OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation
Timothy R. McIntosh, Tong Liu, Teo Sušnjak, et al.
Computers & Security (2023) Vol. 134, pp. 103424-103424
Open Access | Times Cited: 51

Showing 1-25 of 51 citing articles:

A survey on large language model (LLM) security and privacy: The Good, The Bad, and The Ugly
Yifan Yao, Jinhao Duan, Kaidi Xu, et al.
High-Confidence Computing (2024) Vol. 4, Iss. 2, pp. 100211-100211
Open Access | Times Cited: 236

From COBIT to ISO 42001: Evaluating cybersecurity frameworks for opportunities, risks, and regulatory compliance in commercializing large language models
Timothy R. McIntosh, Teo Sušnjak, Tong Liu, et al.
Computers & Security (2024) Vol. 144, pp. 103964-103964
Open Access | Times Cited: 25

Local Government Cybersecurity Landscape: A Systematic Review and Conceptual Framework
Sk Tahsin Hossain, Tan Yiğitcanlar, Kien Nguyen, et al.
Applied Sciences (2024) Vol. 14, Iss. 13, pp. 5501-5501
Open Access | Times Cited: 12

“I don't think we're there yet”: The practices and challenges of organisational learning from cyber security incidents
Clare M. Patterson, Jason R. C. Nurse, Virginia N. L. Franqueira
Computers & Security (2024) Vol. 139, pp. 103699-103699
Open Access | Times Cited: 10

Ethical Considerations in Drone Cybersecurity
Siva Raja Sindiramutty, Chong Eng Tan, Bhavin Shah, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 42-87
Closed Access | Times Cited: 10

GPT, ontology, and CAABAC: A tripartite personalized access control model anchored by compliance, context and attribute
Raza Nowrozy, Khandakar Ahmed, Hua Wang
PLoS ONE (2025) Vol. 20, Iss. 1, pp. e0310553-e0310553
Open Access | Times Cited: 1

Fields of the Future: Digital Transformation in Smart Agriculture with Large Language Models and Generative AI
Tawseef Ayoub Shaikh, Tabasum Rasool, Waseem Ahmad Mir
Computer Standards & Interfaces (2025), pp. 104005-104005
Closed Access | Times Cited: 1

Efficient Ransomware Detection via Portable Executable File Image Analysis By LLaMA-7b
Xiang Li, Tingting Zhu, Wenbo Zhang
Research Square (Research Square) (2023)
Open Access | Times Cited: 18

A Survey on Large Language Model (LLM) Security and Privacy: The Good, the Bad, and the Ugly
Yifan Yao, Jinhao Duan, Kaidi Xu, et al.
arXiv (Cornell University) (2023)
Open Access | Times Cited: 17

AI Code Generators for Security: Friend or Foe?
Roberto Natella, Pietro Liguori, Cristina Improta, et al.
IEEE Security & Privacy (2024) Vol. 22, Iss. 5, pp. 73-81
Open Access | Times Cited: 7

Assessing LLMs in malicious code deobfuscation of real-world malware campaigns
Constantinos Patsakis, Fran Casino, Nikolaos Lykousas
Expert Systems with Applications (2024) Vol. 256, pp. 124912-124912
Open Access | Times Cited: 7

RansomCillin: Leveraging NTFS Spare Space to Recover from Ransomware Attacks
Kazuya Takeuchi, Himari Fujima, Takako Kumamoto, et al.
(2023)
Open Access | Times Cited: 13

Applying ChatGPT-Powered Game Theory in Ransomware Negotiations
Tingting Zhu, Xiang Li, Wenbo Zhang
(2023)
Open Access | Times Cited: 13

Harnessing Generative AI for Enhanced Web Application Security
Muhammad Usman Tariq
Advances in web technologies and engineering book series (2024), pp. 161-192
Closed Access | Times Cited: 5

A novel system for strengthening security in large language models against hallucination and injection attacks with effective strategies
Tunahan Gokcimen, Bihter Daş
Alexandria Engineering Journal (2025) Vol. 123, pp. 71-90
Closed Access

ChatGPT's Impact on Ethical Hacking and Cybersecurity
Rahaf Adam Alnuaimi, Moatsum Alawida, Manal Al-Rawashdeh, et al.
Advances in computational intelligence and robotics book series (2025), pp. 573-608
Closed Access

Using ChatGPT to Analyze Ransomware Messages and to Predict Ransomware Threats
Himari Fujima, Takako Kumamoto, Yunko Yoshida
Research Square (Research Square) (2023)
Open Access | Times Cited: 8

Decoding developer password patterns: A comparative analysis of password extraction and selection practices
Nikolaos Lykousas, Constantinos Patsakis
Computers & Security (2024) Vol. 145, pp. 103974-103974
Open Access | Times Cited: 2

Evolving Conversations: A Review of Chatbots and Implications in Natural Language Processing for Cultural Heritage Ecosystems
Tri Lathif Mardi Suryanto, Aji Prasetya Wibawa, Hariyono Hariyono, et al.
International Journal of Robotics and Control Systems (2023) Vol. 3, Iss. 4, pp. 955-1006
Open Access | Times Cited: 5

Page 1 - Next Page

Scroll to top