
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Counterattacking Cyber Threats: A Framework for the Future of Cybersecurity
Muhammad Fakhrul Safitra, Muharman Lubis, Hanif Fakhrurroja
Sustainability (2023) Vol. 15, Iss. 18, pp. 13369-13369
Open Access | Times Cited: 68
Muhammad Fakhrul Safitra, Muharman Lubis, Hanif Fakhrurroja
Sustainability (2023) Vol. 15, Iss. 18, pp. 13369-13369
Open Access | Times Cited: 68
Showing 26-50 of 68 citing articles:
Business Resilience in a Cyber World
Sharon L. Burton
Advances in medical technologies and clinical practice book series (2024), pp. 1-25
Closed Access | Times Cited: 2
Sharon L. Burton
Advances in medical technologies and clinical practice book series (2024), pp. 1-25
Closed Access | Times Cited: 2
Resilience in the Context of Cyber Security: A Review of the Fundamental Concepts and Relevance
Misael Sousa de Araujo, Bruna Aparecida Souza Machado, Francisco Uchôa Passos
Applied Sciences (2024) Vol. 14, Iss. 5, pp. 2116-2116
Open Access | Times Cited: 2
Misael Sousa de Araujo, Bruna Aparecida Souza Machado, Francisco Uchôa Passos
Applied Sciences (2024) Vol. 14, Iss. 5, pp. 2116-2116
Open Access | Times Cited: 2
Securing the Supply Chain
Siva Raja Sindiramutty, Chong Eng Tan, Wei Wei Goh, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 300-365
Closed Access | Times Cited: 2
Siva Raja Sindiramutty, Chong Eng Tan, Wei Wei Goh, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 300-365
Closed Access | Times Cited: 2
A Novel Framework for Real-Time IP Reputation Validation Using Artificial Intelligence
NW Chanaka Lasantha, Ruvan Abeysekara, MWP Maduranga
International Journal of Wireless and Microwave Technologies (2024) Vol. 14, Iss. 2, pp. 1-16
Open Access | Times Cited: 2
NW Chanaka Lasantha, Ruvan Abeysekara, MWP Maduranga
International Journal of Wireless and Microwave Technologies (2024) Vol. 14, Iss. 2, pp. 1-16
Open Access | Times Cited: 2
Cybersecurity threats in tourism and hospitality: perspectives from tourists engaging with sharing economy services
Zahed Ghaderi, Luc Béal, L’Hocine Houanti
Current Issues in Tourism (2024), pp. 1-16
Closed Access | Times Cited: 2
Zahed Ghaderi, Luc Béal, L’Hocine Houanti
Current Issues in Tourism (2024), pp. 1-16
Closed Access | Times Cited: 2
TOWARDS IMPROVED THREAT MITIGATION IN DIGITAL ENVIRONMENTS: A COMPREHENSIVE FRAMEWORK FOR CYBERSECURITY ENHANCEMENT
Hewa Balisane, Ehigiator Egho-Promise, Emmanuel Lyada, et al.
International Journal of Research -GRANTHAALAYAH (2024) Vol. 12, Iss. 5
Open Access | Times Cited: 2
Hewa Balisane, Ehigiator Egho-Promise, Emmanuel Lyada, et al.
International Journal of Research -GRANTHAALAYAH (2024) Vol. 12, Iss. 5
Open Access | Times Cited: 2
Exploring gender dynamics in cybersecurity education: A self-determination theory and social cognitive theory perspective
Saneesh P. Francis, Vysakh Kani Kolil, Vipin Pavithran, et al.
Computers & Security (2024) Vol. 144, pp. 103968-103968
Closed Access | Times Cited: 2
Saneesh P. Francis, Vysakh Kani Kolil, Vipin Pavithran, et al.
Computers & Security (2024) Vol. 144, pp. 103968-103968
Closed Access | Times Cited: 2
İNSAN KAYNAKLARI YÖNETİMİ ENTEGRASYONUNUN KAVRAMSAL ANALİZİ ARACILIĞIYLA BİLGİ GÜVENLİĞİ RİSK YÖNETİMİNİN GELİŞTİRİLMESİ
Filiz Mızrak
Yönetim Bilimleri Dergisi (2024) Vol. 22, Iss. 51, pp. 96-118
Open Access | Times Cited: 1
Filiz Mızrak
Yönetim Bilimleri Dergisi (2024) Vol. 22, Iss. 51, pp. 96-118
Open Access | Times Cited: 1
Secure Over-the-Air (OTA) Update Mechanisms for ADAS
Alex Mathew
International Research Journal of Innovations in Engineering and Technology (2024) Vol. 08, Iss. 04, pp. 34-38
Open Access | Times Cited: 1
Alex Mathew
International Research Journal of Innovations in Engineering and Technology (2024) Vol. 08, Iss. 04, pp. 34-38
Open Access | Times Cited: 1
Enhancing the Efficiency of a Cybersecurity Operations Center Using Biomimetic Algorithms Empowered by Deep Q-Learning
Rodrigo Olivares, Omar Salinas, Camilo Ravelo, et al.
Biomimetics (2024) Vol. 9, Iss. 6, pp. 307-307
Open Access | Times Cited: 1
Rodrigo Olivares, Omar Salinas, Camilo Ravelo, et al.
Biomimetics (2024) Vol. 9, Iss. 6, pp. 307-307
Open Access | Times Cited: 1
Cybersecurity Resilience for Business: A Comprehensive Model for Proactive Defense and Swift Recovery
Anas Ghassan Kanaan, Ahmad AL-Hawamleh, Almuhannad Alorfi, et al.
(2024), pp. 1-7
Closed Access | Times Cited: 1
Anas Ghassan Kanaan, Ahmad AL-Hawamleh, Almuhannad Alorfi, et al.
(2024), pp. 1-7
Closed Access | Times Cited: 1
Enhancing Cybersecurity Through Compliance and Auditing: A Strategic Approach to Resilience
Dani Itani, Rania Itani, Ahmed Ae Eltweri, et al.
(2024), pp. 1-10
Closed Access | Times Cited: 1
Dani Itani, Rania Itani, Ahmed Ae Eltweri, et al.
(2024), pp. 1-10
Closed Access | Times Cited: 1
The evolutıon of dıgıtal leadershıp: content and sentıment analysıs of the New York Tımes coverage
Yavuz Selim Balcıoğlu, Melike Artar
Current Psychology (2024) Vol. 43, Iss. 28, pp. 23953-23970
Open Access | Times Cited: 1
Yavuz Selim Balcıoğlu, Melike Artar
Current Psychology (2024) Vol. 43, Iss. 28, pp. 23953-23970
Open Access | Times Cited: 1
The role of smart technology, managerial initiatives and human factors on sustainable manufacturing: a case study of Indonesian oil and gas workers
Ilyas Masudin, Dian Palupi Restuputri, Fita Amalia, et al.
Ergonomics (2024), pp. 1-25
Closed Access | Times Cited: 1
Ilyas Masudin, Dian Palupi Restuputri, Fita Amalia, et al.
Ergonomics (2024), pp. 1-25
Closed Access | Times Cited: 1
Behind the digital veil: decoding the influence of HR training on information security awareness in Saudi Arabia
Ahmed M. Asfahani
Cogent Business & Management (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 1
Ahmed M. Asfahani
Cogent Business & Management (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 1
Security challenges in cloud computing: A comprehensive analysis
Janet Julia Ang'udi
World Journal of Advanced Engineering Technology and Sciences (2023) Vol. 10, Iss. 2, pp. 155-181
Open Access | Times Cited: 3
Janet Julia Ang'udi
World Journal of Advanced Engineering Technology and Sciences (2023) Vol. 10, Iss. 2, pp. 155-181
Open Access | Times Cited: 3
Hybrid threats and their impact on the performance of the business environment
Miroslava Barkóciová, Bohuslava Mihalčová, Filip Černák, et al.
Journal of Entrepreneurship and Sustainability Issues (2023) Vol. 11, Iss. 2, pp. 466-479
Open Access | Times Cited: 2
Miroslava Barkóciová, Bohuslava Mihalčová, Filip Černák, et al.
Journal of Entrepreneurship and Sustainability Issues (2023) Vol. 11, Iss. 2, pp. 466-479
Open Access | Times Cited: 2
Tackling security and privacy challenges in the realm of big data analytics
Janet Ngesa
World Journal of Advanced Research and Reviews (2023) Vol. 21, Iss. 2, pp. 552-576
Open Access | Times Cited: 2
Janet Ngesa
World Journal of Advanced Research and Reviews (2023) Vol. 21, Iss. 2, pp. 552-576
Open Access | Times Cited: 2
Business Resilience in a Cyber World
Sharon L. Burton
Advances in business information systems and analytics book series (2024), pp. 81-105
Closed Access
Sharon L. Burton
Advances in business information systems and analytics book series (2024), pp. 81-105
Closed Access
Industry 4.0 and Beyond
Neda Azizi, Tony Jan, Yuan Miao, et al.
Advances in business information systems and analytics book series (2024), pp. 229-243
Closed Access
Neda Azizi, Tony Jan, Yuan Miao, et al.
Advances in business information systems and analytics book series (2024), pp. 229-243
Closed Access
Lessons from the Past: A Historical Literature Review on Cyber Resilience
Muhammad Fakhrul Safitra, Muharman Lubis, Hanif Fakhrurroja, et al.
Lecture notes in networks and systems (2024), pp. 47-56
Closed Access
Muhammad Fakhrul Safitra, Muharman Lubis, Hanif Fakhrurroja, et al.
Lecture notes in networks and systems (2024), pp. 47-56
Closed Access
Adeshina Fatai, Fatai Adelani, Tosin Olatunde, et al.
International Journal of Frontiers in Engineering and Technology Research (2024) Vol. 6, Iss. 2
Open Access
Theoretical perspectives on cybersecurity challenges in critical water infrastructure: Insights from Africa and the United States
Fatai Adeshina Adelani, Tosin Michael Olatunde, Johnson Sunday Oliha
International Journal of Frontiers in Engineering and Technology Research (2024) Vol. 6, Iss. 2, pp. 001-007
Open Access
Fatai Adeshina Adelani, Tosin Michael Olatunde, Johnson Sunday Oliha
International Journal of Frontiers in Engineering and Technology Research (2024) Vol. 6, Iss. 2, pp. 001-007
Open Access
The State of Cyber Resilience: Advancements and Future Directions
Muhammad Fakhrul Safitra, Muharman Lubis, Hanif Fakhrurroja
Lecture notes in networks and systems (2024), pp. 353-363
Closed Access
Muhammad Fakhrul Safitra, Muharman Lubis, Hanif Fakhrurroja
Lecture notes in networks and systems (2024), pp. 353-363
Closed Access
Assessing Network Accounting Management Approaches in the Infrastructure and Information Technology Sector: A Case Study in Indonesia
Muharman Lubis, Muhammad Fakhrul Safitra, Hanif Fakhrurroja, et al.
Lecture notes in networks and systems (2024), pp. 273-284
Closed Access
Muharman Lubis, Muhammad Fakhrul Safitra, Hanif Fakhrurroja, et al.
Lecture notes in networks and systems (2024), pp. 273-284
Closed Access