OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Social Engineering Attacks: Recent Advances and Challenges
Nikol Mashtalyar, Uwera Nina Ntaganzwa, Thales Santos, et al.
Lecture notes in computer science (2021), pp. 417-431
Closed Access | Times Cited: 28

Showing 1-25 of 28 citing articles:

A review on social spam detection: Challenges, open issues, and future directions
Sanjeev Rao, Anil Kumar Verma, Tarunpreet Bhatia
Expert Systems with Applications (2021) Vol. 186, pp. 115742-115742
Closed Access | Times Cited: 139

Mitigation strategies against the phishing attacks: A systematic literature review
Bilal Naqvi, Kseniia Perova, Ali Farooq, et al.
Computers & Security (2023) Vol. 132, pp. 103387-103387
Open Access | Times Cited: 45

Navigating the nexus of security and privacy in modern financial technologies
Florence Olweny
GSC Advanced Research and Reviews (2024) Vol. 18, Iss. 2, pp. 167-197
Open Access | Times Cited: 18

Characterizing the Evolution of Psychological Factors Exploited by Malicious Emails
Theodore Longtchi, Shouhuai Xu
Lecture notes in computer science (2025), pp. 158-178
Closed Access | Times Cited: 1

Detecting and Mitigating the Dissemination of Fake News: Challenges and Future Research Opportunities
Wajiha Shahid, Bahman Jamshidi, Saqib Hakak, et al.
IEEE Transactions on Computational Social Systems (2022) Vol. 11, Iss. 4, pp. 4649-4662
Open Access | Times Cited: 33

Internet-Based Social Engineering Psychology, Attacks, and Defenses: A Survey
Theodore Longtchi, Rosana Montañez Rodriguez, Laith Al-Shawaf, et al.
Proceedings of the IEEE (2024) Vol. 112, Iss. 3, pp. 210-246
Closed Access | Times Cited: 7

Strengthening Cybersecurity: The Influence of Student Behavior, Perceived Factors, and Mitigating Strategies on Phishing Attack Perception
Saleh Alqahtani, Priyadarsi Nanda, Manoranjan Mohanty
Lecture notes in computer science (2025), pp. 313-329
Closed Access

Survey on Joint Paradigm of 5G and SDN Emerging Mobile Technologies: Architecture, Security, Challenges and Research Directions
Syed Hussain Ali Kazmi, Faizan Qamar, Rosilah Hassan, et al.
Research Square (Research Square) (2022)
Open Access | Times Cited: 21

An Investigation of Cyber-Attacks and Security Mechanisms for Connected and Autonomous Vehicles
Sandeep Gupta, Carsten Maple, Roberto Passerone
IEEE Access (2023) Vol. 11, pp. 90641-90669
Open Access | Times Cited: 12

Detection of phishing addresses and pages with a data set balancing approach by generative adversarial network (GAN) and convolutional neural network (CNN) optimized with swarm intelligence
Somayyeh Jafari, Nasrin Aghaee‐Maybodi
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 11
Closed Access | Times Cited: 3

Ransomware-Resilient Self-Healing XML Documents
Mahmoud Al-Dwairi, Ahmed S. Shatnawi, Osama Al-Khaleel, et al.
Future Internet (2022) Vol. 14, Iss. 4, pp. 115-115
Open Access | Times Cited: 13

Cybercrime on a Global Scale: Trends, Policies, and Cybersecurity Strategies
Vishalkumar Ravindrakumar Gajjar, Hamed Taherdoost
(2024), pp. 668-676
Closed Access | Times Cited: 2

Employee behavior: the psychological gateway for cyberattacks
Rahel Aschwanden, Claude Messner, Bettina Höchli, et al.
Organizational Cybersecurity Journal Practice Process and People (2024) Vol. 4, Iss. 1, pp. 32-50
Open Access | Times Cited: 1

An investigation of cyber-attacks and security mechanisms for connected and autonomous vehicles
Sandeep K. Gupta, Carsten Maple, Roberto Passerone
(2023)
Open Access | Times Cited: 2

Understanding Customer Perception of Cyber Attacks
Jean Ebuzor
Advances in hospitality, tourism and the services industry (AHTSI) book series (2024), pp. 83-111
Closed Access

The Importance of Cyber Security – Self-Assessment of Students from Bosnia and Herzegovina, Serbia and Montenegro
Lamija Silajdžić, Anida Dudić
Deleted Journal (2024) Vol. 7, Iss. 2, pp. 96-112
Closed Access

Blockchain Based Email Security to Mitigate Phishing Attack
Othman Omran Khalifa, Tengku Hanis Sofea Binti Tengku Nor Effendy, Muhammed Zaharadeen Ahmed, et al.
Asian Journal of Electrical and Electronic Engineering. (2024) Vol. 4, Iss. 2, pp. 77-86
Closed Access

An investigation of cyber-attacks and security mechanisms for connected and autonomous vehicles
Sandeep K. Gupta, Carsten Maple, Roberto Passerone
(2023)
Open Access | Times Cited: 1

PERTAHANAN PENCEGAHAN SERANGAN SOCIAL ENGINEERING MENGGUNAKAN TWO FACTOR AUTHENTICATION (2FA) BERBASIS SMS (SHORT MESSAGE SYSTEM)
Slamet Slamet
Jurnal Spirit STMIK Yadika Journal of Computing and Cybernetic System (2023) Vol. 14, Iss. 2
Open Access | Times Cited: 1

NEURAL NETWORK METHODS FOR RECOGNIZING SPEECH EMOTIONS TO COUNTER FRAUD IN TELECOMMUNICATION SYSTEMS
Andrey Filimonov, Aleksey Osipov, Е. В. Плешакова, et al.
Voprosy kiberbezopasnosti (2022), Iss. 6(52), pp. 83-92
Open Access | Times Cited: 1

Page 1 - Next Page

Scroll to top