
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Cyber Persistence Theory
Michael P. Fischerkeller, Emily O. Goldman, Richard J. Harknett, et al.
Oxford University Press eBooks (2022)
Closed Access | Times Cited: 33
Michael P. Fischerkeller, Emily O. Goldman, Richard J. Harknett, et al.
Oxford University Press eBooks (2022)
Closed Access | Times Cited: 33
Showing 1-25 of 33 citing articles:
How cyber operations can reduce escalation pressures: Evidence from an experimental wargame study
Benjamin Jensen, Brandon Valeriano, Sam Whitt
Journal of Peace Research (2024) Vol. 61, Iss. 1, pp. 119-133
Closed Access | Times Cited: 6
Benjamin Jensen, Brandon Valeriano, Sam Whitt
Journal of Peace Research (2024) Vol. 61, Iss. 1, pp. 119-133
Closed Access | Times Cited: 6
How cyberspace affects international relations: The promise of structural modifiers
Michiel Foulon, Gustav Meibauer
Contemporary Security Policy (2024) Vol. 45, Iss. 3, pp. 426-458
Open Access | Times Cited: 4
Michiel Foulon, Gustav Meibauer
Contemporary Security Policy (2024) Vol. 45, Iss. 3, pp. 426-458
Open Access | Times Cited: 4
“Hands off the keyboard”: NATO’s cyber-defense of civilian critical infrastructure
Rhiannon Neilsen, Karine Pontbriand
Defence Studies (2025), pp. 1-24
Closed Access
Rhiannon Neilsen, Karine Pontbriand
Defence Studies (2025), pp. 1-24
Closed Access
The Red Queen of Cyberspace: The Persistence of Advanced Persistent Threats (Apts) Explained Through Co-Evolution
Al Lewis
(2025)
Closed Access
Al Lewis
(2025)
Closed Access
Great Power Cyberpolitics and Global Cyberhegemony
Yavuz Akdağ
Perspectives on Politics (2025), pp. 1-22
Closed Access
Yavuz Akdağ
Perspectives on Politics (2025), pp. 1-22
Closed Access
The rise of offensive cyber and reality of European digital policy
Nori Katagiri
European Politics and Society (2025), pp. 1-18
Closed Access
Nori Katagiri
European Politics and Society (2025), pp. 1-18
Closed Access
Stuxnet revisited: From cyber warfare to secret statecraft
Jon R. Lindsay
Journal of Strategic Studies (2025), pp. 1-40
Closed Access
Jon R. Lindsay
Journal of Strategic Studies (2025), pp. 1-40
Closed Access
Spatiotemporal characteristics and drivers of global cyber conflicts
Jiping Dong, Shuai Chen, F. Ding, et al.
Humanities and Social Sciences Communications (2025) Vol. 12, Iss. 1
Open Access
Jiping Dong, Shuai Chen, F. Ding, et al.
Humanities and Social Sciences Communications (2025) Vol. 12, Iss. 1
Open Access
Abducted by hackers: Using the case of Bletchley Park to construct a theory of intelligence performance that generalizes to cybersecurity
Jon R. Lindsay
Journal of Peace Research (2024) Vol. 61, Iss. 1, pp. 87-102
Closed Access | Times Cited: 3
Jon R. Lindsay
Journal of Peace Research (2024) Vol. 61, Iss. 1, pp. 87-102
Closed Access | Times Cited: 3
Identification-imitation-amplification: understanding divisive influence campaigns through cyberspace
Jelena Vićić, Richard J. Harknett
Intelligence & National Security (2024) Vol. 39, Iss. 5, pp. 897-914
Open Access | Times Cited: 2
Jelena Vićić, Richard J. Harknett
Intelligence & National Security (2024) Vol. 39, Iss. 5, pp. 897-914
Open Access | Times Cited: 2
Emerging technology and the cult of the offensive
Erica D. Lonergan
Contemporary Security Policy (2024) Vol. 45, Iss. 3, pp. 459-493
Closed Access | Times Cited: 2
Erica D. Lonergan
Contemporary Security Policy (2024) Vol. 45, Iss. 3, pp. 459-493
Closed Access | Times Cited: 2
The rise of companies in the cyber era and the pursuant shift in national security
Udi Sommer, Eviatar Matania, Nir Hassid
Political Science (2023) Vol. 75, Iss. 2, pp. 140-164
Open Access | Times Cited: 6
Udi Sommer, Eviatar Matania, Nir Hassid
Political Science (2023) Vol. 75, Iss. 2, pp. 140-164
Open Access | Times Cited: 6
Public opinion and alliance commitments in cybersecurity an attack against all?
Miguel Alberto Gomez, Gregory Winger
International Interactions (2024) Vol. 50, Iss. 2, pp. 332-348
Open Access | Times Cited: 1
Miguel Alberto Gomez, Gregory Winger
International Interactions (2024) Vol. 50, Iss. 2, pp. 332-348
Open Access | Times Cited: 1
The rise of companies in the cyber era and the pursuant shift in national security
Nir Hassid
SSRN Electronic Journal (2024)
Closed Access | Times Cited: 1
Nir Hassid
SSRN Electronic Journal (2024)
Closed Access | Times Cited: 1
Saving face in the cyberspace: Responses to public cyber intrusions in the Gulf
Yehonatan Abramson, Gil Baram
Contemporary Security Policy (2023) Vol. 45, Iss. 2, pp. 210-238
Open Access | Times Cited: 3
Yehonatan Abramson, Gil Baram
Contemporary Security Policy (2023) Vol. 45, Iss. 2, pp. 210-238
Open Access | Times Cited: 3
Defending medical facilities from cyber attacks: critical issues with the principle of due diligence in international law
Nori Katagiri
International Review of Law Computers & Technology (2023) Vol. 38, Iss. 1, pp. 1-20
Closed Access | Times Cited: 2
Nori Katagiri
International Review of Law Computers & Technology (2023) Vol. 38, Iss. 1, pp. 1-20
Closed Access | Times Cited: 2
Democracy, firms, and cyber punishment: what cyberspace challenge do democracies face from the private sector?
Nori Katagiri
Australian Journal Of International Affairs (2023) Vol. 77, Iss. 5, pp. 528-547
Closed Access | Times Cited: 1
Nori Katagiri
Australian Journal Of International Affairs (2023) Vol. 77, Iss. 5, pp. 528-547
Closed Access | Times Cited: 1
Attributing Digital Covert Action: the curious case of WikiSaudileaks
Simin Kargar, Thomas Rid
Intelligence & National Security (2024) Vol. 39, Iss. 5, pp. 781-805
Closed Access
Simin Kargar, Thomas Rid
Intelligence & National Security (2024) Vol. 39, Iss. 5, pp. 781-805
Closed Access
Cyber, Disinformation and AI: Evolving Uses of ICT in Peace and Conflict
Brett van Niekerk
IFIP advances in information and communication technology (2024), pp. 134-148
Closed Access
Brett van Niekerk
IFIP advances in information and communication technology (2024), pp. 134-148
Closed Access
Characteristics of cyberspace as a distinct domain of conflict: A case study of U.S. strategic operations
Miloš Vukelić
Medjunarodni problemi (2024) Vol. 76, Iss. 1, pp. 55-86
Open Access
Miloš Vukelić
Medjunarodni problemi (2024) Vol. 76, Iss. 1, pp. 55-86
Open Access
Options for Signalling Cyber Deterrence Using Cyber Capabilities
Maria Keinonen, Kimmo Halunen
International Conference on Cyber Warfare and Security (2024) Vol. 19, Iss. 1, pp. 463-471
Open Access
Maria Keinonen, Kimmo Halunen
International Conference on Cyber Warfare and Security (2024) Vol. 19, Iss. 1, pp. 463-471
Open Access
Third-party countries in cyber conflict: Public opinion and conflict spillover in cyberspace
Miguel Alberto Gomez, Gregory Winger
Journal of Peace Research (2024)
Closed Access
Miguel Alberto Gomez, Gregory Winger
Journal of Peace Research (2024)
Closed Access
From prepaid cards to bitcoin: How did ransomware hackers adopt cryptocurrencies?
Nori Katagiri
Journal of Cyber Policy (2024), pp. 1-17
Closed Access
Nori Katagiri
Journal of Cyber Policy (2024), pp. 1-17
Closed Access
Answering the Call: Why Aid Allies in Cyber Conflict?
Miguel Alberto Gomez, Gregory Winger
International Interactions (2024), pp. 1-29
Closed Access
Miguel Alberto Gomez, Gregory Winger
International Interactions (2024), pp. 1-29
Closed Access