OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A literature review of financial losses statistics for cyber security and future trend
Md Haris Uddin Sharif, Mehmood Ali Mohammed
World Journal of Advanced Research and Reviews (2022) Vol. 15, Iss. 1, pp. 138-156
Open Access | Times Cited: 55

Showing 1-25 of 55 citing articles:

Digital Transformation and Cybersecurity Challenges for Businesses Resilience: Issues and Recommendations
Saqib Saeed, Salha A. Altamimi, Norah A. Alkayyal, et al.
Sensors (2023) Vol. 23, Iss. 15, pp. 6666-6666
Open Access | Times Cited: 114

Online Payment Fraud Detection Model Using Machine Learning Techniques
Abdulwahab Ali Almazroi, Nasir Ayub
IEEE Access (2023) Vol. 11, pp. 137188-137203
Open Access | Times Cited: 24

A typology of cybersecurity behavior among knowledge workers
Dennik Baltuttis, Timm Teubner, Marc T. P. Adam
Computers & Security (2024) Vol. 140, pp. 103741-103741
Open Access | Times Cited: 11

A COMPREHENSIVE REVIEW OF ETHICAL PRACTICES IN BANKING AND FINANCE
Ejuma Martha Adaga, Zainab Efe Egieya, Sarah Kuzankah Ewuga, et al.
Finance & Accounting Research Journal (2024) Vol. 6, Iss. 1, pp. 1-20
Open Access | Times Cited: 9

The Digital Silk Road: “Tech-Diplomacy” as a Paradigm for Understanding Technological Adoption and Emerging Digital Regulations in MENA
Andrew Dahdal, Adel Abdel Ghafar
Asian Journal of Law and Society (2025), pp. 1-26
Closed Access | Times Cited: 1

The smart detection of neuro-pathological effects of alzheimer patients using neural networks
Bharatwaja Namatherdhala, Ashween Ganesh, Noori Memon, et al.
(2023), pp. 858-863
Closed Access | Times Cited: 11

Artificial Intelligence and Large Language Models in Advancing Cyber Threat Intelligence: A Systematic Literature Review
Hilalah Alturkistani, Suriayati Chuprat
Research Square (Research Square) (2024)
Open Access | Times Cited: 4

A Comprehensive Review of Block Chain Based Multi Factor Authentication
Abdul Rahman Khan, Parma Nand, Bharat Bhushan, et al.
Lecture notes in networks and systems (2025), pp. 713-726
Closed Access

Feature engineering based intelligent intrusion detection system for IoT network security
Sapna Sadhwani, Asmi Sriwastawa, Raja Muthalagu, et al.
International Journal of Machine Learning and Cybernetics (2025)
Closed Access

The Essentials of Privacy and Cybersecurity in the Digital Economy
Parichat Jaipong, Watthanasakon Rakpathum
IGI Global eBooks (2025), pp. 1-30
Closed Access

Enhancing Cyber Forensics with AI and Machine Learning: A Study on Automated Threat Analysis and Classification
Bandr Fakiha
International Journal of Safety and Security Engineering (2023) Vol. 13, Iss. 4, pp. 701-707
Open Access | Times Cited: 10

A Load Balancing Architecture to Improve the Security of Cloud Computing in the Disease Management Centers
Ashween Ganesh, Rakesh Ramakrishnan, Adithya Kiran Sekar, et al.
(2023), pp. 1299-1305
Closed Access | Times Cited: 10

Neural Networks Toward Cybersecurity: Domain Map Analysis of State-of-the-Art Challenges
Ruslan Shevchuk, Vasyl Martsenyuk
IEEE Access (2024) Vol. 12, pp. 81265-81280
Open Access | Times Cited: 3

An exploratory data analysis of malware/ransomware cyberattacks: insights from an extensive cyber loss dataset
Farshid Javadnejad, Ahmed M. Abdelmagid, C. Ariel Pinto, et al.
Enterprise Information Systems (2024) Vol. 18, Iss. 9
Closed Access | Times Cited: 3

Wave Hedges distance-based feature fusion and hybrid optimization-enabled deep learning for cyber credit card fraud detection
Venkata Ratnam Ganji, Aparna Chaparala
Knowledge and Information Systems (2024) Vol. 66, Iss. 11, pp. 7005-7030
Closed Access | Times Cited: 3

Penterep: Comprehensive penetration testing with adaptable interactive checklists
Willi Lazarov, Pavel Šeda, Zdeněk Martinásek, et al.
Computers & Security (2025), pp. 104399-104399
Open Access

Artificial Intelligence and Cybersecurity: Challenges, Opportunities, and Defensive Techniques
Edidiong Akpabio, Supriya Narad
Lecture notes in networks and systems (2025), pp. 291-302
Closed Access

An Analysis of Cyber Threats and the Protective Role of Cyber Insurance in the US Market
Zia Muhammad, Jeremy Straub
Communications in computer and information science (2025), pp. 259-272
Closed Access

Impact of Artificial Intelligence on the Automation of Digital Health System
Mehmood Ali Mohammed, Murtuza Ali Mohammed, Vazeer Ali Mohammed
International Journal of Software Engineering & Applications (2022) Vol. 13, Iss. 6, pp. 23-29
Open Access | Times Cited: 15

An unsupervised approach for the detection of zero‐day distributed denial of service attacks in Internet of Things networks
Monika Roopak, Simon Parkinson, Gui Yun Tian, et al.
IET Networks (2024) Vol. 13, Iss. 5-6, pp. 513-527
Open Access | Times Cited: 2

Integrated Methodology for Information Security Risk Management using ISO 27005:2018 and NIST SP 800-30 for Insurance Sector
Arief Prabawa Putra, Benfano Soewito
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 4
Open Access | Times Cited: 6

The Impact of Cyber Security on Preventing and Mitigating Electronic Crimes in the Jordanian Banking Sector
Тамер Бани Амер, Mohammad Ibrahim Ahmed Al-Omar
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 8
Open Access | Times Cited: 6

Effective Secure Data Agreement Approach-based cloud storage for a healthcare organization
Ramya Thatikonda, Adithya Padthe, Srinivas Aditya Vaddadi, et al.
International Journal of Smart Sensor and Adhoc Network (2023), pp. 60-70
Open Access | Times Cited: 5

Cyber-Security and the Changing Landscape of Critical National Infrastructure: State and Non-state Cyber-Attacks on Organisations, Systems and Services
Joseph Rees, Christopher J. Rees
Advanced sciences and technologies for security applications (2023), pp. 67-89
Closed Access | Times Cited: 4

Page 1 - Next Page

Scroll to top