
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat
Isabel Herrera Montano, José Javier García Aranda, Juan Ramos Diaz, et al.
Cluster Computing (2022) Vol. 25, Iss. 6, pp. 4289-4302
Open Access | Times Cited: 18
Isabel Herrera Montano, José Javier García Aranda, Juan Ramos Diaz, et al.
Cluster Computing (2022) Vol. 25, Iss. 6, pp. 4289-4302
Open Access | Times Cited: 18
Showing 18 citing articles:
A Review of Recent Advances, Challenges, and Opportunities in Malicious Insider Threat Detection Using Machine Learning Methods
Fatima Alzaabi, Abid Mehmood
IEEE Access (2024) Vol. 12, pp. 30907-30927
Open Access | Times Cited: 22
Fatima Alzaabi, Abid Mehmood
IEEE Access (2024) Vol. 12, pp. 30907-30927
Open Access | Times Cited: 22
State‐of‐the‐art of cybersecurity in the power system: Simulation, detection, mitigation, and research gaps
Milad Beikbabaei, Ali Mehrizi‐Sani, Chen‐Ching Liu
IET Generation Transmission & Distribution (2025) Vol. 19, Iss. 1
Open Access
Milad Beikbabaei, Ali Mehrizi‐Sani, Chen‐Ching Liu
IET Generation Transmission & Distribution (2025) Vol. 19, Iss. 1
Open Access
LaAeb: A comprehensive log-text analysis based approach for insider threat detection
Kexiong Fei, Jiang Zhou, Yucan Zhou, et al.
Computers & Security (2024), pp. 104126-104126
Closed Access | Times Cited: 2
Kexiong Fei, Jiang Zhou, Yucan Zhou, et al.
Computers & Security (2024), pp. 104126-104126
Closed Access | Times Cited: 2
Data Loss Prevention Solution for Linux Endpoint Devices
Lukáš Daubner, Adam Považanec
Proceedings of the 17th International Conference on Availability, Reliability and Security (2023), pp. 1-10
Open Access | Times Cited: 4
Lukáš Daubner, Adam Považanec
Proceedings of the 17th International Conference on Availability, Reliability and Security (2023), pp. 1-10
Open Access | Times Cited: 4
Research Opportunity of Insider Threat Detection based on Machine Learning Methods
Noer Tjahja Moekthi Prajitno, Hadiyanto Hadiyanto, Adian Fatchur Rochim
(2023), pp. 292-296
Closed Access | Times Cited: 2
Noer Tjahja Moekthi Prajitno, Hadiyanto Hadiyanto, Adian Fatchur Rochim
(2023), pp. 292-296
Closed Access | Times Cited: 2
Deep Learning Based Hardware System for Factory Leak Detection
Atharva Sarde, Shailesh Amane, Atharva Deore, et al.
(2024), pp. 1-6
Closed Access
Atharva Sarde, Shailesh Amane, Atharva Deore, et al.
(2024), pp. 1-6
Closed Access
Planning and Preparation of Cybersecurity
Mohammed Mustafa Khan
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT (2024) Vol. 08, Iss. 10, pp. 1-3
Open Access
Mohammed Mustafa Khan
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT (2024) Vol. 08, Iss. 10, pp. 1-3
Open Access
Precise Authentication Watermarking Algorithm Based on Multiple Sorting Mechanisms for Vector Geographic Data
Qifei Zhou, Na Ren, Changqing Zhu
Symmetry (2024) Vol. 16, Iss. 12, pp. 1626-1626
Open Access
Qifei Zhou, Na Ren, Changqing Zhu
Symmetry (2024) Vol. 16, Iss. 12, pp. 1626-1626
Open Access
Securecipher: An instantaneous synchronization stream encryption system for insider threat data leakage protection
Isabel Herrera Montano, Juan Ramos Diaz, José Javier García Aranda, et al.
Expert Systems with Applications (2024) Vol. 254, pp. 124470-124470
Open Access
Isabel Herrera Montano, Juan Ramos Diaz, José Javier García Aranda, et al.
Expert Systems with Applications (2024) Vol. 254, pp. 124470-124470
Open Access
SentinelGuard: An Integration of Intelligent Text Data Loss Prevention Mechanism for Organizational Security (I-ITDLP)
Vishnu Kumar Kaliappan, U P Dharunkumar, Sugumaran Uppili, et al.
(2024), pp. 1-6
Closed Access
Vishnu Kumar Kaliappan, U P Dharunkumar, Sugumaran Uppili, et al.
(2024), pp. 1-6
Closed Access
MLCAC: Dynamic Authorization and Intelligent Decision-making towards Insider Threats
Lifang Xiao, Aimin Yu, Hanyu Wang, et al.
(2024), pp. 407-412
Closed Access
Lifang Xiao, Aimin Yu, Hanyu Wang, et al.
(2024), pp. 407-412
Closed Access
Visual Censorship: A Deep Learning-Based Approach to Preventing the Leakage of Confidential Content in Images
Abigail Paradise Vit, Yarden Aronson, Raz Fraidenberg, et al.
Applied Sciences (2024) Vol. 14, Iss. 17, pp. 7915-7915
Open Access
Abigail Paradise Vit, Yarden Aronson, Raz Fraidenberg, et al.
Applied Sciences (2024) Vol. 14, Iss. 17, pp. 7915-7915
Open Access
USB Fort Knox: Building a Robust Defense Against Data Breaches
Anil Hingmire, Aditi Sawant, Divya Patil, et al.
(2024), pp. 163-175
Closed Access
Anil Hingmire, Aditi Sawant, Divya Patil, et al.
(2024), pp. 163-175
Closed Access
Exploring the Potential of Distributed Ledger Technology in e-Health Monitoring
Ritika Singh, Mirza Moiz Baig, Shrikant V. Sonekar, et al.
(2023), pp. 1-7
Closed Access | Times Cited: 1
Ritika Singh, Mirza Moiz Baig, Shrikant V. Sonekar, et al.
(2023), pp. 1-7
Closed Access | Times Cited: 1
Precipitation Nowcasting using Data Augmentation
Eduardo Bezerra, Augusto J. M. da Fonseca, Adriano Cabo, et al.
(2023), pp. 318-323
Open Access
Eduardo Bezerra, Augusto J. M. da Fonseca, Adriano Cabo, et al.
(2023), pp. 318-323
Open Access
Maturity model for data leakage security protocols in telecommunications companies applying the NIST framework
S. León, Brian Joel, Di Paola Jara, et al.
(2023)
Closed Access
S. León, Brian Joel, Di Paola Jara, et al.
(2023)
Closed Access
Data Leakage in Kuwait: Reasons and Solution
Safaa Zaman, Hamad Kamshad
(2023), pp. 1-12
Closed Access
Safaa Zaman, Hamad Kamshad
(2023), pp. 1-12
Closed Access