OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

The Cybersecurity Dynamics Way of Thinking and Landscape
Shouhuai Xu
(2020), pp. 69-80
Closed Access | Times Cited: 28

Showing 1-25 of 28 citing articles:

Characterizing the Evolution of Psychological Factors Exploited by Malicious Emails
Theodore Longtchi, Shouhuai Xu
Lecture notes in computer science (2025), pp. 158-178
Closed Access | Times Cited: 1

AutoCRAT: Automatic Cumulative Reconstruction of Alert Trees
Eric Ficke, Raymond M. Bateman, Shouhuai Xu
Lecture notes in computer science (2025), pp. 273-294
Closed Access | Times Cited: 1

Internet-Based Social Engineering Psychology, Attacks, and Defenses: A Survey
Theodore Longtchi, Rosana Montañez Rodriguez, Laith Al-Shawaf, et al.
Proceedings of the IEEE (2024) Vol. 112, Iss. 3, pp. 210-246
Closed Access | Times Cited: 7

A Framework for Predicting Data Breach Risk: Leveraging Dependence to Cope With Sparsity
Zijian Fang, Maochao Xu, Shouhuai Xu, et al.
IEEE Transactions on Information Forensics and Security (2021) Vol. 16, pp. 2186-2201
Open Access | Times Cited: 34

Comparative Analysis of Machine Learning Models for Intrusion Detection in Internet of Things Networks Using the RT-IoT2022 Dataset
Gregorius Airlangga
MALCOM Indonesian Journal of Machine Learning and Computer Science (2024) Vol. 4, Iss. 2, pp. 656-662
Open Access | Times Cited: 4

Beyond firewalls: The future of cybersecurity research
Sina Ahmadi
(2025) Vol. 02, Iss. 01, pp. 01-02
Closed Access

Beyond Firewalls: The Future of Cybersecurity Research
Sina Ahmadi
SSRN Electronic Journal (2025)
Closed Access

Preventive Self-defense Under Cyber Epidemic Attacks: A Dynamical Perspective
Dingyu Yan, Zheng He, Jiawei Qin, et al.
Arabian Journal for Science and Engineering (2025)
Closed Access

Smart Home Cyber Insurance Pricing
Xiaoyu Zhang, Maochao Xu, Shouhuai Xu
Lecture notes in computer science (2025), pp. 313-333
Closed Access

An Architecture of Adaptive Cognitive Digital Twins for Resilient Healthcare Infrastructures and Services
Shouhuai Xu, Sandeep Pirbhulal, Habtamu Abie
Communications in computer and information science (2025), pp. 3-22
Closed Access

Transitioning from Reactive to Proactive Cyber Security Using Machine Learning
Yogeshwari, Kumudavalli, Aruna Devi, et al.
Deleted Journal (2024) Vol. 2, Iss. 08, pp. 2601-2605
Open Access | Times Cited: 2

Cyber Attacks Against Enterprise Networks: Characterization, Modeling and Forecasting
Zheyuan Sun, Maochao Xu, Kristin M. Schweitzer, et al.
Lecture notes in computer science (2023), pp. 60-81
Closed Access | Times Cited: 6

SARR: A Cybersecurity Metrics and Quantification Framework (Keynote)
Shouhuai Xu
Lecture notes in computer science (2021), pp. 3-17
Closed Access | Times Cited: 14

How Do Organizations Seek Cyber Assurance? Investigations on the Adoption of the Common Criteria and Beyond
Nan Sun, Chang‐Tsun Li, Hin Chan, et al.
IEEE Access (2022) Vol. 10, pp. 71749-71763
Open Access | Times Cited: 9

Cyber Social Engineering Kill Chain
Rosana Montañez Rodriguez, Shouhuai Xu
Lecture notes in computer science (2022), pp. 487-504
Closed Access | Times Cited: 8

Using Event-Based Method to Estimate Cybersecurity Equilibrium
Zhaofeng Liu, Ren Zheng, Wenlian Lu, et al.
IEEE/CAA Journal of Automatica Sinica (2020) Vol. 8, Iss. 2, pp. 455-467
Closed Access | Times Cited: 12

Seeking Foundations for the Science of Cyber Security
Shouhuai Xu, Moti Yung, Jingguo Wang
Information Systems Frontiers (2021)
Open Access | Times Cited: 11

Quantifying Cybersecurity Effectiveness of Dynamic Network Diversity
Huashan Chen, Hasan Çam, Shouhuai Xu
IEEE Transactions on Dependable and Secure Computing (2021) Vol. 19, Iss. 6, pp. 3804-3821
Open Access | Times Cited: 11

Characterizing Privacy Risks in Healthcare IoT Systems
Shuai Li, Alessio Baiocco, Shouhuai Xu
Communications in computer and information science (2024), pp. 51-68
Closed Access | Times Cited: 1

Preventive and Reactive Cyber Defense Dynamics With Ergodic Time-Dependent Parameters is Globally Attractive
Yujuan Han, Wenlian Lu, Shouhuai Xu
IEEE Transactions on Network Science and Engineering (2021) Vol. 8, Iss. 3, pp. 2517-2532
Open Access | Times Cited: 8

Transitioning from Reactive to Proactive Cyber Security Using Machine Learning
Yogeshwari, Kumudavalli, Aruna Devi, et al.
Deleted Journal (2024) Vol. 2, Iss. 08, pp. 2532-2536
Open Access

Towards Automated Cyber Range Design: Characterizing and Matching Demands to Supplies
Ekzhin Ear, Jose L. C. Remy, Shouhuai Xu
(2023), pp. 329-334
Closed Access | Times Cited: 1

Complexity Science and Cyber Operations: A Literature Survey
Briant Becote, Bhaskar Prasad Rimal
Complex System Modeling and Simulation (2023) Vol. 3, Iss. 4, pp. 327-342
Open Access | Times Cited: 1

Characterizing and Leveraging Granger Causality in Cybersecurity: Framework and Case Study
Van Trieu‐Do, Richard Garcia-Lebron, Maochao Xu, et al.
ICST Transactions on Security and Safety (2021) Vol. 7, Iss. 25, pp. 169912-169912
Open Access | Times Cited: 2

Page 1 - Next Page

Scroll to top