
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Cyber Persistence Theory
Michael P. Fischerkeller, Emily O. Goldman, Richard J. Harknett, et al.
Oxford University Press eBooks (2022)
Closed Access | Times Cited: 33
Michael P. Fischerkeller, Emily O. Goldman, Richard J. Harknett, et al.
Oxford University Press eBooks (2022)
Closed Access | Times Cited: 33
Showing 26-50 of 33 citing articles:
The Hand Behind Unmanned
Jacquelyn Schneider, Julia Macdonald
Oxford University Press eBooks (2024)
Closed Access
Jacquelyn Schneider, Julia Macdonald
Oxford University Press eBooks (2024)
Closed Access
The Subversion Aversion Paradox: Juxtaposing the Tactical and Strategic Utility of Cyber-Enabled Influence Operations
Christopher Whyte
Journal of Global Security Studies (2024) Vol. 10, Iss. 2
Closed Access
Christopher Whyte
Journal of Global Security Studies (2024) Vol. 10, Iss. 2
Closed Access
Legalising Forms of Active Cyber Defense (ACD)
Dominika Dziwisz
Politeja (2024) Vol. 21, Iss. 6(93), pp. 135-160
Open Access
Dominika Dziwisz
Politeja (2024) Vol. 21, Iss. 6(93), pp. 135-160
Open Access
Cybersecurity in the U.S.-Philippine alliance: mission seep
Gregory Winger
The Pacific Review (2022) Vol. 36, Iss. 6, pp. 1365-1393
Closed Access | Times Cited: 2
Gregory Winger
The Pacific Review (2022) Vol. 36, Iss. 6, pp. 1365-1393
Closed Access | Times Cited: 2
The soft underbelly of cyber defence in democracy: how interest groups soften Japan’s cyber policy
Nori Katagiri
Journal of Cyber Policy (2022) Vol. 7, Iss. 3, pp. 336-352
Closed Access | Times Cited: 1
Nori Katagiri
Journal of Cyber Policy (2022) Vol. 7, Iss. 3, pp. 336-352
Closed Access | Times Cited: 1
Cyber Warfare And National Security: Imperative For Naval Operations
Abdullahi Muhammad Ahmed, Adamu Hussaini, Alhassan Abdulhamid
2021 International Conference on Computational Science and Computational Intelligence (CSCI) (2022), pp. 990-996
Closed Access | Times Cited: 1
Abdullahi Muhammad Ahmed, Adamu Hussaini, Alhassan Abdulhamid
2021 International Conference on Computational Science and Computational Intelligence (CSCI) (2022), pp. 990-996
Closed Access | Times Cited: 1
Operationalizing Deterrence by Denial in the Cyber Domain
Gentry Lane
Military Cyber Affairs (2023) Vol. 6, Iss. 1
Open Access
Gentry Lane
Military Cyber Affairs (2023) Vol. 6, Iss. 1
Open Access
From Cyber Security to Cyber Power: Appraising the Emergence of ‘Responsible, Democratic Cyber Power’ in UK Strategy
Joe Devanny, Andrew C. Dwyer
(2023), pp. 381-397
Closed Access
Joe Devanny, Andrew C. Dwyer
(2023), pp. 381-397
Closed Access
The THE USE OF LAW IN CHINA IoT OPERATION INTELLIGENCE CONCEPT
Syarifurohmat Pratama Santoso, Moh. Karim
Sociae Polites (2023) Vol. 24, Iss. 2, pp. 66-76
Open Access
Syarifurohmat Pratama Santoso, Moh. Karim
Sociae Polites (2023) Vol. 24, Iss. 2, pp. 66-76
Open Access