OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Cyber risk and cybersecurity: a systematic review of data availability
Frank Cremer, Barry Sheehan, Michael Fortmann, et al.
The Geneva Papers on Risk and Insurance Issues and Practice (2022) Vol. 47, Iss. 3, pp. 698-736
Open Access | Times Cited: 180

Showing 1-25 of 180 citing articles:

Electric vehicle charging technologies, infrastructure expansion, grid integration strategies, and their role in promoting sustainable e-mobility
Arvind R. Singh, Pradeep Vishnuram, A. Sureshkumar, et al.
Alexandria Engineering Journal (2024) Vol. 105, pp. 300-330
Open Access | Times Cited: 23

Transformation of Crimes (Cybercrimes) in Digital Age
Naeem AllahRakha
International Journal of Law and Policy (2024) Vol. 2, Iss. 2
Open Access | Times Cited: 15

The Impact of Digital Transformation on Business Models and Competitive Advantage
Kresnawidiansyah Agustian, Endang Saefuddin Mubarok, Agustian Zen, et al.
Technology and Society Perspectives (TACIT) (2023) Vol. 1, Iss. 2, pp. 79-93
Open Access | Times Cited: 37

Between a rock and a hard(ening) place: Cyber insurance in the ransomware era
Gareth Mott, Sarah Turner, Jason R. C. Nurse, et al.
Computers & Security (2023) Vol. 128, pp. 103162-103162
Open Access | Times Cited: 35

Securing Industrial Control Systems: Components, Cyber Threats, and Machine Learning-Driven Defense Strategies
Mary Nankya, Robin Chataut, Robert Akl
Sensors (2023) Vol. 23, Iss. 21, pp. 8840-8840
Open Access | Times Cited: 27

The intertwined effects of digital literacy, agile mindset on design thinking skill and management control competency: Insights from Thai young accountants
Narinthon Imjai, Watcharawat Promma, Berto Usman, et al.
International Journal of Information Management Data Insights (2024) Vol. 4, Iss. 2, pp. 100244-100244
Open Access | Times Cited: 8

The Quantum Technology Open Master: widening access to the quantum industry
Simon Goorney, Matoula Sarantinou, Jacob Sherson
EPJ Quantum Technology (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 7

CVE2ATT&CK: BERT-Based Mapping of CVEs to MITRE ATT&CK Techniques
Octavian Grigorescu, Andreea Nica, Mihai Dascălu, et al.
Algorithms (2022) Vol. 15, Iss. 9, pp. 314-314
Open Access | Times Cited: 31

A new lightweight data security system for data security in the cloud computing
Shameer Mohammed, S. Nanthini, Nagalla Balakrishna, et al.
Measurement Sensors (2023) Vol. 29, pp. 100856-100856
Open Access | Times Cited: 20

An application of DEMATEL and fuzzy DEMATEL to evaluate the interaction of safety management system and cybersecurity management system in automated vehicles
Marzana Khatun, Florence F. Wagner, Rolf Jung, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 124, pp. 106566-106566
Open Access | Times Cited: 17

Prospects of Cybersecurity in Smart Cities
Fernando Almeida
Future Internet (2023) Vol. 15, Iss. 9, pp. 285-285
Open Access | Times Cited: 17

An innovative GPT-based open-source intelligence using historical cyber incident reports
Fahim Sufi
Natural Language Processing Journal (2024) Vol. 7, pp. 100074-100074
Open Access | Times Cited: 6

Unravelling the three lines model in cybersecurity: a systematic literature review
Bert Valkenburg, Ivano Bongiovanni
Computers & Security (2024) Vol. 139, pp. 103708-103708
Open Access | Times Cited: 5

Cambodian Green Economy Transition: Background, Progress, and SWOT Analysis
Puthearath Chan
World (2024) Vol. 5, Iss. 2, pp. 413-452
Open Access | Times Cited: 5

A taxonomy of cyber risk taxonomies
Giovanni Rabitti, Amir Khorrami Chokami, Patrick Coyle, et al.
Risk Analysis (2024) Vol. 45, Iss. 2, pp. 376-386
Open Access | Times Cited: 5

Comparative Analysis of EU-Based Cybersecurity Skills Frameworks
Fernando Almeida
Computers & Security (2025), pp. 104329-104329
Open Access

QoS-Aware cloud security using lightweight EfficientNet with Adaptive Sparse Bayesian Optimization
J Vinothini, Srie Vidhya Janani E
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 2
Closed Access

United Nations and Beyond: Legal Strategies for Defending Critical Energy Infrastructure Against Cyber Attacks
Ashish Saraswat, Garima Tiwari
Studies in computational intelligence (2025), pp. 291-307
Closed Access

Ethical Considerations in ACTA

IGI Global eBooks (2025), pp. 305-318
Closed Access

Smart Home Cyber Insurance Pricing
Xiaoyu Zhang, Maochao Xu, Shouhuai Xu
Lecture notes in computer science (2025), pp. 313-333
Closed Access

Applications of cyber insurance in smart cities: a systematic literature review
Carolina Cardoso Novo, Mírian Picinini Méxas, Lídia Ângulo Meza
International Journal of Information Security (2025) Vol. 24, Iss. 2
Closed Access

Driving Technological Innovation for a Resilient Cybersecurity Landscape
Muritala Aminu, Sunday Anawansedo, Yusuf Ademola Sodiq, et al.
International Journal of Latest Technology in Engineering Management & Applied Science (2024) Vol. XIII, Iss. IV, pp. 126-133
Open Access | Times Cited: 4

Mapping the landscape of government data breaches: A bibliometric analysis of literature from 2006 to 2023
Supardi Hamid, Mohammad Nurul Huda
Social Sciences & Humanities Open (2024) Vol. 11, pp. 101234-101234
Open Access | Times Cited: 4

Development of Cyber Security Awareness and Education Framework
Amir M. Sharif, Jaflah Al-Ammary
International Journal of Computing and Digital Systems (2025) Vol. 17, Iss. 1, pp. 1-13
Open Access

Page 1 - Next Page

Scroll to top