OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Cyber risk and cybersecurity: a systematic review of data availability
Frank Cremer, Barry Sheehan, Michael Fortmann, et al.
The Geneva Papers on Risk and Insurance Issues and Practice (2022) Vol. 47, Iss. 3, pp. 698-736
Open Access | Times Cited: 180

Showing 76-100 of 180 citing articles:

A Systematic Review of Radio Frequency Threats in IoMT
Irrai Anbu Jayaraj, Bharanidharan Shanmugam, Sami Azam, et al.
Journal of Sensor and Actuator Networks (2022) Vol. 11, Iss. 4, pp. 62-62
Open Access | Times Cited: 7

Structural evaluation of management capability and the mediation role of cybersecurity awareness towards enterprise performance
Chrispus Zacharia Oroni, Xianping Fu
Journal of Data Information and Management (2023) Vol. 5, Iss. 4, pp. 345-361
Closed Access | Times Cited: 3

DDOS attack identification via a silicon photonic Deep Neural Network with 50 GHz input and weight update
Apostolos Tsakyridis, George Giamougiannis, Miltiadis Moralis‐Pegios, et al.
(2023), pp. 1-3
Closed Access | Times Cited: 3

An Overview of Security Breach Probability Models
Alessandro Mazzoccoli, Maurizio Naldi
Risks (2022) Vol. 10, Iss. 11, pp. 220-220
Open Access | Times Cited: 5

A Bonus-Malus framework for cyber risk insurance and optimal cybersecurity provisioning
Qikun Xiang, Ariel Neufeld, Gareth W. Peters, et al.
European Actuarial Journal (2023) Vol. 14, Iss. 2, pp. 581-621
Closed Access | Times Cited: 2

Cybersecurity in a Large-Scale Research Facility—One Institution’s Approach
David Butcher, Christian J. Brigham, James Berhalter, et al.
Journal of Cybersecurity and Privacy (2023) Vol. 3, Iss. 2, pp. 191-208
Open Access | Times Cited: 2

Video Surveillance Device Failure Detection by IoT
Mohana Puneeth, Geetha D. Devanagavi, Nikhath Tabassum
(2023), pp. 1448-1452
Closed Access | Times Cited: 2

A Reflection on Typology and Verification Flaws in consideration of Biocybersecurity/Cyberbiosecurity: Just Another Gap in the Wall
Lucas Potter, Kimberly Mossberg, Xavier‐Lewis Palmer
European Conference on Cyber Warfare and Security (2023) Vol. 22, Iss. 1, pp. 358-365
Open Access | Times Cited: 2

Unravelling the Web of Issues and Challenges in Healthcare Cybersecurity for a Secure Tomorrow
Aisyah Muhd Azri Baptist, Farhanah Abdul Halim, Siti Fatimah Abdillah, et al.
Business and Economic Research (2023) Vol. 13, Iss. 4, pp. 59-59
Open Access | Times Cited: 2

Investigating a Marginalized Business Asset
Laura Ann Jones, Ian McAndrew
Advances in medical technologies and clinical practice book series (2024), pp. 26-49
Closed Access

Business Resilience in a Cyber World
Sharon L. Burton
Advances in business information systems and analytics book series (2024), pp. 81-105
Closed Access

Impact Versus Frequency on Cybersecurity Breach Trends in the Business and Medical Industry to Identify Human Error
Galathara Kahanda, Sasha Rider, Sayantini Mukhopadhyay
Advanced sciences and technologies for security applications (2024), pp. 77-96
Closed Access

Cyber Risk Management: The Impact of Data in the Assessment of Cyber Risk by Cyber Insurers
Elvis Edem Agbadoku
SSRN Electronic Journal (2024)
Closed Access

Analyzing Efficacy and Enhancing Accessibility: A Study of India's National Cyber Crime Reporting Portal in Addressing Financial Cybercrimes
Yogesh Madhukar Jadhav
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT (2024) Vol. 08, Iss. 03, pp. 1-5
Open Access

Strategic Assessment of Intricacies in Healthcare Cyber Security: Analyzing Distinctive Challenges, Evaluating Their Ramifications on Healthcare Delivery, and Proposing Advanced Mitigation Strategies
Oluwaseun Modupe Alade, Elizabeth A. Amusan, Omotayo Job Ojo
Asian Journal of Research in Computer Science (2024) Vol. 17, Iss. 5, pp. 238-248
Open Access

Opportunities and Challenges of Digital Audits and Compliance
Siriyama Kanthi Herath, Laksitha Maheshi Herath, Jae Koo Yoo
Advances in finance, accounting, and economics book series (2024), pp. 1-35
Closed Access

Exploring the Characteristics of Data Breaches: A Descriptive Analytic Study
Dominik Molitor, Aditya Saharia, Viju Raghupathi, et al.
Journal of Information Security (2024) Vol. 15, Iss. 02, pp. 168-195
Open Access

Protecting the Play: An Integrative Review of Cybersecurity in and for Sports Events
Ivano Bongiovanni, David M. Herold, Simon J Wilde
(2024)
Closed Access

A Systematic Literature Review: AI, DL and Machine Learning inCyber Risk Management
Ishrag Hamid, MM Hafizur Rahman
Research Square (Research Square) (2024)
Open Access

Threats, Effects, and Awareness of Cybercrime: A Survey
Moulik Singh Arora
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT (2024) Vol. 08, Iss. 05, pp. 1-5
Open Access

Structural Model for Cyber Risk Loss Distribution of Multi-Tenant Smart Buildings: An Application to the Hospitality Sector
Stefano Chiaradonna, Petar Jevtić, Nicolas Lanchier, et al.
SSRN Electronic Journal (2024)
Closed Access

Guardian Box through Honeypot Using Shielded Socket for Linux Distribution
G. Uma Maheswari, A. Auroshaa, Anupam Das, et al.
(2024), pp. 1-8
Closed Access

Exploring ICS/SCADA Network Vulnerabilities
Hala Strohmier, Aaryan R. Londhe, Chris A. Clark, et al.
Lecture notes in computer science (2024), pp. 215-233
Closed Access

Scroll to top