
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation
Timothy R. McIntosh, Tong Liu, Teo Sušnjak, et al.
Computers & Security (2023) Vol. 134, pp. 103424-103424
Open Access | Times Cited: 51
Timothy R. McIntosh, Tong Liu, Teo Sušnjak, et al.
Computers & Security (2023) Vol. 134, pp. 103424-103424
Open Access | Times Cited: 51
Showing 1-25 of 51 citing articles:
A survey on large language model (LLM) security and privacy: The Good, The Bad, and The Ugly
Yifan Yao, Jinhao Duan, Kaidi Xu, et al.
High-Confidence Computing (2024) Vol. 4, Iss. 2, pp. 100211-100211
Open Access | Times Cited: 236
Yifan Yao, Jinhao Duan, Kaidi Xu, et al.
High-Confidence Computing (2024) Vol. 4, Iss. 2, pp. 100211-100211
Open Access | Times Cited: 236
From COBIT to ISO 42001: Evaluating cybersecurity frameworks for opportunities, risks, and regulatory compliance in commercializing large language models
Timothy R. McIntosh, Teo Sušnjak, Tong Liu, et al.
Computers & Security (2024) Vol. 144, pp. 103964-103964
Open Access | Times Cited: 25
Timothy R. McIntosh, Teo Sušnjak, Tong Liu, et al.
Computers & Security (2024) Vol. 144, pp. 103964-103964
Open Access | Times Cited: 25
Applying Large Language Model (LLM) for Developing Cybersecurity Policies to Counteract Spear Phishing Attacks on Senior Corporate Managers
Thomas Quinn, Olivia Thompson
Research Square (Research Square) (2024)
Open Access | Times Cited: 13
Thomas Quinn, Olivia Thompson
Research Square (Research Square) (2024)
Open Access | Times Cited: 13
Local Government Cybersecurity Landscape: A Systematic Review and Conceptual Framework
Sk Tahsin Hossain, Tan Yiğitcanlar, Kien Nguyen, et al.
Applied Sciences (2024) Vol. 14, Iss. 13, pp. 5501-5501
Open Access | Times Cited: 12
Sk Tahsin Hossain, Tan Yiğitcanlar, Kien Nguyen, et al.
Applied Sciences (2024) Vol. 14, Iss. 13, pp. 5501-5501
Open Access | Times Cited: 12
“I don't think we're there yet”: The practices and challenges of organisational learning from cyber security incidents
Clare M. Patterson, Jason R. C. Nurse, Virginia N. L. Franqueira
Computers & Security (2024) Vol. 139, pp. 103699-103699
Open Access | Times Cited: 10
Clare M. Patterson, Jason R. C. Nurse, Virginia N. L. Franqueira
Computers & Security (2024) Vol. 139, pp. 103699-103699
Open Access | Times Cited: 10
Ethical Considerations in Drone Cybersecurity
Siva Raja Sindiramutty, Chong Eng Tan, Bhavin Shah, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 42-87
Closed Access | Times Cited: 10
Siva Raja Sindiramutty, Chong Eng Tan, Bhavin Shah, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 42-87
Closed Access | Times Cited: 10
A Review of Advancements and Applications of Pre-Trained Language Models in Cybersecurity
Zefang Liu
(2024), pp. 1-10
Closed Access | Times Cited: 9
Zefang Liu
(2024), pp. 1-10
Closed Access | Times Cited: 9
GPT, ontology, and CAABAC: A tripartite personalized access control model anchored by compliance, context and attribute
Raza Nowrozy, Khandakar Ahmed, Hua Wang
PLoS ONE (2025) Vol. 20, Iss. 1, pp. e0310553-e0310553
Open Access | Times Cited: 1
Raza Nowrozy, Khandakar Ahmed, Hua Wang
PLoS ONE (2025) Vol. 20, Iss. 1, pp. e0310553-e0310553
Open Access | Times Cited: 1
Fields of the Future: Digital Transformation in Smart Agriculture with Large Language Models and Generative AI
Tawseef Ayoub Shaikh, Tabasum Rasool, Waseem Ahmad Mir
Computer Standards & Interfaces (2025), pp. 104005-104005
Closed Access | Times Cited: 1
Tawseef Ayoub Shaikh, Tabasum Rasool, Waseem Ahmad Mir
Computer Standards & Interfaces (2025), pp. 104005-104005
Closed Access | Times Cited: 1
Efficient Ransomware Detection via Portable Executable File Image Analysis By LLaMA-7b
Xiang Li, Tingting Zhu, Wenbo Zhang
Research Square (Research Square) (2023)
Open Access | Times Cited: 18
Xiang Li, Tingting Zhu, Wenbo Zhang
Research Square (Research Square) (2023)
Open Access | Times Cited: 18
A Survey on Large Language Model (LLM) Security and Privacy: The Good, the Bad, and the Ugly
Yifan Yao, Jinhao Duan, Kaidi Xu, et al.
arXiv (Cornell University) (2023)
Open Access | Times Cited: 17
Yifan Yao, Jinhao Duan, Kaidi Xu, et al.
arXiv (Cornell University) (2023)
Open Access | Times Cited: 17
AI Code Generators for Security: Friend or Foe?
Roberto Natella, Pietro Liguori, Cristina Improta, et al.
IEEE Security & Privacy (2024) Vol. 22, Iss. 5, pp. 73-81
Open Access | Times Cited: 7
Roberto Natella, Pietro Liguori, Cristina Improta, et al.
IEEE Security & Privacy (2024) Vol. 22, Iss. 5, pp. 73-81
Open Access | Times Cited: 7
Assessing LLMs in malicious code deobfuscation of real-world malware campaigns
Constantinos Patsakis, Fran Casino, Nikolaos Lykousas
Expert Systems with Applications (2024) Vol. 256, pp. 124912-124912
Open Access | Times Cited: 7
Constantinos Patsakis, Fran Casino, Nikolaos Lykousas
Expert Systems with Applications (2024) Vol. 256, pp. 124912-124912
Open Access | Times Cited: 7
Using Large Language Models to Mitigate Ransomware Threats
Fang Wang
(2023)
Open Access | Times Cited: 16
Fang Wang
(2023)
Open Access | Times Cited: 16
A Survey on Ransomware Threats: Contrasting Static and Dynamic Analysis Methods
Qian Kang, Yuanyuan Gu
(2023)
Open Access | Times Cited: 16
Qian Kang, Yuanyuan Gu
(2023)
Open Access | Times Cited: 16
Enhancing Ransomware Detection: A Windows API Min Max Relevance Refinement Approach
Qian Kang, Yuanyuan Gu
(2023)
Open Access | Times Cited: 14
Qian Kang, Yuanyuan Gu
(2023)
Open Access | Times Cited: 14
RansomCillin: Leveraging NTFS Spare Space to Recover from Ransomware Attacks
Kazuya Takeuchi, Himari Fujima, Takako Kumamoto, et al.
(2023)
Open Access | Times Cited: 13
Kazuya Takeuchi, Himari Fujima, Takako Kumamoto, et al.
(2023)
Open Access | Times Cited: 13
Applying ChatGPT-Powered Game Theory in Ransomware Negotiations
Tingting Zhu, Xiang Li, Wenbo Zhang
(2023)
Open Access | Times Cited: 13
Tingting Zhu, Xiang Li, Wenbo Zhang
(2023)
Open Access | Times Cited: 13
Harnessing Generative AI for Enhanced Web Application Security
Muhammad Usman Tariq
Advances in web technologies and engineering book series (2024), pp. 161-192
Closed Access | Times Cited: 5
Muhammad Usman Tariq
Advances in web technologies and engineering book series (2024), pp. 161-192
Closed Access | Times Cited: 5
A novel system for strengthening security in large language models against hallucination and injection attacks with effective strategies
Tunahan Gokcimen, Bihter Daş
Alexandria Engineering Journal (2025) Vol. 123, pp. 71-90
Closed Access
Tunahan Gokcimen, Bihter Daş
Alexandria Engineering Journal (2025) Vol. 123, pp. 71-90
Closed Access
ChatGPT's Impact on Ethical Hacking and Cybersecurity
Rahaf Adam Alnuaimi, Moatsum Alawida, Manal Al-Rawashdeh, et al.
Advances in computational intelligence and robotics book series (2025), pp. 573-608
Closed Access
Rahaf Adam Alnuaimi, Moatsum Alawida, Manal Al-Rawashdeh, et al.
Advances in computational intelligence and robotics book series (2025), pp. 573-608
Closed Access
Using ChatGPT to Analyze Ransomware Messages and to Predict Ransomware Threats
Himari Fujima, Takako Kumamoto, Yunko Yoshida
Research Square (Research Square) (2023)
Open Access | Times Cited: 8
Himari Fujima, Takako Kumamoto, Yunko Yoshida
Research Square (Research Square) (2023)
Open Access | Times Cited: 8
Decoding developer password patterns: A comparative analysis of password extraction and selection practices
Nikolaos Lykousas, Constantinos Patsakis
Computers & Security (2024) Vol. 145, pp. 103974-103974
Open Access | Times Cited: 2
Nikolaos Lykousas, Constantinos Patsakis
Computers & Security (2024) Vol. 145, pp. 103974-103974
Open Access | Times Cited: 2
A Few-Shot Learning Approach with a Twin Neural Network Utilizing Entropy Features for Ransomware Classification
Fang Wang
(2023)
Open Access | Times Cited: 6
Fang Wang
(2023)
Open Access | Times Cited: 6
Evolving Conversations: A Review of Chatbots and Implications in Natural Language Processing for Cultural Heritage Ecosystems
Tri Lathif Mardi Suryanto, Aji Prasetya Wibawa, Hariyono Hariyono, et al.
International Journal of Robotics and Control Systems (2023) Vol. 3, Iss. 4, pp. 955-1006
Open Access | Times Cited: 5
Tri Lathif Mardi Suryanto, Aji Prasetya Wibawa, Hariyono Hariyono, et al.
International Journal of Robotics and Control Systems (2023) Vol. 3, Iss. 4, pp. 955-1006
Open Access | Times Cited: 5