et al.
Sensors (2023) Vol. 23, Iss. 20, pp. 8448-8448
Open Access | Times Cited: 9

Showing 9 citing articles:

Introduction to Quantum-Aware Cybersecurity
Hewa Majeed Zangana, Marwan Omar
Advances in information security, privacy, and ethics book series (2024), pp. 1-28
Closed Access | Times Cited: 8

Large Language Models in Cybersecurity
Hewa Majeed Zangana, Firas Mahmood Mustafa, Shuai Li
Advances in information security, privacy, and ethics book series (2024), pp. 277-300
Open Access | Times Cited: 7

Natural Language Processing for Cyber Threat Intelligence in a Quantum World
Hewa Majeed Zangana, Firas Mahmood Mustafa, Shuai Li, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 345-388
Closed Access | Times Cited: 7

Enhancing Security in IoT-Assisted UAV Networks Using Adaptive Mongoose Optimization Algorithm With Deep Learning
Saud S. Alotaibi, Ahmed El Sayed, Elmouez Samir Abd Elhameed, et al.
IEEE Access (2024) Vol. 12, pp. 63768-63776
Open Access

LLMs for Enhancing Privacy and Data Protection in Quantum Computing Environments
A. Jones
Advances in information security, privacy, and ethics book series (2024), pp. 67-104
Closed Access

Adversarial Attacks and Defense Mechanisms in the Age of Quantum Computing
Yara Shamoo
Advances in information security, privacy, and ethics book series (2024), pp. 301-344
Closed Access

Understanding Quantum Computing Implications for Cybersecurity
A. Jones
Advances in information security, privacy, and ethics book series (2024), pp. 29-66
Closed Access

LLMs for Quantum-Aware Threat Detection and Incident Response
Luay Albtosh
Advances in information security, privacy, and ethics book series (2024), pp. 105-142
Closed Access

The Future of Cybersecurity Integrating LLMs With Quantum Computing for Autonomous Defense Systems
Yara Shamoo
Advances in information security, privacy, and ethics book series (2024), pp. 389-420
Closed Access

Page 1

Scroll to top