
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Cyber risk and cybersecurity: a systematic review of data availability
Frank Cremer, Barry Sheehan, Michael Fortmann, et al.
The Geneva Papers on Risk and Insurance Issues and Practice (2022) Vol. 47, Iss. 3, pp. 698-736
Open Access | Times Cited: 180
Frank Cremer, Barry Sheehan, Michael Fortmann, et al.
The Geneva Papers on Risk and Insurance Issues and Practice (2022) Vol. 47, Iss. 3, pp. 698-736
Open Access | Times Cited: 180
Showing 76-100 of 180 citing articles:
A Systematic Review of Radio Frequency Threats in IoMT
Irrai Anbu Jayaraj, Bharanidharan Shanmugam, Sami Azam, et al.
Journal of Sensor and Actuator Networks (2022) Vol. 11, Iss. 4, pp. 62-62
Open Access | Times Cited: 7
Irrai Anbu Jayaraj, Bharanidharan Shanmugam, Sami Azam, et al.
Journal of Sensor and Actuator Networks (2022) Vol. 11, Iss. 4, pp. 62-62
Open Access | Times Cited: 7
Structural evaluation of management capability and the mediation role of cybersecurity awareness towards enterprise performance
Chrispus Zacharia Oroni, Xianping Fu
Journal of Data Information and Management (2023) Vol. 5, Iss. 4, pp. 345-361
Closed Access | Times Cited: 3
Chrispus Zacharia Oroni, Xianping Fu
Journal of Data Information and Management (2023) Vol. 5, Iss. 4, pp. 345-361
Closed Access | Times Cited: 3
DDOS attack identification via a silicon photonic Deep Neural Network with 50 GHz input and weight update
Apostolos Tsakyridis, George Giamougiannis, Miltiadis Moralis‐Pegios, et al.
(2023), pp. 1-3
Closed Access | Times Cited: 3
Apostolos Tsakyridis, George Giamougiannis, Miltiadis Moralis‐Pegios, et al.
(2023), pp. 1-3
Closed Access | Times Cited: 3
An Overview of Security Breach Probability Models
Alessandro Mazzoccoli, Maurizio Naldi
Risks (2022) Vol. 10, Iss. 11, pp. 220-220
Open Access | Times Cited: 5
Alessandro Mazzoccoli, Maurizio Naldi
Risks (2022) Vol. 10, Iss. 11, pp. 220-220
Open Access | Times Cited: 5
A Bonus-Malus framework for cyber risk insurance and optimal cybersecurity provisioning
Qikun Xiang, Ariel Neufeld, Gareth W. Peters, et al.
European Actuarial Journal (2023) Vol. 14, Iss. 2, pp. 581-621
Closed Access | Times Cited: 2
Qikun Xiang, Ariel Neufeld, Gareth W. Peters, et al.
European Actuarial Journal (2023) Vol. 14, Iss. 2, pp. 581-621
Closed Access | Times Cited: 2
Cybersecurity in a Large-Scale Research Facility—One Institution’s Approach
David Butcher, Christian J. Brigham, James Berhalter, et al.
Journal of Cybersecurity and Privacy (2023) Vol. 3, Iss. 2, pp. 191-208
Open Access | Times Cited: 2
David Butcher, Christian J. Brigham, James Berhalter, et al.
Journal of Cybersecurity and Privacy (2023) Vol. 3, Iss. 2, pp. 191-208
Open Access | Times Cited: 2
Video Surveillance Device Failure Detection by IoT
Mohana Puneeth, Geetha D. Devanagavi, Nikhath Tabassum
(2023), pp. 1448-1452
Closed Access | Times Cited: 2
Mohana Puneeth, Geetha D. Devanagavi, Nikhath Tabassum
(2023), pp. 1448-1452
Closed Access | Times Cited: 2
A Reflection on Typology and Verification Flaws in consideration of Biocybersecurity/Cyberbiosecurity: Just Another Gap in the Wall
Lucas Potter, Kimberly Mossberg, Xavier‐Lewis Palmer
European Conference on Cyber Warfare and Security (2023) Vol. 22, Iss. 1, pp. 358-365
Open Access | Times Cited: 2
Lucas Potter, Kimberly Mossberg, Xavier‐Lewis Palmer
European Conference on Cyber Warfare and Security (2023) Vol. 22, Iss. 1, pp. 358-365
Open Access | Times Cited: 2
Unravelling the Web of Issues and Challenges in Healthcare Cybersecurity for a Secure Tomorrow
Aisyah Muhd Azri Baptist, Farhanah Abdul Halim, Siti Fatimah Abdillah, et al.
Business and Economic Research (2023) Vol. 13, Iss. 4, pp. 59-59
Open Access | Times Cited: 2
Aisyah Muhd Azri Baptist, Farhanah Abdul Halim, Siti Fatimah Abdillah, et al.
Business and Economic Research (2023) Vol. 13, Iss. 4, pp. 59-59
Open Access | Times Cited: 2
Investigating a Marginalized Business Asset
Laura Ann Jones, Ian McAndrew
Advances in medical technologies and clinical practice book series (2024), pp. 26-49
Closed Access
Laura Ann Jones, Ian McAndrew
Advances in medical technologies and clinical practice book series (2024), pp. 26-49
Closed Access
Business Resilience in a Cyber World
Sharon L. Burton
Advances in business information systems and analytics book series (2024), pp. 81-105
Closed Access
Sharon L. Burton
Advances in business information systems and analytics book series (2024), pp. 81-105
Closed Access
Impact Versus Frequency on Cybersecurity Breach Trends in the Business and Medical Industry to Identify Human Error
Galathara Kahanda, Sasha Rider, Sayantini Mukhopadhyay
Advanced sciences and technologies for security applications (2024), pp. 77-96
Closed Access
Galathara Kahanda, Sasha Rider, Sayantini Mukhopadhyay
Advanced sciences and technologies for security applications (2024), pp. 77-96
Closed Access
Cyber Risk Management: The Impact of Data in the Assessment of Cyber Risk by Cyber Insurers
Elvis Edem Agbadoku
SSRN Electronic Journal (2024)
Closed Access
Elvis Edem Agbadoku
SSRN Electronic Journal (2024)
Closed Access
Analyzing Efficacy and Enhancing Accessibility: A Study of India's National Cyber Crime Reporting Portal in Addressing Financial Cybercrimes
Yogesh Madhukar Jadhav
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT (2024) Vol. 08, Iss. 03, pp. 1-5
Open Access
Yogesh Madhukar Jadhav
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT (2024) Vol. 08, Iss. 03, pp. 1-5
Open Access
Strategic Assessment of Intricacies in Healthcare Cyber Security: Analyzing Distinctive Challenges, Evaluating Their Ramifications on Healthcare Delivery, and Proposing Advanced Mitigation Strategies
Oluwaseun Modupe Alade, Elizabeth A. Amusan, Omotayo Job Ojo
Asian Journal of Research in Computer Science (2024) Vol. 17, Iss. 5, pp. 238-248
Open Access
Oluwaseun Modupe Alade, Elizabeth A. Amusan, Omotayo Job Ojo
Asian Journal of Research in Computer Science (2024) Vol. 17, Iss. 5, pp. 238-248
Open Access
Opportunities and Challenges of Digital Audits and Compliance
Siriyama Kanthi Herath, Laksitha Maheshi Herath, Jae Koo Yoo
Advances in finance, accounting, and economics book series (2024), pp. 1-35
Closed Access
Siriyama Kanthi Herath, Laksitha Maheshi Herath, Jae Koo Yoo
Advances in finance, accounting, and economics book series (2024), pp. 1-35
Closed Access
Exploring the Characteristics of Data Breaches: A Descriptive Analytic Study
Dominik Molitor, Aditya Saharia, Viju Raghupathi, et al.
Journal of Information Security (2024) Vol. 15, Iss. 02, pp. 168-195
Open Access
Dominik Molitor, Aditya Saharia, Viju Raghupathi, et al.
Journal of Information Security (2024) Vol. 15, Iss. 02, pp. 168-195
Open Access
Protecting the Play: An Integrative Review of Cybersecurity in and for Sports Events
Ivano Bongiovanni, David M. Herold, Simon J Wilde
(2024)
Closed Access
Ivano Bongiovanni, David M. Herold, Simon J Wilde
(2024)
Closed Access
PERETASAN SITUS MILIK DEWAN KEHORMATAN PENYELENGGARA PEMILU OLEH H DITINJAU DARI UNDANG-UNDANG NOMOR 11 TAHUN 2008 TENTANG INFORMASI DAN TRANSAKSI ELEKTRONIK
Felicia Shadily, Go Lisanawati, Peter Jeremiah Setiawan
Dialogia Iuridica (2024) Vol. 15, Iss. 2, pp. 053-077
Open Access
Felicia Shadily, Go Lisanawati, Peter Jeremiah Setiawan
Dialogia Iuridica (2024) Vol. 15, Iss. 2, pp. 053-077
Open Access
A Systematic Literature Review: AI, DL and Machine Learning inCyber Risk Management
Ishrag Hamid, MM Hafizur Rahman
Research Square (Research Square) (2024)
Open Access
Ishrag Hamid, MM Hafizur Rahman
Research Square (Research Square) (2024)
Open Access
Threats, Effects, and Awareness of Cybercrime: A Survey
Moulik Singh Arora
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT (2024) Vol. 08, Iss. 05, pp. 1-5
Open Access
Moulik Singh Arora
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT (2024) Vol. 08, Iss. 05, pp. 1-5
Open Access
A Review on Detection of Cybersecurity Threats in Banking Sectors Using Ai Based Risk Assessment
M Lavanya
Deleted Journal (2024) Vol. 20, Iss. 6s, pp. 1359-1365
Open Access
M Lavanya
Deleted Journal (2024) Vol. 20, Iss. 6s, pp. 1359-1365
Open Access
Structural Model for Cyber Risk Loss Distribution of Multi-Tenant Smart Buildings: An Application to the Hospitality Sector
Stefano Chiaradonna, Petar Jevtić, Nicolas Lanchier, et al.
SSRN Electronic Journal (2024)
Closed Access
Stefano Chiaradonna, Petar Jevtić, Nicolas Lanchier, et al.
SSRN Electronic Journal (2024)
Closed Access
Guardian Box through Honeypot Using Shielded Socket for Linux Distribution
G. Uma Maheswari, A. Auroshaa, Anupam Das, et al.
(2024), pp. 1-8
Closed Access
G. Uma Maheswari, A. Auroshaa, Anupam Das, et al.
(2024), pp. 1-8
Closed Access
Exploring ICS/SCADA Network Vulnerabilities
Hala Strohmier, Aaryan R. Londhe, Chris A. Clark, et al.
Lecture notes in computer science (2024), pp. 215-233
Closed Access
Hala Strohmier, Aaryan R. Londhe, Chris A. Clark, et al.
Lecture notes in computer science (2024), pp. 215-233
Closed Access