OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Identifying Unintended Harms of Cybersecurity Countermeasures
Yi Ting Chua, Simon Parkin, Matthew Edwards, et al.
(2019), pp. 1-15
Open Access | Times Cited: 13

Showing 13 citing articles:

“All Sorts of Other Reasons to Do It”: Explaining the Persistence of Sub-optimal IoT Security Advice
Veerle van Harten, Carlos Gañán, Michel van Eeten, et al.
(2025), pp. 1-19
Closed Access

No Easy Way Out: the Effectiveness of Deplatforming an Extremist Forum to Suppress Hate and Harassment
Anh V. Vu, Alice Hutchings, Ross Anderson
2022 IEEE Symposium on Security and Privacy (SP) (2024), pp. 717-734
Closed Access | Times Cited: 3

A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints
Victor Le Pochat, Tim Van hamme, Sourena Maroofi, et al.
(2020)
Open Access | Times Cited: 17

Cybercrime is (often) boring: maintaining the infrastructure of cybercrime economies
Benjamin Collier, Richard Clayton, Alice Hutchings, et al.
(2020)
Closed Access | Times Cited: 15

An analysis of phishing reporting activity in a bank
Anne-Kee Doing, Eduardo Bárbaro, Frank van der Roest, et al.
(2024), pp. 44-57
Closed Access | Times Cited: 1

Healthcare Security Incident Response Strategy - A Proactive Incident Response (IR) Procedure
Ying He, Λέανδρος Μαγλαράς, Aliyu Aliyu, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-10
Open Access | Times Cited: 6

Don't Patch the Researcher, Patch the Game: A Systematic Approach for Responsible Research via Federated Ethics Boards
A. A. Ngurah Gede Dirksen, Sebastian Giessler, Hendrik Erz, et al.
(2024), pp. 126-141
Closed Access

Moguća rešenja za sajber nasilje
Tatjana Jevremović Petrović
Savremene studije bezbednosti (2024), Iss. 2, pp. 65-82
Closed Access

Tracking Without Traces—Fingerprinting in an Era of Individualism and Complexity
Florian Adamsky, Stefan Schiffner, Thomas Engel
Lecture notes in computer science (2020), pp. 201-212
Closed Access | Times Cited: 3

Click Here to Exit: An Evaluation of Quick Exit Buttons
Kieron Ivy Turk, Alice Hutchings
(2023), pp. 1-15
Open Access | Times Cited: 1

A cyber-risk framework for coordination of the prevention and preservation of behaviours1
Simon Parkin, Yi Ting Chua
Journal of Computer Security (2022) Vol. 30, Iss. 3, pp. 327-356
Open Access | Times Cited: 2

Refining the Blunt Instruments of Cybersecurity: A Framework to Coordinate Prevention and Preservation of Behaviours
Simon Parkin, Yi Ting Chua
Lecture notes in computer science (2021), pp. 23-42
Closed Access | Times Cited: 2

Brazilian Favela Women: How Your Standard Solutions for Technology Abuse Might Actually Harm Them.
Mirela Silva, Daniela S Oliveira
arXiv (Cornell University) (2021)
Closed Access | Times Cited: 1

Marked for Disruption: Tracing the Evolution of Malware Delivery Operations Targeted for Takedown
Colin C. Ife, Yun Shen, Steven J. Murdoch, et al.
(2021), pp. 340-353
Open Access | Times Cited: 1

Page 1

Scroll to top