
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Open Source Solutions for Vulnerability Assessment: A Comparative Analysis
Dinis Barroqueiro Cruz, João Rafael Almeida, José Luís Oliveira
IEEE Access (2023) Vol. 11, pp. 100234-100255
Open Access | Times Cited: 5
Dinis Barroqueiro Cruz, João Rafael Almeida, José Luís Oliveira
IEEE Access (2023) Vol. 11, pp. 100234-100255
Open Access | Times Cited: 5
Showing 5 citing articles:
Enhancing Microservice Security Through Vulnerability-Driven Trust in the Service Mesh Architecture
Rami Alboqmi, Rose Gamble
Sensors (2025) Vol. 25, Iss. 3, pp. 914-914
Open Access
Rami Alboqmi, Rose Gamble
Sensors (2025) Vol. 25, Iss. 3, pp. 914-914
Open Access
Comparing effectiveness and efficiency of Interactive Application Security Testing (IAST) and Runtime Application Self-Protection (RASP) tools in a large java-based system
Aishwarya Seth, Saikath Bhattacharya, Sarah Elder, et al.
Empirical Software Engineering (2025) Vol. 30, Iss. 3
Closed Access
Aishwarya Seth, Saikath Bhattacharya, Sarah Elder, et al.
Empirical Software Engineering (2025) Vol. 30, Iss. 3
Closed Access
Comparative evaluation of approaches & tools for effective security testing of Web applications
Sana Qadir, Eman Waheed, Aisha Khanum, et al.
PeerJ Computer Science (2025) Vol. 11, pp. e2821-e2821
Open Access
Sana Qadir, Eman Waheed, Aisha Khanum, et al.
PeerJ Computer Science (2025) Vol. 11, pp. e2821-e2821
Open Access
A Cybersecurity Detection Platform Integrating IOTA DLT and IPFS for Vulnerability Management
Iuon‐Chang Lin, Jyun-Yan Ruan, Ching-Chun Chang, et al.
Electronics (2025) Vol. 14, Iss. 10, pp. 1929-1929
Open Access
Iuon‐Chang Lin, Jyun-Yan Ruan, Ching-Chun Chang, et al.
Electronics (2025) Vol. 14, Iss. 10, pp. 1929-1929
Open Access
DevSec-GPT — Generative-AI (with Custom-Trained Meta's Llama2 LLM), Blockchain, NFT and PBOM Enabled Cloud Native Container Vulnerability Management and Pipeline Verification Platform
Eranga Bandara, Sachin Shetty, Ravi Mukkamala, et al.
(2024), pp. 28-35
Closed Access | Times Cited: 1
Eranga Bandara, Sachin Shetty, Ravi Mukkamala, et al.
(2024), pp. 28-35
Closed Access | Times Cited: 1
Comparing Effectiveness and Efficiency of Interactive Application Security Testing (Iast) and Runtime Application Self-Protection (Rasp) Tools in A Large Java-Based System
Aishwarya Seth, Saikath Bhattacharya, Sarah Elder, et al.
SSRN Electronic Journal (2022)
Open Access | Times Cited: 4
Aishwarya Seth, Saikath Bhattacharya, Sarah Elder, et al.
SSRN Electronic Journal (2022)
Open Access | Times Cited: 4