OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Showing 1-25 of 62 citing articles:

Artificial Intelligence
Sarvesh Kumar, U. S. Gupta, Arvind Kumar Singh, et al.
Deleted Journal (2023) Vol. 2, Iss. 3, pp. 31-42
Open Access | Times Cited: 77

Revolutionizing Cybersecurity: Unleashing the Power of Artificial Intelligence and Machine Learning for Next-Generation Threat Detection
Ashok Manoharan, Mithun Sarker
International Research Journal of Modernization in Engineering Technology and Science (2024)
Open Access | Times Cited: 36

A comprehensive survey on cyber deception techniques to improve honeypot performance
Amir Javadpour, Forough Ja’fari, Tarik Taleb, et al.
Computers & Security (2024) Vol. 140, pp. 103792-103792
Open Access | Times Cited: 30

The Effectiveness of Abstract Versus Concrete Fear Appeals in Information Security
Sebastian Schuetz, Paul Benjamin Lowry, Daniel Pienta, et al.
Journal of Management Information Systems (2020) Vol. 37, Iss. 3, pp. 723-757
Closed Access | Times Cited: 72

Adopting and integrating cyber-threat intelligence in a commercial organisation
James Kotsias, Atif Ahmad, Rens Scheepers
European Journal of Information Systems (2022) Vol. 32, Iss. 1, pp. 35-51
Open Access | Times Cited: 44

Cyber-threat intelligence for security decision-making: A review and research agenda for practice
Scott Ainslie, Dean G. Thompson, Sean B. Maynard, et al.
Computers & Security (2023) Vol. 132, pp. 103352-103352
Open Access | Times Cited: 35

BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence
Tongtong Jiang, Guowei Shen, Chunxian Guo, et al.
Computer Networks (2023) Vol. 224, pp. 109604-109604
Closed Access | Times Cited: 27

LLM-TIKG: Threat intelligence knowledge graph construction utilizing large language model
Yuelin Hu, Futai Zou, Jiajia Han, et al.
Computers & Security (2024) Vol. 145, pp. 103999-103999
Closed Access | Times Cited: 13

A systematic review on exploring the influence of Industry 4.0 technologies to enhance supply chain visibility and operational efficiency
Tahsina Khan, Md Mehedi Hasan Emon, Md Adnan Rahman
Review of Business and Economics Studies (2024) Vol. 12, Iss. 3, pp. 6-27
Open Access | Times Cited: 12

Cyber-threat perception and risk management in the Swedish financial sector
Stefan Varga, Joel Brynielsson, Ulrik Franke
Computers & Security (2021) Vol. 105, pp. 102239-102239
Open Access | Times Cited: 54

A Methodology to Evaluate Standards and Platforms within Cyber Threat Intelligence
Alessandra de Melo e Silva, João José Costa Gondim, Robson de Oliveira Albuquerque, et al.
Future Internet (2020) Vol. 12, Iss. 6, pp. 108-108
Open Access | Times Cited: 46

Enabling cybersecurity incident response agility through dynamic capabilities: the role of real-time analytics
Humza Naseer, Kevin C. Desouza, Sean B. Maynard, et al.
European Journal of Information Systems (2023) Vol. 33, Iss. 2, pp. 200-220
Closed Access | Times Cited: 16

Moving towards agile cybersecurity incident response: A case study exploring the enabling role of big data analytics-embedded dynamic capabilities
Ayesha Naseer, Humza Naseer, Atif Ahmad, et al.
Computers & Security (2023) Vol. 135, pp. 103525-103525
Open Access | Times Cited: 15

Blockchain-Based Cyber Threat Intelligence System Architecture for Sustainable Computing
Jeonghun Cha, Sushil Kumar Singh, Yi Pan, et al.
Sustainability (2020) Vol. 12, Iss. 16, pp. 6401-6401
Open Access | Times Cited: 36

Stock market reactions to favorable and unfavorable information security events: A systematic literature review
Syed Emad Azhar Ali, Fong‐Woon Lai, P.D.D. Dominic, et al.
Computers & Security (2021) Vol. 110, pp. 102451-102451
Open Access | Times Cited: 28

Defining the reporting threshold for a cybersecurity incident under the NIS Directive and the NIS 2 Directive
Sandra Schmitz-Berndt
Journal of Cybersecurity (2023) Vol. 9, Iss. 1
Open Access | Times Cited: 13

Can Individual Differences in Cognitive Capacity Predict Cybersecurity Performance?
Kelly A Cole, Alexander L. Francis, Marcus Rogers, et al.
Computers & Security (2025), pp. 104497-104497
Closed Access

Introduction
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah, et al.
(2025), pp. 1-21
Closed Access

Security Threats in Wireless Network Communication-Status, Challenges, and Future Trends
Ahmed Najah Kadhim, Sattar B. Sadkhan
(2021), pp. 176-181
Closed Access | Times Cited: 22

Sustainable response system building against insider-led cyber frauds in banking sector: a machine learning approach
Neha Chhabra Roy, Sreeleakha Prabhakaran
Journal of Financial Crime (2022) Vol. 30, Iss. 1, pp. 48-85
Closed Access | Times Cited: 16

Security and Information Assurance for IoT-Based Big Data
Moses Kazeem Abiodun, Joseph Bamidele Awotunde, Roseline Oluwaseun Ogundokun, et al.
Studies in computational intelligence (2021), pp. 189-211
Closed Access | Times Cited: 19

CTI-SOC2M2 – The quest for mature, intelligence-driven security operations and incident response capabilities
Daniel Schlette, Manfred Vielberth, Günther Pernul
Computers & Security (2021) Vol. 111, pp. 102482-102482
Closed Access | Times Cited: 19

Voluntary and instrumental information security policy compliance: an integrated view of prosocial motivation, self-regulation and deterrence
Yan Chen, Weidong Xia, Karlene Cousins
Computers & Security (2021) Vol. 113, pp. 102568-102568
Closed Access | Times Cited: 18

How Do Organizations Learn from Information System Incidents? A Synthesis of the Past, Present, and Future
Mohammad Hosein Rezazade Mehrizi, Davide Nicolini, Joan Rodón
MIS Quarterly (2022) Vol. 46, Iss. 1, pp. 531-590
Open Access | Times Cited: 13

Page 1 - Next Page

Scroll to top