
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Cyber risk and cybersecurity: a systematic review of data availability
Frank Cremer, Barry Sheehan, Michael Fortmann, et al.
The Geneva Papers on Risk and Insurance Issues and Practice (2022) Vol. 47, Iss. 3, pp. 698-736
Open Access | Times Cited: 180
Frank Cremer, Barry Sheehan, Michael Fortmann, et al.
The Geneva Papers on Risk and Insurance Issues and Practice (2022) Vol. 47, Iss. 3, pp. 698-736
Open Access | Times Cited: 180
Showing 1-25 of 180 citing articles:
Electric vehicle charging technologies, infrastructure expansion, grid integration strategies, and their role in promoting sustainable e-mobility
Arvind R. Singh, Pradeep Vishnuram, A. Sureshkumar, et al.
Alexandria Engineering Journal (2024) Vol. 105, pp. 300-330
Open Access | Times Cited: 23
Arvind R. Singh, Pradeep Vishnuram, A. Sureshkumar, et al.
Alexandria Engineering Journal (2024) Vol. 105, pp. 300-330
Open Access | Times Cited: 23
Transformation of Crimes (Cybercrimes) in Digital Age
Naeem AllahRakha
International Journal of Law and Policy (2024) Vol. 2, Iss. 2
Open Access | Times Cited: 15
Naeem AllahRakha
International Journal of Law and Policy (2024) Vol. 2, Iss. 2
Open Access | Times Cited: 15
The Impact of Digital Transformation on Business Models and Competitive Advantage
Kresnawidiansyah Agustian, Endang Saefuddin Mubarok, Agustian Zen, et al.
Technology and Society Perspectives (TACIT) (2023) Vol. 1, Iss. 2, pp. 79-93
Open Access | Times Cited: 37
Kresnawidiansyah Agustian, Endang Saefuddin Mubarok, Agustian Zen, et al.
Technology and Society Perspectives (TACIT) (2023) Vol. 1, Iss. 2, pp. 79-93
Open Access | Times Cited: 37
Between a rock and a hard(ening) place: Cyber insurance in the ransomware era
Gareth Mott, Sarah Turner, Jason R. C. Nurse, et al.
Computers & Security (2023) Vol. 128, pp. 103162-103162
Open Access | Times Cited: 35
Gareth Mott, Sarah Turner, Jason R. C. Nurse, et al.
Computers & Security (2023) Vol. 128, pp. 103162-103162
Open Access | Times Cited: 35
Securing Industrial Control Systems: Components, Cyber Threats, and Machine Learning-Driven Defense Strategies
Mary Nankya, Robin Chataut, Robert Akl
Sensors (2023) Vol. 23, Iss. 21, pp. 8840-8840
Open Access | Times Cited: 27
Mary Nankya, Robin Chataut, Robert Akl
Sensors (2023) Vol. 23, Iss. 21, pp. 8840-8840
Open Access | Times Cited: 27
The intertwined effects of digital literacy, agile mindset on design thinking skill and management control competency: Insights from Thai young accountants
Narinthon Imjai, Watcharawat Promma, Berto Usman, et al.
International Journal of Information Management Data Insights (2024) Vol. 4, Iss. 2, pp. 100244-100244
Open Access | Times Cited: 8
Narinthon Imjai, Watcharawat Promma, Berto Usman, et al.
International Journal of Information Management Data Insights (2024) Vol. 4, Iss. 2, pp. 100244-100244
Open Access | Times Cited: 8
The Quantum Technology Open Master: widening access to the quantum industry
Simon Goorney, Matoula Sarantinou, Jacob Sherson
EPJ Quantum Technology (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 7
Simon Goorney, Matoula Sarantinou, Jacob Sherson
EPJ Quantum Technology (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 7
CVE2ATT&CK: BERT-Based Mapping of CVEs to MITRE ATT&CK Techniques
Octavian Grigorescu, Andreea Nica, Mihai Dascălu, et al.
Algorithms (2022) Vol. 15, Iss. 9, pp. 314-314
Open Access | Times Cited: 31
Octavian Grigorescu, Andreea Nica, Mihai Dascălu, et al.
Algorithms (2022) Vol. 15, Iss. 9, pp. 314-314
Open Access | Times Cited: 31
A new lightweight data security system for data security in the cloud computing
Shameer Mohammed, S. Nanthini, Nagalla Balakrishna, et al.
Measurement Sensors (2023) Vol. 29, pp. 100856-100856
Open Access | Times Cited: 20
Shameer Mohammed, S. Nanthini, Nagalla Balakrishna, et al.
Measurement Sensors (2023) Vol. 29, pp. 100856-100856
Open Access | Times Cited: 20
An application of DEMATEL and fuzzy DEMATEL to evaluate the interaction of safety management system and cybersecurity management system in automated vehicles
Marzana Khatun, Florence F. Wagner, Rolf Jung, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 124, pp. 106566-106566
Open Access | Times Cited: 17
Marzana Khatun, Florence F. Wagner, Rolf Jung, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 124, pp. 106566-106566
Open Access | Times Cited: 17
Prospects of Cybersecurity in Smart Cities
Fernando Almeida
Future Internet (2023) Vol. 15, Iss. 9, pp. 285-285
Open Access | Times Cited: 17
Fernando Almeida
Future Internet (2023) Vol. 15, Iss. 9, pp. 285-285
Open Access | Times Cited: 17
An innovative GPT-based open-source intelligence using historical cyber incident reports
Fahim Sufi
Natural Language Processing Journal (2024) Vol. 7, pp. 100074-100074
Open Access | Times Cited: 6
Fahim Sufi
Natural Language Processing Journal (2024) Vol. 7, pp. 100074-100074
Open Access | Times Cited: 6
Unravelling the three lines model in cybersecurity: a systematic literature review
Bert Valkenburg, Ivano Bongiovanni
Computers & Security (2024) Vol. 139, pp. 103708-103708
Open Access | Times Cited: 5
Bert Valkenburg, Ivano Bongiovanni
Computers & Security (2024) Vol. 139, pp. 103708-103708
Open Access | Times Cited: 5
Cambodian Green Economy Transition: Background, Progress, and SWOT Analysis
Puthearath Chan
World (2024) Vol. 5, Iss. 2, pp. 413-452
Open Access | Times Cited: 5
Puthearath Chan
World (2024) Vol. 5, Iss. 2, pp. 413-452
Open Access | Times Cited: 5
A taxonomy of cyber risk taxonomies
Giovanni Rabitti, Amir Khorrami Chokami, Patrick Coyle, et al.
Risk Analysis (2024) Vol. 45, Iss. 2, pp. 376-386
Open Access | Times Cited: 5
Giovanni Rabitti, Amir Khorrami Chokami, Patrick Coyle, et al.
Risk Analysis (2024) Vol. 45, Iss. 2, pp. 376-386
Open Access | Times Cited: 5
Comparative Analysis of EU-Based Cybersecurity Skills Frameworks
Fernando Almeida
Computers & Security (2025), pp. 104329-104329
Open Access
Fernando Almeida
Computers & Security (2025), pp. 104329-104329
Open Access
QoS-Aware cloud security using lightweight EfficientNet with Adaptive Sparse Bayesian Optimization
J Vinothini, Srie Vidhya Janani E
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 2
Closed Access
J Vinothini, Srie Vidhya Janani E
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 2
Closed Access
Mitigating Cybercrimes in E-Government Services: A Systematic Review and Bibliometric Analysis
Shahrukh Mushtaq, Mahmood Shah
Digital (2025) Vol. 5, Iss. 1, pp. 3-3
Open Access
Shahrukh Mushtaq, Mahmood Shah
Digital (2025) Vol. 5, Iss. 1, pp. 3-3
Open Access
United Nations and Beyond: Legal Strategies for Defending Critical Energy Infrastructure Against Cyber Attacks
Ashish Saraswat, Garima Tiwari
Studies in computational intelligence (2025), pp. 291-307
Closed Access
Ashish Saraswat, Garima Tiwari
Studies in computational intelligence (2025), pp. 291-307
Closed Access
Smart Home Cyber Insurance Pricing
Xiaoyu Zhang, Maochao Xu, Shouhuai Xu
Lecture notes in computer science (2025), pp. 313-333
Closed Access
Xiaoyu Zhang, Maochao Xu, Shouhuai Xu
Lecture notes in computer science (2025), pp. 313-333
Closed Access
Applications of cyber insurance in smart cities: a systematic literature review
Carolina Cardoso Novo, Mírian Picinini Méxas, Lídia Ângulo Meza
International Journal of Information Security (2025) Vol. 24, Iss. 2
Closed Access
Carolina Cardoso Novo, Mírian Picinini Méxas, Lídia Ângulo Meza
International Journal of Information Security (2025) Vol. 24, Iss. 2
Closed Access
Driving Technological Innovation for a Resilient Cybersecurity Landscape
Muritala Aminu, Sunday Anawansedo, Yusuf Ademola Sodiq, et al.
International Journal of Latest Technology in Engineering Management & Applied Science (2024) Vol. XIII, Iss. IV, pp. 126-133
Open Access | Times Cited: 4
Muritala Aminu, Sunday Anawansedo, Yusuf Ademola Sodiq, et al.
International Journal of Latest Technology in Engineering Management & Applied Science (2024) Vol. XIII, Iss. IV, pp. 126-133
Open Access | Times Cited: 4
Mapping the landscape of government data breaches: A bibliometric analysis of literature from 2006 to 2023
Supardi Hamid, Mohammad Nurul Huda
Social Sciences & Humanities Open (2024) Vol. 11, pp. 101234-101234
Open Access | Times Cited: 4
Supardi Hamid, Mohammad Nurul Huda
Social Sciences & Humanities Open (2024) Vol. 11, pp. 101234-101234
Open Access | Times Cited: 4
Development of Cyber Security Awareness and Education Framework
Amir M. Sharif, Jaflah Al-Ammary
International Journal of Computing and Digital Systems (2025) Vol. 17, Iss. 1, pp. 1-13
Open Access
Amir M. Sharif, Jaflah Al-Ammary
International Journal of Computing and Digital Systems (2025) Vol. 17, Iss. 1, pp. 1-13
Open Access