OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A selective ensemble model for cognitive cybersecurity analysis
Yuning Jiang, Yacine Atif
Journal of Network and Computer Applications (2021) Vol. 193, pp. 103210-103210
Open Access | Times Cited: 25

Showing 25 citing articles:

Artificial intelligence for cybersecurity: Literature review and future research directions
Ramanpreet Kaur, Dušan Gabrijelčič, Tomaž Klobučar
Information Fusion (2023) Vol. 97, pp. 101804-101804
Open Access | Times Cited: 265

Enhancing Security in Cloud Computing Using Artificial Intelligence ( AI )
Dalmo Stutz, Joaquim T. de Assis, Asif Ali Laghari, et al.
(2024), pp. 179-220
Closed Access | Times Cited: 11

A Survey on Software Vulnerability Exploitability Assessment
Sarah Elder, Md Rayhanur Rahman, Gage Fringer, et al.
ACM Computing Surveys (2024) Vol. 56, Iss. 8, pp. 1-41
Open Access | Times Cited: 5

Discovering and analyzing IoT-cloud vulnerabilities
Yacine Atif, Sujith Samuel Mathew
Elsevier eBooks (2025), pp. 253-276
Closed Access

Cybersecurity Awareness Scale (CSAS) for Social Media Users: Development, Validity and Reliability Study
İbrahim Arpacı, Ömer Aslan, İbrahim Enes Öner
Information Development (2025)
Closed Access

AI Threats in Cyber Security
Tuğçe Karayel
Advances in computational intelligence and robotics book series (2025), pp. 553-572
Closed Access

Uncovering the Risk of Academic Information System Vulnerability through PTES and OWASP Method
Ferzha Putra Utama, Raden Muhammad Hilmi Nurhadi
CommIT (Communication and Information Technology) Journal (2024) Vol. 18, Iss. 1, pp. 39-51
Open Access | Times Cited: 3

Best Practices for Mitigating Risks, Conclusion and Recommendation
Alaba Ayotunde Fadele, Alvaro Rocha
(2025), pp. 99-111
Closed Access

Model of Information System Communication in Aggressive Cyberspace: Reliability, Functional Safety, Economics
Viacheslav Kovtun, Ivan Izonin, Michal Greguš
IEEE Access (2022) Vol. 10, pp. 31494-31502
Open Access | Times Cited: 14

An efficient cyber threat prediction using a novel artificial intelligence technique
Pankaj Sharma, Jay Shankar Prasad, Shaheen, et al.
Multimedia Tools and Applications (2024) Vol. 83, Iss. 25, pp. 66757-66773
Closed Access | Times Cited: 2

Applications of Machine Learning in Cyber Security: A Review
Ioannis Vourganas, Anna Lito Michala
Journal of Cybersecurity and Privacy (2024) Vol. 4, Iss. 4, pp. 972-992
Open Access | Times Cited: 2

Design of capability maturity model integration with cybersecurity risk severity complex prediction using bayesian-based machine learning models
Fahad H. Alshammari
Service Oriented Computing and Applications (2022) Vol. 17, Iss. 1, pp. 59-72
Closed Access | Times Cited: 9

A Cognitive Digital Twin Architecture for Cybersecurity in IoT-Based Smart Homes
Sandeep Pirbhulal, Habtamu Abie, Ankur Shukla, et al.
Lecture notes in electrical engineering (2023), pp. 63-70
Closed Access | Times Cited: 3

A Comparative Study on the Application of Text Mining in Cybersecurity
Kousik Barik, Sanjay Misra, Karabi Konar, et al.
Recent Advances in Computer Science and Communications (2022) Vol. 16, Iss. 3
Closed Access | Times Cited: 5

Model of the information security protection subsystem operation and method of optimization of its composition
Basil Al-Kasasbeh
Egyptian Informatics Journal (2022) Vol. 23, Iss. 3, pp. 511-516
Open Access | Times Cited: 4

Cyber Security and Frameworks: A Study of Cyber Attacks and Methods of Prevention of Cyber Attacks
Sourabh Purkait, Madhavi Damle
2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS) (2023), pp. 1310-1315
Closed Access | Times Cited: 2

Cybersecurity Maturity Model to Prevent Cyberattacks on Web Applications Based on ISO 27032 and NIST
Ethan Arenas, Juan Carlos Palomino, Juan-Pablo Mansilla
(2023)
Closed Access | Times Cited: 1

Teacher Education for National Development Using Google Meet: Issues and Prospects
Fadele Ayotunde Alaba, Adejo Omoka Lucy, Haruna Muhammad Jumare, et al.
Journal of Technology Innovations and Energy (2024) Vol. 3, Iss. 1, pp. 30-44
Open Access

The Role of Cognitive-Information Technologies in Cybersecurity: Threat Detection and Adaptive Defense Systems
Amadou Sara Camara
Вопросы безопасности (2024), Iss. 1, pp. 61-70
Open Access

Metric Identification Evaluating Security Information: A Systematic Literature Review
Daisy Imbaquingo-Esparza, Javier Díaz, Silvia Arciniega, et al.
Communications in computer and information science (2022), pp. 214-231
Closed Access | Times Cited: 1

Advanced Security Technique in Presence of Open Communication System and Cyber Era
Oday Kamil Hamid, Riyadh Bassil Abduljabbar, Aya Qusay Dawood, et al.
Lecture notes in networks and systems (2023), pp. 472-480
Closed Access

Application of Data Mining in Public Management Classification
Fuyan Hong, Louyan Sun
(2023), pp. 865-871
Closed Access

Machine Learning Methods for Cybersecurity: Review and Bibliometric Analysis
Eszter Kail, Anna Bánáti, Rita Fleiner, et al.
(2023), pp. 000527-000536
Closed Access

Vulnerability assessment based on the Octave Cybersecurity Framework for Industry 4.0
Yair Rivera Julio, Ángel Pinto, Juan Torres Tovio, et al.
(2023), pp. 1-6
Closed Access

Page 1

Scroll to top