OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Modeling and Predicting Cyber Hacking Breaches
Maochao Xu, Kristin M. Schweitzer, Raymond M. Bateman, et al.
IEEE Transactions on Information Forensics and Security (2018) Vol. 13, Iss. 11, pp. 2856-2871
Closed Access | Times Cited: 113

Showing 1-25 of 113 citing articles:

Review and insight on the behavioral aspects of cybersecurity
Rachid Ait Maalem Lahcen, Bruce D. Caulkins, R. N. Mohapatra, et al.
Cybersecurity (2020) Vol. 3, Iss. 1
Open Access | Times Cited: 104

Consumer-facing technology fraud: Economics, attack methods and potential solutions
Mohammed Aamir Ali, Muhammad Ajmal Azad, Mario Parreño Centeno, et al.
Future Generation Computer Systems (2019) Vol. 100, pp. 408-427
Open Access | Times Cited: 53

Cybersecurity Dynamics: A Foundation for the Science of Cybersecurity
Shouhuai Xu
Advances in information security (2019), pp. 1-31
Closed Access | Times Cited: 49

Cyber risk research in business and actuarial science
Martin Eling
European Actuarial Journal (2020) Vol. 10, Iss. 2, pp. 303-333
Closed Access | Times Cited: 45

A Case Study on using Deep Learning for Network Intrusion Detection
Gabriel Fernández, Shouhuai Xu
MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM) (2019)
Open Access | Times Cited: 44

SoK: Quantifying Cyber Risk
Daniel Woods, Rainer Böhme
2022 IEEE Symposium on Security and Privacy (SP) (2021), pp. 211-228
Open Access | Times Cited: 36

A Framework for Predicting Data Breach Risk: Leveraging Dependence to Cope With Sparsity
Zijian Fang, Maochao Xu, Shouhuai Xu, et al.
IEEE Transactions on Information Forensics and Security (2021) Vol. 16, pp. 2186-2201
Open Access | Times Cited: 34

Deep VULMAN: A deep reinforcement learning-enabled cyber vulnerability management framework
Soumyadeep Hore, Ankit Shah, Nathaniel D. Bastian
Expert Systems with Applications (2023) Vol. 221, pp. 119734-119734
Open Access | Times Cited: 16

Cyber risk and insurance for transportation infrastructure
Gina Tonn, Jay P. Kesan, Linfeng Zhang, et al.
Transport Policy (2019) Vol. 79, pp. 103-114
Closed Access | Times Cited: 38

On the Evolution of Data Breach Reporting Patterns and Frequency in the United States: A Cross-State Analysis
Benjamin Avanzi, Xingyun Tan, Greg Taylor, et al.
North American Actuarial Journal (2025), pp. 1-32
Open Access

Cyber risk assessment for capital management
Wing Fung Chong, Runhuan Feng, Hins Hu, et al.
Journal of Risk & Insurance (2025)
Closed Access

AI‐Assisted Literature Review: Integrating Visualization and Geometric Features for Insightful Analysis
Grigorios Papageorgiou, Ekaterini Skamnia, Polychronis Εconomou
Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery (2025) Vol. 15, Iss. 2
Closed Access

Modeling Malicious Hacking Data Breach Risks
Hong Sun, Maochao Xu, Peng Zhao
North American Actuarial Journal (2020) Vol. 25, Iss. 4, pp. 484-502
Closed Access | Times Cited: 31

The Cybersecurity Dynamics Way of Thinking and Landscape
Shouhuai Xu
(2020), pp. 69-80
Closed Access | Times Cited: 28

A comprehensive model for cyber risk based on marked point processes and its application to insurance
Gabriela Zeller, Matthias Scherer
European Actuarial Journal (2021) Vol. 12, Iss. 1, pp. 33-85
Open Access | Times Cited: 26

An exploratory data analysis of malware/ransomware cyberattacks: insights from an extensive cyber loss dataset
Farshid Javadnejad, Ahmed M. Abdelmagid, C. Ariel Pinto, et al.
Enterprise Information Systems (2024) Vol. 18, Iss. 9
Closed Access | Times Cited: 3

A Novel Multimodal Data Fusion Framework: Enhancing Prediction and Understanding of Inter-State Cyberattacks
Jiping Dong, Mengmeng Hao, Fangyu Ding, et al.
Big Data and Cognitive Computing (2025) Vol. 9, Iss. 3, pp. 63-63
Open Access

EBiCop: Ensemble bivariate copulas for modeling multivariate cyber data breach risks
Yijia Li, Quynh Nguyen, Maochao Xu, et al.
The Annals of Applied Statistics (2025) Vol. 19, Iss. 1
Closed Access

Malware in the future? Forecasting of analyst detection of cyber events
Jonathan Z. Bakdash, Steve Hutchinson, Erin Zaroukian, et al.
Journal of Cybersecurity (2018) Vol. 4, Iss. 1
Open Access | Times Cited: 30

Cloud Security Service for Identifying Unauthorized User Behaviour
D. Stalin David, Mamoona Anam, Chandraprabha Kaliappan, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2021) Vol. 70, Iss. 2, pp. 2581-2600
Open Access | Times Cited: 23

Modelling and predicting enterprise-level cyber risks in the context of sparse data availability
Daniel Zängerle, Dirk Schiereck
The Geneva Papers on Risk and Insurance Issues and Practice (2022) Vol. 48, Iss. 2, pp. 434-462
Open Access | Times Cited: 15

Modeling and management of cyber risk: a cross-disciplinary review
Rong He, Zhuo Jin, Johnny Siu-Hang Li
Annals of Actuarial Science (2024) Vol. 18, Iss. 2, pp. 270-309
Open Access | Times Cited: 3

Using bursty announcements for detecting BGP routing anomalies
Pablo Moriano, Raquel Hill, L. Jean Camp
Computer Networks (2021) Vol. 188, pp. 107835-107835
Open Access | Times Cited: 20

Cyber risk frequency, severity and insurance viability
Matteo Malavasi, Gareth W. Peters, Pavel V. Shevchenko, et al.
Insurance Mathematics and Economics (2022) Vol. 106, pp. 90-114
Open Access | Times Cited: 14

Page 1 - Next Page

Scroll to top