OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Your files have been encrypted: a crime script analysis of ransomware attacks
Sifra R. Matthijsse, M.S. van ’t Hoff-de Goede, Rutger Leukfeldt
Trends in Organized Crime (2023)
Closed Access | Times Cited: 23

Showing 23 citing articles:

Unveiling the Dark Side of ChatGPT: Exploring Cyberattacks and Enhancing User Awareness
Moatsum Alawida, Bayan Abu Shawar, Oludare Isaac Abiodun, et al.
Information (2024) Vol. 15, Iss. 1, pp. 27-27
Open Access | Times Cited: 15

Cyberspace as Asset Specificity
Marcia Cristiane Rossi, Faı̈z Gallouj, Gilberto Perez
Revista Ibero-Americana de Estratégia (2025) Vol. 24, Iss. 1, pp. e25866-e25866
Open Access

Ransomware crime through the lens of neutralisation theory
Lena Connolly, Hervé Borrion, Budi Arief
European Journal of Criminology (2025)
Closed Access

Bottlenecks and Opportunities for Improvement in Cybercrime Handling: Insights from Dutch Police Practice
Rutger Leukfeldt, M. Van Leuken, Teun van Ruitenburg, et al.
Deviant Behavior (2025), pp. 1-17
Closed Access

Risk Profiles for Cybercrime Victimization: A Conjunctive Analysis of Case Configurations
M.S. van ’t Hoff-de Goede, Asier Moneva, Rutger Leukfeldt
Deviant Behavior (2025), pp. 1-19
Closed Access

Mitigating Data Exfiltration Ransomware through Advanced Decoy File Strategies
Shishi Liu, Xin Chen
Research Square (Research Square) (2023)
Open Access | Times Cited: 11

Inside the Leak: Exploring the Structure of the Conti Ransomware Group
Caterina Paternoster, Mirko Nazzari, Maria Jofre, et al.
Global Crime (2025), pp. 1-24
Closed Access

Criminal expertise and hacking efficiency
Asier Moneva, Stijn Ruiter, Daniël Meinsma
Computers in Human Behavior (2024) Vol. 155, pp. 108180-108180
Open Access | Times Cited: 2

Reconceptualising organised (cyber)crime: The case of ransomware
Chad Whelan, David Bright, James Martin
Journal of Criminology (2023) Vol. 57, Iss. 1, pp. 45-61
Open Access | Times Cited: 6

The threat of ransomware in the food supply chain: a challenge for food defence
Louise Manning, Aleksandra Kowalska
Trends in Organized Crime (2023)
Open Access | Times Cited: 4

Ransomware as a threat to peace and security: understanding and avoiding political worst-case scenarios
Mischa Hansel, Jantje Silomon
Journal of Cyber Policy (2024), pp. 1-20
Open Access | Times Cited: 1

Examining ransomware payment decision-making among small- and medium-sized enterprises
Sifra R. Matthijsse, Asier Moneva, M. Susanne van ’t Hoff-de Goede, et al.
European Journal of Criminology (2024)
Closed Access | Times Cited: 1

Combining Uncensored and Censored LLMs for Ransomware Generation
Muhammad Mudassar Yamin, Ehtesham Hashmi, Basel Katt
Lecture notes in computer science (2024), pp. 189-202
Closed Access | Times Cited: 1

Examining the Cyclical Nature of Crimes: A Looped Crime Script of Data Theft from Organizational Networks
Renushka Madarie, Marleen Weulen Kranenbarg, C.J. de Poot
Computers in Human Behavior Reports (2024), pp. 100548-100548
Open Access | Times Cited: 1

Unveiling the Dark Side of ChatGPT: Exploring Cyberattacks and Enhancing User Awareness
Moatsum Alawida, Bayan Abu Shawar, Oludare Isaac Abiodun, et al.
(2023)
Open Access | Times Cited: 3

Double-sided Information Asymmetry in Double Extortion Ransomware
Tom Meurs, Edward Cartwright, Anna Cartwright
Research Square (Research Square) (2024)
Open Access

Introducing object-oriented modelling to cybercrime scripting: visualisation for improved analysis
Renushka Madarie, Marleen Weulen Kranenbarg, C.J. de Poot
Crime Science (2024) Vol. 13, Iss. 1
Open Access

Ransomware HR: Human Resources Practices and Organizational Support in the Conti Ransomware Group
James Martin, Chad Whelan, David Bright
Deviant Behavior (2024), pp. 1-16
Open Access

Case Studies in the E-commerce Industry
Anirudh Khanna
Apress eBooks (2024), pp. 307-327
Closed Access

Emerging Ransomware Attacks: Improvement and Remedies - A Systematic Literature Review
Shuaib Ahmed Wadho, Yichiet Aun, Ming Lee Gan, et al.
(2023), pp. 148-153
Closed Access | Times Cited: 1

Criminal Expertise and Hacking Efficiency
Asier Moneva, Stijn Ruiter, Daniël Meinsma
(2023)
Open Access | Times Cited: 1

Online criminaliteit in criminologisch perspectief
Marleen Weulen Kranenbarg, Susanne van ’t Hoff-de Goede
Tijdschrift voor Criminologie (2023) Vol. 65, Iss. 4, pp. 400-419
Open Access

Page 1

Scroll to top