
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Online social networks security and privacy: comprehensive review and analysis
Ankit Kumar Jain, Somya Ranjan Sahoo, Jyoti Kaubiyal
Complex & Intelligent Systems (2021) Vol. 7, Iss. 5, pp. 2157-2177
Open Access | Times Cited: 165
Ankit Kumar Jain, Somya Ranjan Sahoo, Jyoti Kaubiyal
Complex & Intelligent Systems (2021) Vol. 7, Iss. 5, pp. 2157-2177
Open Access | Times Cited: 165
Showing 26-50 of 165 citing articles:
Survey on Security Models Employed in Blockchain Based Applications
Lochana Mahajan, Sridaran Rajagopal, Rujuta Shah
Communications in computer and information science (2025), pp. 3-25
Closed Access
Lochana Mahajan, Sridaran Rajagopal, Rujuta Shah
Communications in computer and information science (2025), pp. 3-25
Closed Access
Privacy preservation of Internet of Things–integrated social networks: a survey and future challenges
Sara Salim, Nour Moustafa, Benjamin Turnbull
International Journal of Web Information Systems (2025)
Closed Access
Sara Salim, Nour Moustafa, Benjamin Turnbull
International Journal of Web Information Systems (2025)
Closed Access
Awareness of the Right to Be Forgotten Among Users of Professional Social Media Platforms: A Sample from the Arab Region
Laroussi Chemlali, Leila Benseddik
Studies in systems, decision and control (2025), pp. 575-585
Closed Access
Laroussi Chemlali, Leila Benseddik
Studies in systems, decision and control (2025), pp. 575-585
Closed Access
Arming text-based gender inference with partition membership filtering and feature selection for online social network users
Önder Çoban, Şeyma Yücel Altay
The Computer Journal (2025)
Closed Access
Önder Çoban, Şeyma Yücel Altay
The Computer Journal (2025)
Closed Access
Critical Review of Different Approaches of Multiparty Privacy Protection Methods and Effectiveness on Social Media
P. Jayaprabha, K. Paulose Jacob
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 4
Closed Access
P. Jayaprabha, K. Paulose Jacob
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 4
Closed Access
Raising Awareness of Location Information Vulnerabilities in Social Media Photos using LLMs
Y.Q. Ma, Shiquan Zhang, Dongju Yang, et al.
(2025), pp. 1-14
Closed Access
Y.Q. Ma, Shiquan Zhang, Dongju Yang, et al.
(2025), pp. 1-14
Closed Access
Economic espionage via fake social media profiles in the UK: professional workers awareness and resilience
Mark Button, David Shepherd, Jeyong Jung
Security Journal (2025) Vol. 38, Iss. 1
Open Access
Mark Button, David Shepherd, Jeyong Jung
Security Journal (2025) Vol. 38, Iss. 1
Open Access
Managing Privacy and Security in Research
Andi Asrifan, Supaprawat Siripipatthanakul, Mohammed H. Al Aqad, et al.
IGI Global eBooks (2025), pp. 151-182
Closed Access
Andi Asrifan, Supaprawat Siripipatthanakul, Mohammed H. Al Aqad, et al.
IGI Global eBooks (2025), pp. 151-182
Closed Access
Evolution of the Internet from Web 1.0 to Metaverse: The Good, The Bad and The Ugly
Keshab Nath
(2022)
Open Access | Times Cited: 16
Keshab Nath
(2022)
Open Access | Times Cited: 16
A comprehensive survey on online social networks security and privacy issues: Threats, machine learning‐based solutions, and open challenges
Munmun Bhattacharya, Sandip Roy, Samiran Chattopadhyay, et al.
Security and Privacy (2022) Vol. 6, Iss. 1
Closed Access | Times Cited: 16
Munmun Bhattacharya, Sandip Roy, Samiran Chattopadhyay, et al.
Security and Privacy (2022) Vol. 6, Iss. 1
Closed Access | Times Cited: 16
Social media-based interventions for adults with obesity and overweight: a meta-analysis and meta-regression
Yue Lun Loh, Qin Ping Yaw, Ying Lau
International Journal of Obesity (2023) Vol. 47, Iss. 7, pp. 606-621
Open Access | Times Cited: 10
Yue Lun Loh, Qin Ping Yaw, Ying Lau
International Journal of Obesity (2023) Vol. 47, Iss. 7, pp. 606-621
Open Access | Times Cited: 10
Validation of cyber security behaviour among adolescents at Malaysia university: Revisiting gender as a role
Ting Tin Tin, Kar Man Cheah, Jie Xin Khiew, et al.
International Journal of Innovative Research and Scientific Studies (2024) Vol. 7, Iss. 1, pp. 127-137
Open Access | Times Cited: 3
Ting Tin Tin, Kar Man Cheah, Jie Xin Khiew, et al.
International Journal of Innovative Research and Scientific Studies (2024) Vol. 7, Iss. 1, pp. 127-137
Open Access | Times Cited: 3
Comparative Analysis of Blockchain Platforms for Security Enhancement in Online Social Networks
Susan Mohammed, Nabeel H. Al-A’araji, Ahmed A. Al-Saleh
Ingénierie des systèmes d information (2024) Vol. 29, Iss. 1, pp. 19-25
Open Access | Times Cited: 3
Susan Mohammed, Nabeel H. Al-A’araji, Ahmed A. Al-Saleh
Ingénierie des systèmes d information (2024) Vol. 29, Iss. 1, pp. 19-25
Open Access | Times Cited: 3
Artificial intelligence-based approach to detect malicious users using deep learning and optimization techniques
Sailaja Terumalasetti, S R Reeja
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 3
Sailaja Terumalasetti, S R Reeja
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 3
CNFRD: A Few-Shot Rumor Detection Framework via Capsule Network for COVID-19
Danroujing Chen, Xiaoliang Chen, Peng Lu, et al.
International Journal of Intelligent Systems (2023) Vol. 2023, pp. 1-21
Open Access | Times Cited: 8
Danroujing Chen, Xiaoliang Chen, Peng Lu, et al.
International Journal of Intelligent Systems (2023) Vol. 2023, pp. 1-21
Open Access | Times Cited: 8
A Comprehensive Analysis of Privacy-Preserving Solutions Developed for Online Social Networks
Abdul Majeed, Safiullah Khan, Seong Oun Hwang
Electronics (2022) Vol. 11, Iss. 13, pp. 1931-1931
Open Access | Times Cited: 13
Abdul Majeed, Safiullah Khan, Seong Oun Hwang
Electronics (2022) Vol. 11, Iss. 13, pp. 1931-1931
Open Access | Times Cited: 13
Enhanced Clustering Based OSN Privacy Preservation to Ensure k-Anonymity, t-Closeness, l-Diversity, and Balanced Privacy Utility
Rupali Gangarde, Amit Sharma, Ambika Pawar
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 75, Iss. 1, pp. 2171-2190
Open Access | Times Cited: 7
Rupali Gangarde, Amit Sharma, Ambika Pawar
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 75, Iss. 1, pp. 2171-2190
Open Access | Times Cited: 7
Text Sentiment Analysis Based on Multi-Layer Bi-Directional LSTM with a Trapezoidal Structure
Zhengfang He
Intelligent Automation & Soft Computing (2023) Vol. 37, Iss. 1, pp. 639-654
Open Access | Times Cited: 7
Zhengfang He
Intelligent Automation & Soft Computing (2023) Vol. 37, Iss. 1, pp. 639-654
Open Access | Times Cited: 7
Comprehensive review on Parenting and Technology: Opportunities and Challenges in the 21st Century
Ibrahim Kurt
European Journal of Social Sciences Education and Research (2023) Vol. 10, Iss. 2, pp. 1-14
Open Access | Times Cited: 7
Ibrahim Kurt
European Journal of Social Sciences Education and Research (2023) Vol. 10, Iss. 2, pp. 1-14
Open Access | Times Cited: 7
Evolution of the Internet from Web 1.0 to Metaverse: The Good, The Bad and The Ugly
Keshab Nath
(2022)
Open Access | Times Cited: 11
Keshab Nath
(2022)
Open Access | Times Cited: 11
Privacy protection scheme for mobile social network
Seyyed Mohammad Safi, Ali Movaghar, Ghorbani Mohammad
Journal of King Saud University - Computer and Information Sciences (2022) Vol. 34, Iss. 7, pp. 4062-4074
Open Access | Times Cited: 11
Seyyed Mohammad Safi, Ali Movaghar, Ghorbani Mohammad
Journal of King Saud University - Computer and Information Sciences (2022) Vol. 34, Iss. 7, pp. 4062-4074
Open Access | Times Cited: 11
A Systematic Mapping Study on Social Network Privacy: Threats and Solutions
Andrey Rodrigues, Maria Lúcia Bento Villela, Eduardo Feitosa
ACM Computing Surveys (2024) Vol. 56, Iss. 7, pp. 1-29
Closed Access | Times Cited: 2
Andrey Rodrigues, Maria Lúcia Bento Villela, Eduardo Feitosa
ACM Computing Surveys (2024) Vol. 56, Iss. 7, pp. 1-29
Closed Access | Times Cited: 2
Distributed privacy preservation for online social network using flexible clustering and whale optimization algorithm
Nilesh Uke, Sharayu Lokhande, Preeti Kale, et al.
Cluster Computing (2024) Vol. 27, Iss. 5, pp. 5995-6012
Closed Access | Times Cited: 2
Nilesh Uke, Sharayu Lokhande, Preeti Kale, et al.
Cluster Computing (2024) Vol. 27, Iss. 5, pp. 5995-6012
Closed Access | Times Cited: 2
Social Media Forensics: An Adaptive Cyberbullying-Related Hate Speech Detection Approach Based on Neural Networks With Uncertainty
Yasmine M. Ibrahim, Reem Essameldin, Saad M. Saad
IEEE Access (2024) Vol. 12, pp. 59474-59484
Open Access | Times Cited: 2
Yasmine M. Ibrahim, Reem Essameldin, Saad M. Saad
IEEE Access (2024) Vol. 12, pp. 59474-59484
Open Access | Times Cited: 2
Proactive Threat Hunting in Critical Infrastructure Protection through Hybrid Machine Learning Algorithm Application
Shan Ali, Seunghwan Myeong
Sensors (2024) Vol. 24, Iss. 15, pp. 4888-4888
Open Access | Times Cited: 2
Shan Ali, Seunghwan Myeong
Sensors (2024) Vol. 24, Iss. 15, pp. 4888-4888
Open Access | Times Cited: 2