OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Showing 16 citing articles:

Improving Threat Mitigation Through a Cybersecurity Risk Management Framework: A Computational Design Science Approach
Benjamin Ampel, Sagar Samtani, Hongyi Zhu, et al.
Journal of Management Information Systems (2024) Vol. 41, Iss. 1, pp. 236-265
Closed Access | Times Cited: 12

Preliminary Study: Exploring GitHub Repository Metrics
Guzel Safiullina, Aidar Gumerov, Gcinizwe Dlamini, et al.
Lecture notes in networks and systems (2024), pp. 579-591
Closed Access | Times Cited: 1

Developers Need Protection, Too: Perspectives and Research Challenges for Privacy in Social Coding Platforms
Nicolás E. Díaz Ferreyra, Abdessamad Imine, Melina Vidoni, et al.
(2023)
Open Access | Times Cited: 3

Simple stupid insecure practices and GitHub’s code search: A looming threat?
Ken Russel Go, Sruthi Soundarapandian, Aparupa Mitra, et al.
Journal of Systems and Software (2023) Vol. 202, pp. 111698-111698
Closed Access | Times Cited: 2

Disrupting Ransomware Actors on the Bitcoin Blockchain: A Graph Embedding Approach
Benjamin Ampel, Kaeli Otto, Sagar Samtani, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 2

Exploring Security Vulnerabilities in Competitive Programming: An Empirical Study
Debeshee Das, Noble Saji Mathews, Sridhar Chimalakonda
(2022), pp. 110-119
Closed Access | Times Cited: 3

Exploring the Propagation of Vulnerabilities from GitHub Repositories Hosted by Major Technology Organizations
Ben Lazarine, Zhong Zhang, Agrim Sachdeva, et al.
(2022)
Closed Access | Times Cited: 3

User Profiling and Vulnerability Introduction Prediction in Social Coding Repositories: A Dynamic Graph Embedding Approach
Agrim Sachdeva, Ben Lazarine, Hongyi Zhu, et al.
(2023) Vol. 26, pp. 19-25
Closed Access | Times Cited: 1

To Detect and Mitigate the Risk in Continuous Integration and Continues Deployments (CI/CD) Pipelines in Supply Chain Using Snyk tool
Dudala Sai Sushma, M K Nalini, R. Ashok Kumar, et al.
(2023), pp. 1-10
Closed Access | Times Cited: 1

File Classification Containing Secret Key in Git Repository Using Character Level CNN and Shannon Entropy
Rafie Arshad Muhammad, Aina Musdholifah
Lecture notes in electrical engineering (2024), pp. 817-831
Closed Access

Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach
Kaeli Otto, Benjamin Ampel, Sagar Samtani, et al.
(2021), pp. 1-6
Closed Access | Times Cited: 3

Boosting Hidden Graph Node Classification for Large Social Networks
Hanxuan Yang, Qingchao Kong, Wenji Mao, et al.
(2021), pp. 1-6
Closed Access | Times Cited: 2

Connecting the .dotfiles: Checked-In Secret Exposure with Extra (Lateral Movement) Steps
Gerhard Jungwirth, Aakanksha Saha, Michael Schröder, et al.
(2023), pp. 322-333
Closed Access

Defender-Attacker Model Based Secure Software Development Lifecycle for Common Web Vulnerabilities
Adeliya Bekturova, Kalamkas Kursabayeva, Zhanar Salamatkyzy, et al.
2021 IEEE International Conference on Smart Information Systems and Technologies (SIST) (2023), pp. 272-277
Closed Access

Mapping Exploit Code on Paste Sites to the MITRE ATT&CK Framework: A Multi-label Transformer Approach
Benjamin Ampel, Tala Vahedi, Sagar Samtani, et al.
(2023), pp. 1-6
Closed Access

Identifying Patterns of Vulnerability Incidence in Foundational Machine Learning Repositories on GitHub: An Unsupervised Graph Embedding Approach
Agrim Sachdeva, Ben Lazarine, Ruchik Dama, et al.
2022 IEEE International Conference on Data Mining Workshops (ICDMW) (2022)
Closed Access

Page 1

Scroll to top