OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Deep Learning Techniques for Web-Based Attack Detection in Industry 5.0: A Novel Approach
Abdu Salam, Faizan Ullah, Farhan Amin, et al.
Technologies (2023) Vol. 11, Iss. 4, pp. 107-107
Open Access | Times Cited: 25

Showing 25 citing articles:

Advancing occupational and system safety in Industry 5.0: Effective HAZID, risk analysis frameworks, and human-AI interaction management
Kamran Gholamizadeh, Esmaeil Zarei, Luca Gualtieri, et al.
Safety Science (2025) Vol. 184, pp. 106770-106770
Closed Access | Times Cited: 3

Securing Smart Manufacturing by Integrating Anomaly Detection With Zero-Knowledge Proofs
Abdu Salam, Mohammad Abrar, Farhan Amin, et al.
IEEE Access (2024) Vol. 12, pp. 36346-36360
Open Access | Times Cited: 9

LLM-AE-MP: Web attack detection using a large language model with autoencoder and multilayer perceptron
Jing Yang, Yifan Wu, Yuping Yuan, et al.
Expert Systems with Applications (2025), pp. 126982-126982
Closed Access | Times Cited: 1

A Comprehensive Survey of Cybersecurity Threats, Attacks, and Effective Countermeasures in Industrial Internet of Things
Abdullah Alnajim, Shabana Habib, Muhammad Islam, et al.
Technologies (2023) Vol. 11, Iss. 6, pp. 161-161
Open Access | Times Cited: 20

Deep Learning in Cybersecurity: A Hybrid BERT–LSTM Network for SQL Injection Attack Detection
Yixian Liu, Yun-hai Dai
IET Information Security (2024) Vol. 2024, pp. 1-16
Open Access | Times Cited: 6

Design of Realtime Web Application Firewall on Deep Learning-Based to Improve Web Application Security
Raharjo Muttaqin, Dodi Sudiana
Jurnal Penelitian Pendidikan IPA (2025) Vol. 10, Iss. 12, pp. 11121-11129
Open Access

Bridging the Maturity Gaps in Industrial Data Science: Navigating Challenges in IoT-Driven Manufacturing
Amruta Awasthi, Lenka Krpálková, J. L. Walsh
Technologies (2025) Vol. 13, Iss. 1, pp. 22-22
Open Access

Towards Robust SDN Security: A Comparative Analysis of Oversampling Techniques with ML and DL Classifiers
Aboubakr Salem Bajenaid, Maher Khemakhem, Fathy Eassa, et al.
Electronics (2025) Vol. 14, Iss. 5, pp. 995-995
Open Access

A Novel Cognitive Multi-Label Classification Model for Social Media Data Based on Dolphin Optimized Learning and Hybrid Classification networks
Shumama Ansa, G. Narsimha
International Journal of Computational and Experimental Science and Engineering (2025) Vol. 11, Iss. 2
Open Access

Precision Paradigm
D. Dhinakaran, A. Ramathilagam, S. M. Udhaya Sankar, et al.
Advances in computational intelligence and robotics book series (2024), pp. 212-242
Closed Access | Times Cited: 2

Using Machine Learning to Detect Cyber Attacks
R.Banu Prakash, Prof Rajeshwari K
International Journal of Research Publication and Reviews (2024) Vol. 5, Iss. 2, pp. 2793-2806
Open Access | Times Cited: 1

Cyberatttack Detection and Classification in IIoT systems using XGBoost and Gaussian Naïve Bayes: A Comparative Study
Mordi Alenazi, Shailendra Mishra
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 4, pp. 15074-15082
Open Access | Times Cited: 1

Research on state perception of scraper conveyor based on one-dimensional convolutional neural network
Jie Lu, Zhenlin Liu, Chenhui Han, et al.
PLoS ONE (2024) Vol. 19, Iss. 10, pp. e0312229-e0312229
Open Access | Times Cited: 1

DCEI-RTDETR: an improved RT-DETR-based detection algorithm for data center equipment indicator lights
Liangjie Xu, Wenxian Zeng
Journal of Real-Time Image Processing (2024) Vol. 22, Iss. 1
Closed Access | Times Cited: 1

A survey of transmission control protocol variants
Lydiah Moraa Machora
World Journal of Advanced Research and Reviews (2024) Vol. 21, Iss. 3, pp. 1828-1853
Open Access

The Role of Anomaly Detection in Industry 4.0: A Survey of Techniques and Applications
D Vishnu Prasad, Sree Saraswathi
Journal of Trends in Computer Science and Smart Technology (2024) Vol. 6, Iss. 2, pp. 125-138
Open Access

Artificial Intelligence-Based Deep Learning Approach to Identify the Web-Based Attack
Kavi Chelvy, Ch. Srividhya, B. Swathi, et al.
Advances in computational intelligence and robotics book series (2024), pp. 21-31
Closed Access

Comparison of Multiple Feature Selection Techniques for Machine Learning-Based Detection of IoT Attacks
Viet Anh Phan, Jan Jeřábek, Lukáš Malina
Proceedings of the 17th International Conference on Availability, Reliability and Security (2024), pp. 1-10
Closed Access

Exploring Deep Learning Architectures for Enhanced Cyber Threat Detection: A Survey
Toluwase Sunday Oyinloye, Micheal Olaolu Arowolo, Roseline Oluwaseun Ogundoku, et al.
(2024), pp. 1-10
Closed Access

A Comprehensive Review on Deep Learning Techniques on Cyber Attacks on Cyber Physical Systems
Maloth Sagar, C. Vanmathi
SN Computer Science (2024) Vol. 5, Iss. 7
Closed Access

Exploring the Effect of Sequence Smoothness on Machine Learning Accuracy
Cangqing Wang, Hoc T. Quach
Lecture notes in networks and systems (2024), pp. 475-494
Closed Access

A Novel Artificial Intelligence-Based Intrusion Detection System—NAI2DS
Fatimetou Abdou Vadhil, Mohamedade Farouk Nanne, Mohamed Lemine Ould Salihi
Lecture notes in networks and systems (2024), pp. 168-181
Closed Access

Enhanced Security and Privacy from Industry 4.0 and 5.0 Vision
Tarun Kumar Vashishth, Vikas Sharma, Kewal Krishan Sharma, et al.
(2024), pp. 133-158
Closed Access

Page 1

Scroll to top