
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Online social networks security and privacy: comprehensive review and analysis
Ankit Kumar Jain, Somya Ranjan Sahoo, Jyoti Kaubiyal
Complex & Intelligent Systems (2021) Vol. 7, Iss. 5, pp. 2157-2177
Open Access | Times Cited: 172
Ankit Kumar Jain, Somya Ranjan Sahoo, Jyoti Kaubiyal
Complex & Intelligent Systems (2021) Vol. 7, Iss. 5, pp. 2157-2177
Open Access | Times Cited: 172
Showing 26-50 of 172 citing articles:
Social media impact on societal security
Huda Hassan Alnaqbi, E. A. Ali
Frontiers in Sociology (2025) Vol. 10
Open Access
Huda Hassan Alnaqbi, E. A. Ali
Frontiers in Sociology (2025) Vol. 10
Open Access
Detecting and localizing multiple forgeries with TransGAN
Upasana Singh, Sandeep Rathor, Manoj Kumar
Iran Journal of Computer Science (2025)
Closed Access
Upasana Singh, Sandeep Rathor, Manoj Kumar
Iran Journal of Computer Science (2025)
Closed Access
Innovative Application of Bayesian Algorithm in Network Security Risk Assessment Model
Haosheng Li, Qubing Ren, Wei Chen, et al.
Lecture notes in networks and systems (2025), pp. 412-424
Closed Access
Haosheng Li, Qubing Ren, Wei Chen, et al.
Lecture notes in networks and systems (2025), pp. 412-424
Closed Access
Survey on Security Models Employed in Blockchain Based Applications
Lochana Mahajan, Sridaran Rajagopal, Rujuta Shah
Communications in computer and information science (2025), pp. 3-25
Closed Access
Lochana Mahajan, Sridaran Rajagopal, Rujuta Shah
Communications in computer and information science (2025), pp. 3-25
Closed Access
Privacy preservation of Internet of Things–integrated social networks: a survey and future challenges
Sara Salim, Nour Moustafa, Benjamin Turnbull
International Journal of Web Information Systems (2025)
Closed Access
Sara Salim, Nour Moustafa, Benjamin Turnbull
International Journal of Web Information Systems (2025)
Closed Access
Awareness of the Right to Be Forgotten Among Users of Professional Social Media Platforms: A Sample from the Arab Region
Laroussi Chemlali, Leila Benseddik
Studies in systems, decision and control (2025), pp. 575-585
Closed Access
Laroussi Chemlali, Leila Benseddik
Studies in systems, decision and control (2025), pp. 575-585
Closed Access
Arming text-based gender inference with partition membership filtering and feature selection for online social network users
Önder Çoban, Şeyma Yücel Altay
The Computer Journal (2025)
Closed Access
Önder Çoban, Şeyma Yücel Altay
The Computer Journal (2025)
Closed Access
Critical Review of Different Approaches of Multiparty Privacy Protection Methods and Effectiveness on Social Media
P. Jayaprabha, K. Paulose Jacob
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 4
Closed Access
P. Jayaprabha, K. Paulose Jacob
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 4
Closed Access
Raising Awareness of Location Information Vulnerabilities in Social Media Photos using LLMs
Y.Q. Ma, Shiquan Zhang, Dongju Yang, et al.
(2025), pp. 1-14
Closed Access
Y.Q. Ma, Shiquan Zhang, Dongju Yang, et al.
(2025), pp. 1-14
Closed Access
Economic espionage via fake social media profiles in the UK: professional workers awareness and resilience
Mark Button, David Shepherd, Jeyong Jung
Security Journal (2025) Vol. 38, Iss. 1
Open Access
Mark Button, David Shepherd, Jeyong Jung
Security Journal (2025) Vol. 38, Iss. 1
Open Access
Managing Privacy and Security in Research
Andi Asrifan, Supaprawat Siripipatthanakul, Mohammed H. Al Aqad, et al.
IGI Global eBooks (2025), pp. 151-182
Closed Access
Andi Asrifan, Supaprawat Siripipatthanakul, Mohammed H. Al Aqad, et al.
IGI Global eBooks (2025), pp. 151-182
Closed Access
A Study on the Evolution of Digital Media Technologies and Their Effect on Information Security Practices
Huilong Li
International Journal of Computational and Experimental Science and Engineering (2025) Vol. 11, Iss. 2
Open Access
Huilong Li
International Journal of Computational and Experimental Science and Engineering (2025) Vol. 11, Iss. 2
Open Access
Exploring Ethical Dimensions of AI in Tourism
Álvaro Hernández-Tamurejo, Alicia Orea-Giner, Sudhir Rana
Contributions to management science (2025), pp. 179-200
Closed Access
Álvaro Hernández-Tamurejo, Alicia Orea-Giner, Sudhir Rana
Contributions to management science (2025), pp. 179-200
Closed Access
Methods and Tools for Personal Data Protection in Big Data: Analysis of Uzbekistan’s Legal Framework
Sardor Mamanazarov
International Journal of Law and Policy (2025) Vol. 3, Iss. 4, pp. 20-40
Closed Access
Sardor Mamanazarov
International Journal of Law and Policy (2025) Vol. 3, Iss. 4, pp. 20-40
Closed Access
Evolution of the Internet from Web 1.0 to Metaverse: The Good, The Bad and The Ugly
Keshab Nath
(2022)
Open Access | Times Cited: 16
Keshab Nath
(2022)
Open Access | Times Cited: 16
A comprehensive survey on online social networks security and privacy issues: Threats, machine learning‐based solutions, and open challenges
Munmun Bhattacharya, Sandip Roy, Samiran Chattopadhyay, et al.
Security and Privacy (2022) Vol. 6, Iss. 1
Closed Access | Times Cited: 16
Munmun Bhattacharya, Sandip Roy, Samiran Chattopadhyay, et al.
Security and Privacy (2022) Vol. 6, Iss. 1
Closed Access | Times Cited: 16
CNFRD: A Few-Shot Rumor Detection Framework via Capsule Network for COVID-19
Danroujing Chen, Xiaoliang Chen, Peng Lu, et al.
International Journal of Intelligent Systems (2023) Vol. 2023, pp. 1-21
Open Access | Times Cited: 9
Danroujing Chen, Xiaoliang Chen, Peng Lu, et al.
International Journal of Intelligent Systems (2023) Vol. 2023, pp. 1-21
Open Access | Times Cited: 9
Validation of cyber security behaviour among adolescents at Malaysia university: Revisiting gender as a role
Ting Tin Tin, Kar Man Cheah, Jie Xin Khiew, et al.
International Journal of Innovative Research and Scientific Studies (2024) Vol. 7, Iss. 1, pp. 127-137
Open Access | Times Cited: 3
Ting Tin Tin, Kar Man Cheah, Jie Xin Khiew, et al.
International Journal of Innovative Research and Scientific Studies (2024) Vol. 7, Iss. 1, pp. 127-137
Open Access | Times Cited: 3
Distributed privacy preservation for online social network using flexible clustering and whale optimization algorithm
Nilesh Uke, Sharayu Lokhande, Preeti Kale, et al.
Cluster Computing (2024) Vol. 27, Iss. 5, pp. 5995-6012
Closed Access | Times Cited: 3
Nilesh Uke, Sharayu Lokhande, Preeti Kale, et al.
Cluster Computing (2024) Vol. 27, Iss. 5, pp. 5995-6012
Closed Access | Times Cited: 3
Artificial intelligence-based approach to detect malicious users using deep learning and optimization techniques
Sailaja Terumalasetti, S R Reeja
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 3
Sailaja Terumalasetti, S R Reeja
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 3
A Comprehensive Analysis of Privacy-Preserving Solutions Developed for Online Social Networks
Abdul Majeed, Safiullah Khan, Seong Oun Hwang
Electronics (2022) Vol. 11, Iss. 13, pp. 1931-1931
Open Access | Times Cited: 14
Abdul Majeed, Safiullah Khan, Seong Oun Hwang
Electronics (2022) Vol. 11, Iss. 13, pp. 1931-1931
Open Access | Times Cited: 14
Comprehensive review on Parenting and Technology: Opportunities and Challenges in the 21st Century
Ibrahim Kurt
European Journal of Social Sciences Education and Research (2023) Vol. 10, Iss. 2, pp. 1-14
Open Access | Times Cited: 8
Ibrahim Kurt
European Journal of Social Sciences Education and Research (2023) Vol. 10, Iss. 2, pp. 1-14
Open Access | Times Cited: 8
Enhanced Clustering Based OSN Privacy Preservation to Ensure k-Anonymity, t-Closeness, l-Diversity, and Balanced Privacy Utility
Rupali Gangarde, Amit Sharma, Ambika Pawar
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 75, Iss. 1, pp. 2171-2190
Open Access | Times Cited: 7
Rupali Gangarde, Amit Sharma, Ambika Pawar
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 75, Iss. 1, pp. 2171-2190
Open Access | Times Cited: 7
Text Sentiment Analysis Based on Multi-Layer Bi-Directional LSTM with a Trapezoidal Structure
Zhengfang He
Intelligent Automation & Soft Computing (2023) Vol. 37, Iss. 1, pp. 639-654
Open Access | Times Cited: 7
Zhengfang He
Intelligent Automation & Soft Computing (2023) Vol. 37, Iss. 1, pp. 639-654
Open Access | Times Cited: 7
A Systematic Mapping Study on Social Network Privacy: Threats and Solutions
Andrey Rodrigues, Maria Lúcia Bento Villela, Eduardo Feitosa
ACM Computing Surveys (2024) Vol. 56, Iss. 7, pp. 1-29
Closed Access | Times Cited: 2
Andrey Rodrigues, Maria Lúcia Bento Villela, Eduardo Feitosa
ACM Computing Surveys (2024) Vol. 56, Iss. 7, pp. 1-29
Closed Access | Times Cited: 2