OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Online social networks security and privacy: comprehensive review and analysis
Ankit Kumar Jain, Somya Ranjan Sahoo, Jyoti Kaubiyal
Complex & Intelligent Systems (2021) Vol. 7, Iss. 5, pp. 2157-2177
Open Access | Times Cited: 163

Showing 1-25 of 163 citing articles:

A comprehensive survey of fake news in social networks: Attributes, features, and detection approaches
Medeswara Rao Kondamudi, Somya Ranjan Sahoo, Lokesh Chouhan, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 6, pp. 101571-101571
Open Access | Times Cited: 31

Exploring the Frontiers of Cybersecurity Behavior: A Systematic Review of Studies and Theories
Afrah Almansoori, Mostafa Al‐Emran, Khaled Shaalan
Applied Sciences (2023) Vol. 13, Iss. 9, pp. 5700-5700
Open Access | Times Cited: 27

Metaverse adoption and its implications for entrepreneurial innovation management: the influence of Gen Z’s perception of innovation, privacy and trust
Álvaro Hernández-Tamurejo, María Fernández-Fernández, Paula González-Padilla
European Journal of Innovation Management (2025)
Closed Access | Times Cited: 1

Malicious URL Detection using Logistic Regression
Ch. Rupa, Gautam Srivastava, Sweta Bhattacharya, et al.
(2021), pp. 1-6
Closed Access | Times Cited: 43

An unsupervised deep learning ensemble model for anomaly detection in static attributed social networks
Wasim Khan, Mohammad Haroon
International Journal of Cognitive Computing in Engineering (2022) Vol. 3, pp. 153-160
Open Access | Times Cited: 37

Deep convolutional forest: a dynamic deep ensemble approach for spam detection in text
Mai A. Shaaban, Yasser F. Hassan, Shawkat K. Guirguis
Complex & Intelligent Systems (2022) Vol. 8, Iss. 6, pp. 4897-4909
Open Access | Times Cited: 28

Social Media as an Open Innovation: Deciphering Its Relationship with Firm Performance, Compatibility, and Security Concern
Rosman Mohamed Hussin, Lennora Putit, Geetha Subramaniam
(2023), pp. 87-98
Closed Access | Times Cited: 21

Artificial Intelligence for Cyber Security
Meghna Manoj Nair, Atharva Deshmukh, Amit Kumar Tyagi
(2023), pp. 83-114
Closed Access | Times Cited: 18

OSN Traits and Vulnerability for Measurement and Analysis
Rajat Bhardwaj, Vivek Bhardwaj, Romil Rawat, et al.
(2024), pp. 611-623
Closed Access | Times Cited: 6

Deep learning technology of computer network security detection based on artificial intelligence
Qinghui Liu, Tianping Zhang
Computers & Electrical Engineering (2023) Vol. 110, pp. 108813-108813
Closed Access | Times Cited: 13

Exploring security and trust mechanisms in online social networks: An extensive review
Gordhan Jethava, Udai Pratap Rao
Computers & Security (2024) Vol. 140, pp. 103790-103790
Closed Access | Times Cited: 5

ATT&CK-based Advanced Persistent Threat attacks risk propagation assessment model for zero trust networks
Jingci Zhang, Jun Zheng, Qikun Zhang, et al.
Computer Networks (2024) Vol. 245, pp. 110376-110376
Closed Access | Times Cited: 5

Construction of a New 2D Hyperchaotic Map with Application in Efficient Pseudo-Random Number Generator Design and Color Image Encryption
Shenli Zhu, Xiaoheng Deng, Wendong Zhang, et al.
Mathematics (2023) Vol. 11, Iss. 14, pp. 3171-3171
Open Access | Times Cited: 12

Exploring the Impact of Security Technologies on Mental Health: A Comprehensive Review
Adwait S Malik, Sourya Acharya, Sonal Humane
Cureus (2024)
Open Access | Times Cited: 4

Threats on online social network platforms: classification, detection, and prevention techniques
Akash Shah, Sapna Varshney, Monica Mehrotra
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 4

Regulating Information and Network Security: Review and Challenges
Tayssir Bouraffa, Kai-Lung Hui
ACM Computing Surveys (2025)
Closed Access

Assessing Consumer Trust and Perception in Online Food Marketplaces
Jeganathan Gomathi Sankar, Shashi Kant
Advances in marketing, customer relationship management, and e-services book series (2025), pp. 375-394
Closed Access

Mental Health and Moral Education in the Digital Age
Dan Li
International Journal of Web-Based Learning and Teaching Technologies (2025) Vol. 20, Iss. 1, pp. 1-20
Open Access

Cyber safety in e-learning: The effects of cyber awareness and information security policies with moderating effects of gender and experience levels among e-learning students
Chrispus Zacharia Oroni, Xianping Fu, Daniela Daniel Ndunguru, et al.
Education and Information Technologies (2025)
Closed Access

Balancing Educational Benefits With Privacy Concerns in Social Network-Based Learning
Amelie Madeline
IGI Global eBooks (2025), pp. 305-342
Closed Access

How do micro-psychological and macro-socioeconomic factors influence construction safety knowledge sharing? Insights from a mixed-AI approach
Rita Yi Man Li, Rebecca Kechen Dong, Ruihui Pu, et al.
Labour & Industry a journal of the social and economic relations of work (2025), pp. 1-26
Open Access

Preserving traveller privacy in location-based social media: a local differential privacy approach
Fang Yao, Xiaolian Chen, Arthur Wan, et al.
Information Technology and People (2025)
Closed Access

Social media impact on societal security
Huda Hassan Alnaqbi, E. A. Ali
Frontiers in Sociology (2025) Vol. 10
Open Access

Detecting and localizing multiple forgeries with TransGAN
Upasana Singh, Sandeep Rathor, Manoj Kumar
Iran Journal of Computer Science (2025)
Closed Access

Innovative Application of Bayesian Algorithm in Network Security Risk Assessment Model
Haosheng Li, Qubing Ren, Wei Chen, et al.
Lecture notes in networks and systems (2025), pp. 412-424
Closed Access

Page 1 - Next Page

Scroll to top