OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

An Extensive Study and Review on Dark Web Threats and Detection Techniques
Wasim Khan, Mohammad Ishrat, Mohd Haleem, et al.
Advances in human and social aspects of technology book series (2023), pp. 202-219
Closed Access | Times Cited: 9

Showing 9 citing articles:

Generative adversarial synthetic neighbors-based unsupervised anomaly detection
Lan Chen, Hong Jiang, Lizhong Wang, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access | Times Cited: 1

Unveiling the Darknet: An Analysis of its Structure, Challenges, and Potential Solutions.
Himanshu Pant, Garima Joshi, Yukta Verma, et al.
SSRN Electronic Journal (2025)
Closed Access

A comprehensive survey on GNN-based anomaly detection: taxonomy, methods, and the role of large language models
Ziqi Yuan, Qingyun Sun, Haoyi Zhou, et al.
International Journal of Machine Learning and Cybernetics (2025)
Closed Access

Forensic Methodologies in the Digital Age

Advances in digital crime, forensics, and cyber terrorism book series (2025), pp. 1-30
Closed Access

A few-shot network intrusion detection method based on mutual centralized learning
Congyuan Xu, Fan Zhang, Ziqi Yang, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access

Unveiling the Depths of Explainable AI
Wasim Khan, Mohammad Ishrat
Advances in systems analysis, software engineering, and high performance computing book series (2024), pp. 78-106
Closed Access | Times Cited: 3

Comprehensive Analysis of Attacks and Defenses in IoT Sensory Big Data Analysis
Mohammad Ishrat, Wasim Khan, Faheem Ahmad, et al.
Advances in systems analysis, software engineering, and high performance computing book series (2024), pp. 24-57
Closed Access | Times Cited: 1

Graph Contrastive Pre-training for Anti-money Laundering
Hanbin Lu, Haosen Wang
International Journal of Computational Intelligence Systems (2024) Vol. 17, Iss. 1
Open Access | Times Cited: 1

Page 1

Scroll to top