OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Public attribution of cyber intrusions
Florian J. Egloff
Journal of Cybersecurity (2020) Vol. 6, Iss. 1
Open Access | Times Cited: 77

Showing 1-25 of 77 citing articles:

Publicly attributing cyber attacks: a framework
Florian J. Egloff, Max Smeets
Journal of Strategic Studies (2021) Vol. 46, Iss. 3, pp. 502-533
Open Access | Times Cited: 91

Restraint under conditions of uncertainty: Why the United States tolerates cyberattacks
Monica Kaminska
Journal of Cybersecurity (2021) Vol. 7, Iss. 1
Open Access | Times Cited: 73

The hidden threat of cyber-attacks – undermining public confidence in government
Ryan Shandler, Miguel Alberto Gomez
Journal of Information Technology & Politics (2022) Vol. 20, Iss. 4, pp. 359-374
Open Access | Times Cited: 58

Cyberattacks, Psychological Distress, and Military Escalation: An Internal Meta-Analysis
Ryan Shandler, Michael L. Gross, Daphna Canetti
Journal of Global Security Studies (2022) Vol. 8, Iss. 1
Open Access | Times Cited: 48

Cyberattacks and public opinion – The effect of uncertainty in guiding preferences
Eric Jardine, Nathaniel D. Porter, Ryan Shandler
Journal of Peace Research (2024) Vol. 61, Iss. 1, pp. 103-118
Open Access | Times Cited: 13

Cyber Persistence Theory
Michael P. Fischerkeller, Emily O. Goldman, Richard J. Harknett, et al.
Oxford University Press eBooks (2022)
Closed Access | Times Cited: 33

The better angels of our digital nature? Offensive cyber capabilities and state violence
Florian J. Egloff, James Shires
European Journal of International Security (2021) Vol. 8, Iss. 1, pp. 130-149
Open Access | Times Cited: 36

Trust at Risk: The Effect of Proximity to Cyberattacks
Miguel Alberto Gomez, Ryan Shandler
Journal of Global Security Studies (2024) Vol. 9, Iss. 2
Open Access | Times Cited: 6

Responding to Uncertainty: The Importance of Covertness in Support for Retaliation to Cyber and Kinetic Attacks
Kathryn Hedgecock, Lauren Sukin
Journal of Conflict Resolution (2023) Vol. 67, Iss. 10, pp. 1873-1903
Open Access | Times Cited: 11

Public Opinion and Cyberterrorism
Ryan Shandler, Nadiya Kostyuk, Harry Oppenheimer
Public Opinion Quarterly (2023) Vol. 87, Iss. 1, pp. 92-119
Open Access | Times Cited: 11

Attribution and Knowledge Creation Assemblages in Cybersecurity Politics
Florian J. Egloff, Myriam Dunn Cavelty
Journal of Cybersecurity (2021) Vol. 7, Iss. 1
Open Access | Times Cited: 25

Offensive Cyber Capabilities and State Violence: Three Logics of Integration
Florian J. Egloff, James Shires
Journal of Global Security Studies (2021) Vol. 7, Iss. 1
Open Access | Times Cited: 24

Cyber Security Politics
Myriam Dunn Cavelty, Andreas Wenger
Routledge eBooks (2022)
Open Access | Times Cited: 18

Situating Power in Cyber Threat Knowledge
Shashank Yadav, Sundeep Oberoi
Deleted Journal (2025) Vol. 4, Iss. 1
Closed Access

The rise of offensive cyber and reality of European digital policy
Nori Katagiri
European Politics and Society (2025), pp. 1-18
Closed Access

Blame Games in Cyberspace: How Foreign Cues Shape Public Opinion on Cyber Attribution and Retribution
Marcelo Mesquita Leal
International Interactions (2025), pp. 1-32
Closed Access

Attribution Across Cyber Attack Types: Network Intrusions and Information Operations
Sanjay Goel, Brian Nussbaum
IEEE Open Journal of the Communications Society (2021) Vol. 2, pp. 1082-1093
Open Access | Times Cited: 21

La Gestión de la Información Personal en el Ámbito Digital
Carlos Eduardo de Carvalho Vargas
Emergentes - Revista Científica (2023) Vol. 3, Iss. 1, pp. 58-76
Open Access | Times Cited: 9

Social automation and APT attributions to national cybersecurity
Shashank Yadav
Journal of Cyber Security Technology (2024) Vol. 8, Iss. 4, pp. 286-311
Closed Access | Times Cited: 3

Public Secrets: The Dynamics of Publicity and Secrecy in Offensive Cyber Operations
Gil Baram
Journal of Global Security Studies (2023) Vol. 8, Iss. 3
Closed Access | Times Cited: 7

Cyber legalism: why it fails and what to do about it
Lucas Kello
Journal of Cybersecurity (2021) Vol. 7, Iss. 1
Open Access | Times Cited: 17

Identification-imitation-amplification: understanding divisive influence campaigns through cyberspace
Jelena Vićić, Richard J. Harknett
Intelligence & National Security (2024) Vol. 39, Iss. 5, pp. 897-914
Open Access | Times Cited: 2

Narrow windows of opportunity: the limited utility of cyber operations in war
Frederik A H Pedersen, Jeppe Teglskov Jacobsen
Journal of Cybersecurity (2024) Vol. 10, Iss. 1
Open Access | Times Cited: 2

Social botnets and the challenges of cyber situation awareness
Shashank Yadav
AI and Ethics (2024)
Closed Access | Times Cited: 2

Page 1 - Next Page

Scroll to top