OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat
Isabel Herrera Montano, José Javier García Aranda, Juan Ramos Diaz, et al.
Cluster Computing (2022) Vol. 25, Iss. 6, pp. 4289-4302
Open Access | Times Cited: 18

Showing 18 citing articles:

State‐of‐the‐art of cybersecurity in the power system: Simulation, detection, mitigation, and research gaps
Milad Beikbabaei, Ali Mehrizi‐Sani, Chen‐Ching Liu
IET Generation Transmission & Distribution (2025) Vol. 19, Iss. 1
Open Access

LaAeb: A comprehensive log-text analysis based approach for insider threat detection
Kexiong Fei, Jiang Zhou, Yucan Zhou, et al.
Computers & Security (2024), pp. 104126-104126
Closed Access | Times Cited: 2

Data Loss Prevention Solution for Linux Endpoint Devices
Lukáš Daubner, Adam Považanec
Proceedings of the 17th International Conference on Availability, Reliability and Security (2023), pp. 1-10
Open Access | Times Cited: 4

Research Opportunity of Insider Threat Detection based on Machine Learning Methods
Noer Tjahja Moekthi Prajitno, Hadiyanto Hadiyanto, Adian Fatchur Rochim
(2023), pp. 292-296
Closed Access | Times Cited: 2

Deep Learning Based Hardware System for Factory Leak Detection
Atharva Sarde, Shailesh Amane, Atharva Deore, et al.
(2024), pp. 1-6
Closed Access

Planning and Preparation of Cybersecurity
Mohammed Mustafa Khan
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT (2024) Vol. 08, Iss. 10, pp. 1-3
Open Access

Precise Authentication Watermarking Algorithm Based on Multiple Sorting Mechanisms for Vector Geographic Data
Qifei Zhou, Na Ren, Changqing Zhu
Symmetry (2024) Vol. 16, Iss. 12, pp. 1626-1626
Open Access

Securecipher: An instantaneous synchronization stream encryption system for insider threat data leakage protection
Isabel Herrera Montano, Juan Ramos Diaz, José Javier García Aranda, et al.
Expert Systems with Applications (2024) Vol. 254, pp. 124470-124470
Open Access

SentinelGuard: An Integration of Intelligent Text Data Loss Prevention Mechanism for Organizational Security (I-ITDLP)
Vishnu Kumar Kaliappan, U P Dharunkumar, Sugumaran Uppili, et al.
(2024), pp. 1-6
Closed Access

MLCAC: Dynamic Authorization and Intelligent Decision-making towards Insider Threats
Lifang Xiao, Aimin Yu, Hanyu Wang, et al.
(2024), pp. 407-412
Closed Access

Visual Censorship: A Deep Learning-Based Approach to Preventing the Leakage of Confidential Content in Images
Abigail Paradise Vit, Yarden Aronson, Raz Fraidenberg, et al.
Applied Sciences (2024) Vol. 14, Iss. 17, pp. 7915-7915
Open Access

USB Fort Knox: Building a Robust Defense Against Data Breaches
Anil Hingmire, Aditi Sawant, Divya Patil, et al.
(2024), pp. 163-175
Closed Access



American Journal of Undergraduate Research (2024) Vol. 21, Iss. 3
Open Access

Exploring the Potential of Distributed Ledger Technology in e-Health Monitoring
Ritika Singh, Mirza Moiz Baig, Shrikant V. Sonekar, et al.
(2023), pp. 1-7
Closed Access | Times Cited: 1

Precipitation Nowcasting using Data Augmentation
Eduardo Bezerra, Augusto J. M. da Fonseca, Adriano Cabo, et al.
(2023), pp. 318-323
Open Access

Data Leakage in Kuwait: Reasons and Solution
Safaa Zaman, Hamad Kamshad
(2023), pp. 1-12
Closed Access

Page 1

Scroll to top