OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Security Smells in Ansible and Chef Scripts
Akond Rahman, Md Rayhanur Rahman, Chris Parnin, et al.
ACM Transactions on Software Engineering and Methodology (2021) Vol. 30, Iss. 1, pp. 1-31
Closed Access | Times Cited: 53

Showing 1-25 of 53 citing articles:

Security Misconfigurations in Open Source Kubernetes Manifests: An Empirical Study
Akond Rahman, Shazibul Islam Shamim, Dibyendu Brinto Bose, et al.
ACM Transactions on Software Engineering and Methodology (2023) Vol. 32, Iss. 4, pp. 1-36
Open Access | Times Cited: 22

The do’s and don’ts of infrastructure code: A systematic gray literature review
Indika Kumara, Martín Garriga, Angel Urbano Romeu, et al.
Information and Software Technology (2021) Vol. 137, pp. 106593-106593
Open Access | Times Cited: 38

Smelly variables in ansible infrastructure code
Ruben Opdebeeck, Ahmed Zerouali, Coen De Roover
(2022)
Open Access | Times Cited: 23

Detecting and Characterizing Propagation of Security Weaknesses in Puppet-based infrastructure Management
Akond Rahman, Chris Parnin
IEEE Transactions on Software Engineering (2023), pp. 1-18
Open Access | Times Cited: 11

A systematic literature review on Android-specific smells
Zhiqiang Wu, Xin Chen, Scott Uk-Jin Lee
Journal of Systems and Software (2023) Vol. 201, pp. 111677-111677
Closed Access | Times Cited: 10

Come for syntax, stay for speed, write secure code: an empirical study of security weaknesses in Julia programs
Yue Zhang, Justin Murphy, Akond Rahman
Empirical Software Engineering (2025) Vol. 30, Iss. 2
Open Access

Towards understanding code review practices for infrastructure-as-code: An empirical study on OpenStack projects
Narjes Bessghaier, Ali Ouni, Mohammed Sayagh, et al.
Empirical Software Engineering (2025) Vol. 30, Iss. 3
Closed Access

Towards Reliable Infrastructure as Code
Daniel Sokolowski, Guido Salvaneschi
(2023), pp. 318-321
Closed Access | Times Cited: 8

Automated Infrastructure as Code Program Testing
Daniel Sokolowski, David Spielmann, Guido Salvaneschi
IEEE Transactions on Software Engineering (2024) Vol. 50, Iss. 6, pp. 1585-1599
Closed Access | Times Cited: 3

TerraMetrics: An Open Source Tool for Infrastructure-as-Code (IaC) Quality Metrics in Terraform
Mahi Begoug, Moataz Chouchen, Ali Ouni
(2024), pp. 450-454
Open Access | Times Cited: 3

Scaling Automated Programming Assessment Systems
Igor Mekterović, Ljiljana Brkić, Marko Horvat
Electronics (2023) Vol. 12, Iss. 4, pp. 942-942
Open Access | Times Cited: 7

As Code Testing: Characterizing Test Quality in Open Source Ansible Development
Mohammad Mehedi Hassan, Akond Rahman
(2022)
Closed Access | Times Cited: 12

Fine-Grained Just-In-Time Defect Prediction at the Block Level in Infrastructure-as-Code (IaC)
Mahi Begoug, Moataz Chouchen, Ali Ouni, et al.
(2024), pp. 100-112
Closed Access | Times Cited: 2

Different Kind of Smells: Security Smells in Infrastructure as Code Scripts
Akond Rahman, Laurie Williams
IEEE Security & Privacy (2021) Vol. 19, Iss. 3, pp. 33-41
Closed Access | Times Cited: 15

Static Analysis of Infrastructure as Code: a Survey
Michele Chiari, Michele De Pascalis, Matteo Pradella
(2022) Vol. 170, pp. 218-225
Open Access | Times Cited: 11

FindICI: Using machine learning to detect linguistic inconsistencies between code and natural language descriptions in infrastructure-as-code
Nemania Borovits, Indika Kumara, Dario Di Nucci, et al.
Empirical Software Engineering (2022) Vol. 27, Iss. 7
Open Access | Times Cited: 10

Secrets Revealed in Container Images: An Internet-wide Study on Occurrence and Impact
Markus Dahlmanns, Constantin Sander, R Decker, et al.
(2023)
Open Access | Times Cited: 6

Andromeda: A Dataset of Ansible Galaxy Roles and Their Evolution
Ruben Opdebeeck, Ahmed Zerouali, Coen De Roover
(2021), pp. 580-584
Open Access | Times Cited: 13

Leveraging Practitioners’ Feedback to Improve a Security Linter
Sofia Reis, Rui Abreu, Marcelo d’Amorim, et al.
(2022)
Open Access | Times Cited: 9

Testing practices for infrastructure as code
Mohammed Mehedi Hasan, Farzana Ahamed Bhuiyan, Akond Rahman
(2020), pp. 7-12
Closed Access | Times Cited: 12

SoK: Static Configuration Analysis in Infrastructure as Code Scripts
Pandu Ranga Reddy Konala, Vimal Kumar, David Bainbridge
(2023), pp. 281-288
Closed Access | Times Cited: 4

Polyglot Code Smell Detection for Infrastructure as Code with GLITCH
Nuno Saavedra, João Gonçalves, Miguel Henriques, et al.
2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE) (2023), pp. 2042-2045
Open Access | Times Cited: 4

Page 1 - Next Page

Scroll to top