OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Practicing a Science of Security
Jonathan Spring, Tyler Moore, David Pym
(2017), pp. 1-18
Closed Access | Times Cited: 33

Showing 1-25 of 33 citing articles:

Cybersecurity Dynamics: A Foundation for the Science of Cybersecurity
Shouhuai Xu
Advances in information security (2019), pp. 1-31
Closed Access | Times Cited: 48

Usability analysis of shared device ecosystem security
Simon Parkin, Trupti Patel, Isabel López-Neira, et al.
(2019), pp. 1-15
Closed Access | Times Cited: 30

The Cybersecurity Dynamics Way of Thinking and Landscape
Shouhuai Xu
(2020), pp. 69-80
Closed Access | Times Cited: 28

Time to Change the CVSS?
Jonathan Spring, Eric Hatleback, Allen D. Householder, et al.
IEEE Security & Privacy (2021) Vol. 19, Iss. 2, pp. 74-78
Open Access | Times Cited: 24

Why Separation Logic Works
David Pym, Jonathan Spring, Peter W. O’Hearn
Philosophy & Technology (2018) Vol. 32, Iss. 3, pp. 483-516
Open Access | Times Cited: 19

On managing vulnerabilities in AI/ML systems
Jonathan Spring, April Galyardt, Allen D. Householder, et al.
New Security Paradigms Workshop (2020), pp. 111-126
Open Access | Times Cited: 14

Risk Homeostasis in Information Security
Karen Renaud, Merrill Warkentin
(2017) Vol. 49, pp. 57-69
Open Access | Times Cited: 13

Review of Human Decision-making during Computer Security Incident Analysis
Jonathan Spring, Phyllis Illari
Digital Threats Research and Practice (2021) Vol. 2, Iss. 2, pp. 1-47
Open Access | Times Cited: 11

Seeking Foundations for the Science of Cyber Security
Shouhuai Xu, Moti Yung, Jingguo Wang
Information Systems Frontiers (2021)
Open Access | Times Cited: 11

Reflecting on Research Practices
Victor Le Pochat
Communications of the ACM (2024) Vol. 67, Iss. 5, pp. 37-39
Open Access | Times Cited: 1

Into the unknown: the need to reframe risk analysis
Andrew Simpson
Journal of Cybersecurity (2024) Vol. 10, Iss. 1
Open Access | Times Cited: 1

Building General Knowledge of Mechanisms in Information Security
Jonathan Spring, Phyllis Illari
Philosophy & Technology (2018) Vol. 32, Iss. 4, pp. 627-659
Open Access | Times Cited: 10

Historical Analysis of Exploit Availability Timelines
Allen D. Householder, Jeff Chrabaszcz, Trent Novelly, et al.
USENIX Security Symposium (2020)
Closed Access | Times Cited: 10

Prudent Design Principles for Information Flow Control
Iulia Bastys, Frank Piessens, Andrei Sabelfeld
(2018), pp. 17-23
Closed Access | Times Cited: 8

Why Jenny can't figure out which of these messages is a covert information operation
Tristan Caulfield, Jonathan Spring, M. Angela Sasse
(2019) Vol. 40, pp. 118-128
Open Access | Times Cited: 6

Evidence-based cybersecurity policy? A meta-review of security control effectiveness
Daniel Woods, Sezaneh Seymour
Journal of Cyber Policy (2023) Vol. 8, Iss. 3, pp. 365-383
Open Access | Times Cited: 2

A Systems Thinking for Cybersecurity Modeling
Dingyu Yan
arXiv (Cornell University) (2020)
Open Access | Times Cited: 5

‘The trivial tickets build the trust’: a co-design approach to understanding security support interactions in a large university
Albesë Demjaha, David Pym, Tristan Caulfield, et al.
Journal of Cybersecurity (2024) Vol. 10, Iss. 1
Open Access

Towards Foundational Security Metrics
Nilofar Mansourzadeh, Anil Somayaji
(2024), pp. 11-19
Closed Access

A refinement to the general mechanistic account
Eric Hatleback, Jonathan Spring
European Journal for Philosophy of Science (2019) Vol. 9, Iss. 2
Open Access | Times Cited: 3

How do professionals assess security risks in practice? An exploratory study
William T. Harris, Moufida Sadok
Security Journal (2023)
Open Access | Times Cited: 1

A cyber-risk framework for coordination of the prevention and preservation of behaviours1
Simon Parkin, Yi Ting Chua
Journal of Computer Security (2022) Vol. 30, Iss. 3, pp. 327-356
Open Access | Times Cited: 2

Towards Scientific Incident Response
Jonathan Spring, David Pym
Lecture notes in computer science (2018), pp. 398-417
Closed Access | Times Cited: 2

Refining the Blunt Instruments of Cybersecurity: A Framework to Coordinate Prevention and Preservation of Behaviours
Simon Parkin, Yi Ting Chua
Lecture notes in computer science (2021), pp. 23-42
Closed Access | Times Cited: 2

Blessed Are The Lawyers, For They Shall Inherit Cybersecurity
Daniel Woods, Aaron Ceross
New Security Paradigms Workshop (2021), pp. 1-12
Open Access | Times Cited: 2

Page 1 - Next Page

Scroll to top