
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Cybersecurity in Digital Transformation
Dietmar P. F. Möller
Advances in information security (2023), pp. 1-70
Closed Access | Times Cited: 22
Dietmar P. F. Möller
Advances in information security (2023), pp. 1-70
Closed Access | Times Cited: 22
Showing 22 citing articles:
Machine learning in cybersecurity: A review of threat detection and defense mechanisms
Ugochukwu Ikechukwu Okoli, Ogugua Chimezie, Adebunmi Okechukwu Adewusi, et al.
World Journal of Advanced Research and Reviews (2024) Vol. 21, Iss. 1, pp. 2286-2295
Open Access | Times Cited: 46
Ugochukwu Ikechukwu Okoli, Ogugua Chimezie, Adebunmi Okechukwu Adewusi, et al.
World Journal of Advanced Research and Reviews (2024) Vol. 21, Iss. 1, pp. 2286-2295
Open Access | Times Cited: 46
Enhancing Cybersecurity through AI and ML: Strategies, Challenges, and Future Directions
Maryam Roshanaei, Mahir R. Khan, Natalie N. Sylvester
Journal of Information Security (2024) Vol. 15, Iss. 03, pp. 320-339
Open Access | Times Cited: 10
Maryam Roshanaei, Mahir R. Khan, Natalie N. Sylvester
Journal of Information Security (2024) Vol. 15, Iss. 03, pp. 320-339
Open Access | Times Cited: 10
Understanding Digital Transformation in Creative and Cultural Industries: A Review
Luigi Nasta
(2025), pp. 7-22
Closed Access
Luigi Nasta
(2025), pp. 7-22
Closed Access
DIGITAL TECHNOLOGIES IN ADVANCING THE GREEN ECONOMY OPPORTUNITIES FOR GLOBAL BUSINESS AND FINANCIAL STABILITY
Oksana Desyatnyuk, Olеna Ptashchеnko
Baltic Journal of Economic Studies (2025) Vol. 11, Iss. 1, pp. 78-85
Open Access
Oksana Desyatnyuk, Olеna Ptashchеnko
Baltic Journal of Economic Studies (2025) Vol. 11, Iss. 1, pp. 78-85
Open Access
Implementation and Enhancement of Endogenous Security Mechanisms in Photovoltaic Data Storage and Transmission
B. Vamsi Krishna, Sathvik Bagam, R Jayasri, et al.
Journal of Machine and Computing (2025), pp. 968-983
Closed Access
B. Vamsi Krishna, Sathvik Bagam, R Jayasri, et al.
Journal of Machine and Computing (2025), pp. 968-983
Closed Access
Towards Improved Vulnerability Management in Digital Environments: A Comprehensive Framework for Cyber Security Enhancement
Ehigiator Egho-Promise, Emmanuel Lyada, Folayo Aina
International Research Journal of Computer Science (2024) Vol. 11, Iss. 05, pp. 441-449
Open Access | Times Cited: 3
Ehigiator Egho-Promise, Emmanuel Lyada, Folayo Aina
International Research Journal of Computer Science (2024) Vol. 11, Iss. 05, pp. 441-449
Open Access | Times Cited: 3
Guardians of the Web: The Evolution and Future of Website Information Security
Md Saiful Islam
(2024)
Open Access | Times Cited: 1
Md Saiful Islam
(2024)
Open Access | Times Cited: 1
Data Analytics, Digital Transformation, and Cybersecurity Perspectives in Healthcare
Kousik Barik, Sanjay Misra, Sabarathinam Chockalingam, et al.
Communications in computer and information science (2024), pp. 71-89
Closed Access | Times Cited: 1
Kousik Barik, Sanjay Misra, Sabarathinam Chockalingam, et al.
Communications in computer and information science (2024), pp. 71-89
Closed Access | Times Cited: 1
Transforming Cybersecurity Dynamics: Enhanced Self-Play Reinforcement Learning in Intrusion Detection and Prevention System
Aws Naser Jaber
2022 IEEE International Systems Conference (SysCon) (2024) Vol. 24, pp. 1-8
Closed Access | Times Cited: 1
Aws Naser Jaber
2022 IEEE International Systems Conference (SysCon) (2024) Vol. 24, pp. 1-8
Closed Access | Times Cited: 1
Data Science Advancements in Healthcare, Education, and Cities
Virendra Singh Kushwah, Jyoti Parashar, Partibha Dabas, et al.
Advances in medical technologies and clinical practice book series (2024), pp. 17-36
Closed Access | Times Cited: 1
Virendra Singh Kushwah, Jyoti Parashar, Partibha Dabas, et al.
Advances in medical technologies and clinical practice book series (2024), pp. 17-36
Closed Access | Times Cited: 1
Impact of Augmented Reality on Cloud Data Security
Vishal Diyora, Bilal Khalil
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2024), pp. 1-4
Closed Access | Times Cited: 1
Vishal Diyora, Bilal Khalil
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2024), pp. 1-4
Closed Access | Times Cited: 1
Digital Innovation of Cloud Computing in Amazon
Bello Hannah Tolulope, Yi Wang
Lecture notes in electrical engineering (2024), pp. 407-412
Closed Access
Bello Hannah Tolulope, Yi Wang
Lecture notes in electrical engineering (2024), pp. 407-412
Closed Access
Az elektronikus információs rendszerekből kinyerhető jogosultság pillanatképek felhasználásainak lehetőségei
Gábor Kiss, Gábor László
Gradus (2024) Vol. 11, Iss. 1
Open Access
Gábor Kiss, Gábor László
Gradus (2024) Vol. 11, Iss. 1
Open Access
Using Machine Learning to Achieve Cyber security Requirements: A Comprehensive
Mohammed Alsalamony
(2024)
Closed Access
Mohammed Alsalamony
(2024)
Closed Access
Fuzzy Logic and Cybersecurity: An Intelligent Shield in the Digital Age
Rahib Imamguluyev, Javad Huseynli, Ilham Hajiyev
Lecture notes in networks and systems (2024), pp. 33-40
Closed Access
Rahib Imamguluyev, Javad Huseynli, Ilham Hajiyev
Lecture notes in networks and systems (2024), pp. 33-40
Closed Access
A Multi-level Reference Model and a Dedicated Method for Cyber-Security by Design
Sybren de Kinderen, Monika Kaczmarek, Simon Hacks
Business & Information Systems Engineering (2024)
Open Access
Sybren de Kinderen, Monika Kaczmarek, Simon Hacks
Business & Information Systems Engineering (2024)
Open Access
Defending Against Malicious Code: A Comprehensive Study of Evasion and Mitigation Techniques
Yifan Ding, Man Zhang, Xianfeng Li, et al.
Mechanisms and machine science (2024), pp. 376-389
Closed Access
Yifan Ding, Man Zhang, Xianfeng Li, et al.
Mechanisms and machine science (2024), pp. 376-389
Closed Access
Organizational Readiness for Artificial Intelligence (AI) in Network Security
Benjamin Greene, Sharon L. Burton
Advances in human resources management and organizational development book series (2024), pp. 205-246
Closed Access
Benjamin Greene, Sharon L. Burton
Advances in human resources management and organizational development book series (2024), pp. 205-246
Closed Access
Research on Digital Transformation and Applications in Key Business Areas of Power Grid Planning
Xianfu Gong, Yaodong Li, Bo Peng, et al.
(2024), pp. 901-904
Closed Access
Xianfu Gong, Yaodong Li, Bo Peng, et al.
(2024), pp. 901-904
Closed Access
Cyber Resilience for SDG Towards the Digitization: An Imperial Study
Kousik Barik, Sanjay Misra, Biswajeeban Mishra, et al.
Lecture notes on data engineering and communications technologies (2024), pp. 361-388
Closed Access
Kousik Barik, Sanjay Misra, Biswajeeban Mishra, et al.
Lecture notes on data engineering and communications technologies (2024), pp. 361-388
Closed Access
The Impact of Digital Transformation in Enhancing Operational Performance: An Applied Study in the Kirkuk Electricity Distribution Branch
Marwan Fawzi Takriti, Ghalia Nassreddine, Joumana Younis, et al.
Journal of Techniques (2023) Vol. 5, Iss. 3, pp. 240-248
Open Access | Times Cited: 1
Marwan Fawzi Takriti, Ghalia Nassreddine, Joumana Younis, et al.
Journal of Techniques (2023) Vol. 5, Iss. 3, pp. 240-248
Open Access | Times Cited: 1
An algorithmic method for business process reengineering and service automation in the public sector
Yannis Charalabidis, Zoi Lachana, Charalampos Alexopoulos, et al.
(2023), pp. 119-126
Open Access | Times Cited: 1
Yannis Charalabidis, Zoi Lachana, Charalampos Alexopoulos, et al.
(2023), pp. 119-126
Open Access | Times Cited: 1