OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Review of Human Decision-making during Computer Security Incident Analysis
Jonathan Spring, Phyllis Illari
Digital Threats Research and Practice (2021) Vol. 2, Iss. 2, pp. 1-47
Open Access | Times Cited: 11

Showing 11 citing articles:

CRUSOE: A toolset for cyber situational awareness and decision support in incident handling
Martin Husák, Lukáš Sadlek, Stanislav Špaček, et al.
Computers & Security (2022) Vol. 115, pp. 102609-102609
Open Access | Times Cited: 24

Intelligent Process Automation and Business Continuity: Areas for Future Research
José Cascais Brás, Rúben Pereira, Sérgio Moro
Information (2023) Vol. 14, Iss. 2, pp. 122-122
Open Access | Times Cited: 13

Requirements for Playbook-Assisted Cyber Incident Response, Reporting and Automation
Mehdi Akbari Gurabi, Lasse Nitz, Andrej Bregar, et al.
Digital Threats Research and Practice (2024) Vol. 5, Iss. 3, pp. 1-11
Open Access | Times Cited: 1

Procedures for Digital Forensics and Incident Response on Including Data Integrity Constraints on Solid-State Drives (SSD) - A Literature Review
Abdul Shareef Pallivalappil, S. N. Jagadeesha
International Journal of Case Studies in Business IT and Education (2022), pp. 328-350
Open Access | Times Cited: 6

Understanding How National CSIRTs Evaluate Cyber Incident Response Tools and Data: Findings from Focus Group Discussions
Sharifah Roziah Binti Mohd Kassim, Shujun Li, Budi Arief
Digital Threats Research and Practice (2023) Vol. 4, Iss. 3, pp. 1-24
Open Access | Times Cited: 3

Recommending Similar Devices in Close Proximity for Network Security Management
Vladimír Bouček, Martin Husák
(2023), pp. 481-484
Open Access | Times Cited: 2

Construction and Analysis of Intelligent Analysis and Disposal Model for Internet Security Events in Power System
Zhenhong Zhang, Jian Hu, Feilu Hang, et al.
Scalable Computing Practice and Experience (2024) Vol. 25, Iss. 4
Open Access

A Novel Socio-Technical Framework for Enhancing Cyber Crisis Management Capabilities
Prabaswari, Yusuf Ali, Rudy AG Gultom, et al.
International Journal of Safety and Security Engineering (2024) Vol. 14, Iss. 4, pp. 1181-1193
Open Access

On Collaboration and Automation in the Context of Threat Detection and Response with Privacy-Preserving Features
Lasse Nitz, Mehdi Akbari Gurabi, Milan Čermák, et al.
Digital Threats Research and Practice (2024)
Open Access

Improving Cybersecurity Incident Analysis Workflow with Analytical Provenance
Vít Rusňák, Lenka Janeckova, Filip Drgon, et al.
2020 24th International Conference Information Visualisation (IV) (2022), pp. 300-306
Closed Access

Page 1

Scroll to top