OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Zooming into the pandemic! A forensic analysis of the Zoom Application
Andrew Mahr, Meghan Cichon, Sophia Mateo, et al.
Forensic Science International Digital Investigation (2021) Vol. 36, pp. 301107-301107
Open Access | Times Cited: 57

Showing 26-50 of 57 citing articles:

Learning Effectiveness of Semi Practice Course in Online Learning
Tri Sudarwanto, Eka Hendi Andriansyah, Raya Sulistyowati, et al.
AL-TA LIM (2023) Vol. 30, Iss. 1, pp. 35-47
Open Access | Times Cited: 2

Forensic analysis for multi-platform Cisco Webex
Uk Hur, Giyoon Kim, Soojin Kang, et al.
Forensic Science International Digital Investigation (2023) Vol. 47, pp. 301659-301659
Closed Access | Times Cited: 2

Effectiveness of learning using application zoom theon student learning outcomes during COVID-19 at STKIP Muhammadiyah Sungai Penuh
Nofyta Arlianti, Mira Hastin, Ali Ramatni, et al.
Linguistics and Culture Review (2022) Vol. 6, pp. 308-319
Open Access | Times Cited: 4

Auto-Parser: Android Auto and Apple CarPlay Forensics
Andrew Mahr, Robert Serafin, Cinthya Grajeda, et al.
Springer eBooks (2022), pp. 52-71
Closed Access | Times Cited: 4

Forensic Investigations of Google Meet and Microsoft Teams – Two Popular Conferencing Tools in the Pandemic
M A Hannan Bin Azhar, Jake Timms, Benjamin Tilley
Springer eBooks (2022), pp. 20-34
Closed Access | Times Cited: 3

Forensic investigation of Cisco WebEx desktop client, web, and Android smartphone applications
Zainab Khalid, Farkhund Iqbal, Faouzi Kamoun, et al.
Annals of Telecommunications (2022) Vol. 78, Iss. 3-4, pp. 183-208
Open Access | Times Cited: 3

COVID-19 Pandemi Sürecinde Ortaya Çıkan Yeni Bir Kavram: Zoom Yorgunluğu
Tuğba TURGUT, Sinan Okur
Journal of Humanity and Society (insan & toplum) (2022) Vol. 12, Iss. 3, pp. 47-71
Open Access | Times Cited: 3

E-learning virtual meeting applications: A comparative study from a cybersecurity perspective
Nader Abdel Karim, Ahmed Hussain Ali
Indonesian Journal of Electrical Engineering and Computer Science (2021) Vol. 24, Iss. 2, pp. 1121-1121
Open Access | Times Cited: 4

Securing User Privacy in Cloud-Based Whiteboard Services Against Health Attribute Inference Attacks
Abdur R. Shahid, Ahmed Imteaj
IEEE Transactions on Artificial Intelligence (2024) Vol. 5, Iss. 8, pp. 3872-3885
Closed Access

Investigation of Microsoft Teams and Skype as Distance Education Tools ın Terms of Digital Forensics
Tuğçe Keleş, Yunus Emre Çolak, Nucan Ilhan, et al.
Firat University Journal of Experimental and Computational Engineering (2024) Vol. 3, Iss. 2, pp. 204-215
Open Access

Packet-Level Analysis of Zoom Performance Anomalies
Mehdi Karamollahi, Carey Williamson, Martin Arlitt
(2023)
Closed Access | Times Cited: 1

Memory Forensics of the OpenDaylight Software-Defined Networking (SDN) Controller
Abdullah Alshaya, Adam Kardorff, Christian Facundus, et al.
Proceedings of the 17th International Conference on Availability, Reliability and Security (2023), pp. 1-8
Closed Access | Times Cited: 1

Simulation modeling of Zoom traffic on a campus network: A case study
Mehdi Karamollahi, Carey Williamson, Martin Arlitt
Performance Evaluation (2023) Vol. 162, pp. 102382-102382
Closed Access | Times Cited: 1

Challenges of Managing Information Security during the Pandemic
Emelie Mannebäck, Ali Padyab
Challenges (2021) Vol. 12, Iss. 2, pp. 30-30
Open Access | Times Cited: 3

A Review on Forensic Investigation Analysis in Cloud Computing Environments
R. Sharmikha Sree, K. Raja
2022 1st International Conference on Computational Science and Technology (ICCST) (2022), pp. 1067-1074
Closed Access | Times Cited: 1

Network Forensics in a BYOD Environment
Junias N. Uushona, Victor I. Ndevaetela, Endard T. Toivo, et al.
(2021), pp. 1-5
Closed Access | Times Cited: 1

Penerapan quizizz pada materi hukum pascal dalam meningkatkan respon peserta didik
Zainul Arifin, Mohammad Zaky Tatsar
Bulletin of Educational Management and Innovation (2023) Vol. 1, Iss. 1, pp. 69-80
Open Access

Forensic Analysis of Webex on the iOS Platform
Jiaxuan Zhou, Ümit Karabiyik
(2023), pp. 84-96
Closed Access

The Lived Experiences of Applied Behaviour Analysis (ABA) Therapists Implementing Teletherapy to Children with Autism in Autism Recovery Network Singapore
Vincent Carlo Tabuzo, Bernardita Tiamzon
Cognizance Journal of Multidisciplinary Studies (2023) Vol. 3, Iss. 8, pp. 956-1023
Open Access

Design and Development of Sound and Rhythm Perception Assessment Application for Students with Hearing Impairment
Damri Damri, Safaruddin Safaruddin, Marlina Marlina, et al.
JOIV International Journal on Informatics Visualization (2023) Vol. 7, Iss. 4, pp. 2366-2366
Open Access

Design and Development of Sound and Rhythm Perception Assessment Application for Students with Hearing Impairment
Damri Damri, Safaruddin Safaruddin, Marlina Marlina, et al.
JOIV International Journal on Informatics Visualization (2023) Vol. 7, Iss. 4, pp. 2366-2366
Open Access

Introduction to the Minitrack on IT Governance and its Mechanisms
Samantha Walkow
Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences (2023)
Open Access

Scroll to top