
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
The impact of artificial intelligence on organisational cyber security: An outcome of a systematic literature review
Irshaad Jada, Thembekile O. Mayayise
Data and Information Management (2023) Vol. 8, Iss. 2, pp. 100063-100063
Open Access | Times Cited: 35
Irshaad Jada, Thembekile O. Mayayise
Data and Information Management (2023) Vol. 8, Iss. 2, pp. 100063-100063
Open Access | Times Cited: 35
Showing 1-25 of 35 citing articles:
Artificial intelligence: revolutionizing robotic surgery: review
Muhammad Iftikhar, Muhammad Saqib, Muhammad Zareen, et al.
Annals of Medicine and Surgery (2024) Vol. 86, Iss. 9, pp. 5401-5409
Open Access | Times Cited: 20
Muhammad Iftikhar, Muhammad Saqib, Muhammad Zareen, et al.
Annals of Medicine and Surgery (2024) Vol. 86, Iss. 9, pp. 5401-5409
Open Access | Times Cited: 20
The Convergence of Artificial Intelligence and Cybersecurity
Oana Alexandra Sarcea Manea, Alexandra Zbuchea
Advances in finance, accounting, and economics book series (2025), pp. 321-350
Closed Access | Times Cited: 2
Oana Alexandra Sarcea Manea, Alexandra Zbuchea
Advances in finance, accounting, and economics book series (2025), pp. 321-350
Closed Access | Times Cited: 2
Artificial Intelligence in nanotechnology for treatment of diseases
Soroush Heydari, Niloofar Masoumi, Erfan Esmaeeli, et al.
Journal of drug targeting (2024) Vol. 32, Iss. 10, pp. 1247-1266
Closed Access | Times Cited: 15
Soroush Heydari, Niloofar Masoumi, Erfan Esmaeeli, et al.
Journal of drug targeting (2024) Vol. 32, Iss. 10, pp. 1247-1266
Closed Access | Times Cited: 15
Integrating Observability with DevOps Practices in Financial Services Technologies: A Study on Enhancing Software Development and Operational Resilience
Ankur Mahida
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 7
Open Access | Times Cited: 9
Ankur Mahida
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 7
Open Access | Times Cited: 9
Leveraging Artificial Intelligence (AI) for Resilience in Industry 5.0
Tunde Toyese Oyedokun, James Aransiola Ishola
Advances in business strategy and competitive advantage book series (2025), pp. 35-68
Closed Access | Times Cited: 1
Tunde Toyese Oyedokun, James Aransiola Ishola
Advances in business strategy and competitive advantage book series (2025), pp. 35-68
Closed Access | Times Cited: 1
Leveraging AI for Enhanced Security: A Technical Perspective
Deepak Bhaskaran
International Journal of Scientific Research in Computer Science Engineering and Information Technology (2025) Vol. 11, Iss. 1, pp. 1448-1455
Open Access
Deepak Bhaskaran
International Journal of Scientific Research in Computer Science Engineering and Information Technology (2025) Vol. 11, Iss. 1, pp. 1448-1455
Open Access
Optimization of cyber security through the implementation of AI technologies
Liqaa Nawaf, Vibhushinie Bentotahewa
Journal of Intelligent Systems (2025) Vol. 34, Iss. 1
Open Access
Liqaa Nawaf, Vibhushinie Bentotahewa
Journal of Intelligent Systems (2025) Vol. 34, Iss. 1
Open Access
A new era in early childhood education (ECE): Teachers’ opinions on the application of artificial intelligence
Esra Betül Kölemen, Bekir Yıldırım
Education and Information Technologies (2025)
Open Access
Esra Betül Kölemen, Bekir Yıldırım
Education and Information Technologies (2025)
Open Access
Implementing Artificial Intelligence in Accounting and Auditing: Risks and Benefits
E. Voronova, Yuliya A. LUKINA, Sofya N. Chernaya
Studies in big data (2025), pp. 335-342
Closed Access
E. Voronova, Yuliya A. LUKINA, Sofya N. Chernaya
Studies in big data (2025), pp. 335-342
Closed Access
DeepFake video detection: Insights into model generalisation — A Systematic review
Ramcharan Ramanaharan, Deepani B. Guruge, Johnson I. Agbinya
Data and Information Management (2025), pp. 100099-100099
Open Access
Ramcharan Ramanaharan, Deepani B. Guruge, Johnson I. Agbinya
Data and Information Management (2025), pp. 100099-100099
Open Access
Navigating the Double-Edged Sword
Munyika Sibanda
Advances in computational intelligence and robotics book series (2025), pp. 57-84
Closed Access
Munyika Sibanda
Advances in computational intelligence and robotics book series (2025), pp. 57-84
Closed Access
Optimal coordination of Production, Logistics, and Maintenance 4.0: A framework for Multi-Site Stamping Plants
Raoua Zerrad, Kamar Diaz, Meriem Hayani Mechkouri, et al.
Procedia Computer Science (2025) Vol. 253, pp. 2899-2908
Open Access
Raoua Zerrad, Kamar Diaz, Meriem Hayani Mechkouri, et al.
Procedia Computer Science (2025) Vol. 253, pp. 2899-2908
Open Access
5G Beyond for Healthcare: Leveraging AI/ML and Diverse Datasets for Cybersecurity
Ali Hassan Sodhro, Muhammad Irfan Younas Mughal, Muhammad Iqbal
Communications in computer and information science (2025), pp. 45-66
Closed Access
Ali Hassan Sodhro, Muhammad Irfan Younas Mughal, Muhammad Iqbal
Communications in computer and information science (2025), pp. 45-66
Closed Access
Proposed Approach to Assessing the Marginal Risks of Alcoholic Beverages in the Context Of SDG
Ashot Matevosyan, Ani Grigoryan, Mane Matevosyan, et al.
Journal of Lifestyle and SDGs Review (2025) Vol. 5, Iss. 3, pp. e05152-e05152
Closed Access
Ashot Matevosyan, Ani Grigoryan, Mane Matevosyan, et al.
Journal of Lifestyle and SDGs Review (2025) Vol. 5, Iss. 3, pp. e05152-e05152
Closed Access
The Effect of EU’s Artificial Intelligence Act on Cyber Security Training
Jyri Rajamäki, Timo Savolainen, Ilkka Tikanmäki
Lecture notes in networks and systems (2025), pp. 229-238
Closed Access
Jyri Rajamäki, Timo Savolainen, Ilkka Tikanmäki
Lecture notes in networks and systems (2025), pp. 229-238
Closed Access
Deep Learning in Cybersecurity: Applications, Challenges, and Future Prospects
Levina Tukaram
International Journal of Innovations in Science Engineering and Management. (2025), pp. 27-33
Closed Access
Levina Tukaram
International Journal of Innovations in Science Engineering and Management. (2025), pp. 27-33
Closed Access
Cyber Threat Intelligence for Industrial Automation
Abuh Ibrahim Sani
Advances in computational intelligence and robotics book series (2025), pp. 131-148
Closed Access
Abuh Ibrahim Sani
Advances in computational intelligence and robotics book series (2025), pp. 131-148
Closed Access
Cybersecurity Strategies for Safe ERP/CRM Implementation
Pratiksha Agarwal, Arun Kumar Gupta
(2024), pp. 1-6
Closed Access | Times Cited: 2
Pratiksha Agarwal, Arun Kumar Gupta
(2024), pp. 1-6
Closed Access | Times Cited: 2
The role of artificial intelligence (AI) in shaping data privacy
Bareq Lami, Safinaz Mohd Hussein, Ramalinggam Rajamanickam, et al.
International Journal of Law and Management (2024)
Closed Access | Times Cited: 2
Bareq Lami, Safinaz Mohd Hussein, Ramalinggam Rajamanickam, et al.
International Journal of Law and Management (2024)
Closed Access | Times Cited: 2
HACKED: Understanding the stock market response to cyberattacks
Erdinc Akyildirim, Thomas Conlon, Shaen Corbet, et al.
Journal of International Financial Markets Institutions and Money (2024) Vol. 97, pp. 102082-102082
Closed Access | Times Cited: 2
Erdinc Akyildirim, Thomas Conlon, Shaen Corbet, et al.
Journal of International Financial Markets Institutions and Money (2024) Vol. 97, pp. 102082-102082
Closed Access | Times Cited: 2
Addressing Cybersecurity Issues in ERP Systems – Emerging Trends
Liana-Elena Anica-Popa, Marinela Vrîncianu, Irina-Bogdana Pugna, et al.
Proceedings of the ... International Conference on Business Excellence (2024) Vol. 18, Iss. 1, pp. 1306-1323
Closed Access | Times Cited: 1
Liana-Elena Anica-Popa, Marinela Vrîncianu, Irina-Bogdana Pugna, et al.
Proceedings of the ... International Conference on Business Excellence (2024) Vol. 18, Iss. 1, pp. 1306-1323
Closed Access | Times Cited: 1
Avances en el uso de inteligencia artificial para la mejora del control y la detección de fraudes en organizaciones
Maricela Lescano-Delgado
Revista Cientifica de Sistemas e Informatica (2024) Vol. 4, Iss. 2, pp. e671-e671
Open Access | Times Cited: 1
Maricela Lescano-Delgado
Revista Cientifica de Sistemas e Informatica (2024) Vol. 4, Iss. 2, pp. e671-e671
Open Access | Times Cited: 1
The Impact of Artificial Intelligence on Cybersecurity
Sabah M. Ahmed
International Journal of Computers and Informatics (2024) Vol. 3, Iss. 2, pp. 39-70
Open Access | Times Cited: 1
Sabah M. Ahmed
International Journal of Computers and Informatics (2024) Vol. 3, Iss. 2, pp. 39-70
Open Access | Times Cited: 1
Artificial Intelligence In Cybersecurity Applications
Anni Dasho Sharko, Genci Sharko, Silvana Qose
(2024), pp. 000175-000180
Closed Access | Times Cited: 1
Anni Dasho Sharko, Genci Sharko, Silvana Qose
(2024), pp. 000175-000180
Closed Access | Times Cited: 1
Incorporating the Future: Optimizing Cybersecurity through Seamless Integration of Artificial Intelligence
Muhammad Asif Ibrahim
International Journal for Electronic Crime Investigation (2024) Vol. 7, Iss. 4, pp. 51-60
Open Access
Muhammad Asif Ibrahim
International Journal for Electronic Crime Investigation (2024) Vol. 7, Iss. 4, pp. 51-60
Open Access