OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Cybersecurity Dynamics: A Foundation for the Science of Cybersecurity
Shouhuai Xu
Advances in information security (2019), pp. 1-31
Closed Access | Times Cited: 48

Showing 1-25 of 48 citing articles:

A Survey on Ethereum Systems Security: Vulnerabilities, Attacks and Defenses
Huashan Chen, Marcus Pendleton, Laurent Njilla, et al.
arXiv (Cornell University) (2019)
Open Access | Times Cited: 91

Characterizing the Evolution of Psychological Factors Exploited by Malicious Emails
Theodore Longtchi, Shouhuai Xu
Lecture notes in computer science (2025), pp. 158-178
Closed Access | Times Cited: 1

AutoCRAT: Automatic Cumulative Reconstruction of Alert Trees
Eric Ficke, Raymond M. Bateman, Shouhuai Xu
Lecture notes in computer science (2025), pp. 273-294
Closed Access | Times Cited: 1

A deep learning framework for predicting cyber attacks rates
Xing Fang, Maochao Xu, Shouhuai Xu, et al.
EURASIP Journal on Information Security (2019) Vol. 2019, Iss. 1
Open Access | Times Cited: 70

Human Cognition Through the Lens of Social Engineering Cyberattacks
Rosana Montañez, Edward J. Golob, Shouhuai Xu
Frontiers in Psychology (2020) Vol. 11
Open Access | Times Cited: 63

Defining Cyber Security and Cyber Security Risk within a Multidisciplinary Context using Expert Elicitation
Mariana G. Cains, Liberty Flora, Danica Taber, et al.
Risk Analysis (2021) Vol. 42, Iss. 8, pp. 1643-1669
Open Access | Times Cited: 53

Internet-Based Social Engineering Psychology, Attacks, and Defenses: A Survey
Theodore Longtchi, Rosana Montañez Rodriguez, Laith Al-Shawaf, et al.
Proceedings of the IEEE (2024) Vol. 112, Iss. 3, pp. 210-246
Closed Access | Times Cited: 7

A Case Study on using Deep Learning for Network Intrusion Detection
Gabriel Fernández, Shouhuai Xu
MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM) (2019)
Open Access | Times Cited: 43

A Framework for Predicting Data Breach Risk: Leveraging Dependence to Cope With Sparsity
Zijian Fang, Maochao Xu, Shouhuai Xu, et al.
IEEE Transactions on Information Forensics and Security (2021) Vol. 16, pp. 2186-2201
Open Access | Times Cited: 34

Cyber attacks on PMU placement in a smart grid: Characterization and optimization
Weiyong Ding, Maochao Xu, Yu Huang, et al.
Reliability Engineering & System Safety (2021) Vol. 212, pp. 107586-107586
Closed Access | Times Cited: 31

Smart Home Cyber Insurance Pricing
Xiaoyu Zhang, Maochao Xu, Shouhuai Xu
Lecture notes in computer science (2025), pp. 313-333
Closed Access

An Architecture of Adaptive Cognitive Digital Twins for Resilient Healthcare Infrastructures and Services
Shouhuai Xu, Sandeep Pirbhulal, Habtamu Abie
Communications in computer and information science (2025), pp. 3-22
Closed Access

A survey of social cybersecurity: Techniques for attack detection, evaluations, challenges, and future prospects
Aos Mulahuwaish, Basheer Qolomany, Kevin Gyorick, et al.
Computers in Human Behavior Reports (2025), pp. 100668-100668
Open Access

It's a Match - Enhancing the Fit between Users and Phishing Training through Personalisation
Lorin Schöni, Neele Roch, Hannah Sievers, et al.
(2025), pp. 1-25
Closed Access

You Know What? - Evaluation of a Personalised Phishing Training Based on Users' Phishing Knowledge and Detection Skills
Lorin Schöni, Victor Carles, Martin Strohmeier, et al.
(2024), pp. 1-14
Closed Access | Times Cited: 3

Unified Preventive and Reactive Cyber Defense Dynamics Is Still Globally Convergent
Zongzong Lin, Wenlian Lu, Shouhuai Xu
IEEE/ACM Transactions on Networking (2019) Vol. 27, Iss. 3, pp. 1098-1111
Open Access | Times Cited: 26

Metrics Towards Measuring Cyber Agility
Jose David Mireles, Eric Ficke, Jin-Hee Cho, et al.
IEEE Transactions on Information Forensics and Security (2019) Vol. 14, Iss. 12, pp. 3217-3232
Open Access | Times Cited: 22

Social engineering attacks and defenses in the physical world vs. cyberspace: A contrast study
Rosana Montañez, Adham Atyabi, Shouhuai Xu
Elsevier eBooks (2022), pp. 3-41
Open Access | Times Cited: 12

Cyber Attacks Against Enterprise Networks: Characterization, Modeling and Forecasting
Zheyuan Sun, Maochao Xu, Kristin M. Schweitzer, et al.
Lecture notes in computer science (2023), pp. 60-81
Closed Access | Times Cited: 6

Multivariate dependence among cyber risks based on L-hop propagation
Gaofeng Da, Maochao Xu, Peng Zhao
Insurance Mathematics and Economics (2021) Vol. 101, pp. 525-546
Closed Access | Times Cited: 14

SARR: A Cybersecurity Metrics and Quantification Framework (Keynote)
Shouhuai Xu
Lecture notes in computer science (2021), pp. 3-17
Closed Access | Times Cited: 14

Cyber Social Engineering Kill Chain
Rosana Montañez Rodriguez, Shouhuai Xu
Lecture notes in computer science (2022), pp. 487-504
Closed Access | Times Cited: 8

Using Event-Based Method to Estimate Cybersecurity Equilibrium
Zhaofeng Liu, Ren Zheng, Wenlian Lu, et al.
IEEE/CAA Journal of Automatica Sinica (2020) Vol. 8, Iss. 2, pp. 455-467
Closed Access | Times Cited: 12

A Flexible Security Analytics Service for the Industrial IoT
Philip Empl, Günther Pernul
(2021) Vol. 16, pp. 23-32
Open Access | Times Cited: 11

Seeking Foundations for the Science of Cyber Security
Shouhuai Xu, Moti Yung, Jingguo Wang
Information Systems Frontiers (2021)
Open Access | Times Cited: 11

Page 1 - Next Page

Scroll to top