OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Cyber security: State of the art, challenges and future directions
Wasyihun Sema Admass, Yirga Yayeh Munaye, Abebe Diro
Cyber Security and Applications (2023) Vol. 2, pp. 100031-100031
Open Access | Times Cited: 61

Showing 1-25 of 61 citing articles:

The Convergence of Artificial Intelligence and Cybersecurity
Oana Alexandra Sarcea Manea, Alexandra Zbuchea
Advances in finance, accounting, and economics book series (2025), pp. 321-350
Closed Access | Times Cited: 2

A Secure Deepfake Mitigation Framework: Architecture, Issues, Challenges, and Societal Impact
Mohammad Wazid, Amit Kumar Mishra, Noor Mohd, et al.
Cyber Security and Applications (2024) Vol. 2, pp. 100040-100040
Open Access | Times Cited: 10

AIDS-Based Cyber Threat Detection Framework for Secure Cloud-Native Microservices
Han-Kyo Park, Abir El Azzaoui, Jong Hyuk Park
Electronics (2025) Vol. 14, Iss. 2, pp. 229-229
Open Access

AI-based Malware Detection in IoT Networks within Smart Cities: A Survey
Mustafa J.M. Alhamdi, José Manuel López-Guede, Jafar AlQaryouti, et al.
Computer Communications (2025), pp. 108055-108055
Closed Access

Comparative Analysis of EU-Based Cybersecurity Skills Frameworks
Fernando Almeida
Computers & Security (2025), pp. 104329-104329
Open Access

A Fuzzy‐AHP Decision‐Making Framework for Optimizing Software Maintenance and Deployment in Information Security Systems
Rafiq Ahmad Khan, Ismail Keshta, Hussein Al Hashimi, et al.
Journal of Software Evolution and Process (2025) Vol. 37, Iss. 1
Closed Access

Global Adoption of Artificial Intelligence in the Manufacturing Industries
Evariste Gatabazi, Maad M. Mijwil, Mostafa Abotaleb, et al.
Advances in computational intelligence and robotics book series (2025), pp. 399-412
Closed Access

A Robust Framework for Detecting Brute-Force Attacks through Deep Learning Techniques
Nouf Awadh, H Nasralla Zaid, Samah H. Alajmani
International Journal of Recent Technology and Engineering (IJRTE) (2025) Vol. 13, Iss. 5, pp. 27-42
Closed Access

Ciberseguridad desde las ciencias de la computación: un estudio bibliométrico sobre el Perú y los países limítrofes
Paolo Víctor Cuya-Chamilco, Pablo Saavedra-Villar, Lizeth Erly Mescua-Ampuero, et al.
Revista Cientifica de Sistemas e Informatica (2025) Vol. 5, Iss. 1, pp. e862-e862
Open Access

Optimal coordination of Production, Logistics, and Maintenance 4.0: A framework for Multi-Site Stamping Plants
Raoua Zerrad, Kamar Diaz, Meriem Hayani Mechkouri, et al.
Procedia Computer Science (2025) Vol. 253, pp. 2899-2908
Open Access

Assessing Browser Security: A Detailed Study Based on CVE Metrics
Oleksii Chalyi, Kęstutis Driaunys, Vytautas Rudžionis
Future Internet (2025) Vol. 17, Iss. 3, pp. 104-104
Open Access

A comprehensive framework for cyber threat detection: leveraging AI, NLP, and malware analysis
Nachaat Mohamed
International Journal of Information Technology (2025)
Closed Access

AI for Healthcare Security: The Intersection of Innovation and Resilience
Ankur Shukla
Communications in computer and information science (2025), pp. 109-127
Closed Access

Cyber Security in Healthcare Systems: A Review of Tools and Attack Mitigation Techniques
Kousik Barik, Sanjay Misra, Sabarathinam Chockalingam
Communications in computer and information science (2025), pp. 87-105
Closed Access

Toward Efficient Secure Threat Information Analysis in Cyber‐Physical Systems
Hanbing Yu, Q. Zhang
Security and Privacy (2025) Vol. 8, Iss. 2
Closed Access

Emerging Technologies and Future Trends in Cyber‐Physical Power Systems: Toward a New Era of Innovations
Ali Parizad, Hamid Reza Baghaee, Vahid Alizadeh, et al.
(2025), pp. 525-565
Closed Access

Machine Learning Approaches in Software Vulnerability Detection: A Systematic Review and Analysis of Contemporary Methods
Jude E. Ameh, Abayomi Otebolaku, Alex Shenfield, et al.
Research Square (Research Square) (2025)
Closed Access

A Secure and Scalable Authentication and Communication Protocol for Smart Grids
Muhammad Asfand Hafeez, Kazi Hassan Shakib, Arslan Munir
Journal of Cybersecurity and Privacy (2025) Vol. 5, Iss. 2, pp. 11-11
Open Access

Post-quantum healthcare: A roadmap for cybersecurity resilience in medical data
Morteza SaberiKamarposhti, Kok-Why Ng, Fang-Fang Chua, et al.
Heliyon (2024) Vol. 10, Iss. 10, pp. e31406-e31406
Open Access | Times Cited: 4

Integrating industry 4.0 technologies in defense manufacturing: Challenges, solutions, and potential opportunities
Habib Ullah, Muhammad Uzair, Zohaib Jan, et al.
Array (2024) Vol. 23, pp. 100358-100358
Open Access | Times Cited: 4

Navigating the Cyber Threat Landscape: An In-Depth Analysis of Attack Detection within IoT Ecosystems
Samar AboulEla, Nourhan M. Ibrahim, Sarama Shehmir, et al.
AI (2024) Vol. 5, Iss. 2, pp. 704-732
Open Access | Times Cited: 3

The Digital Evolution Strategies for Overcoming Cybersecurity and Adoption Challenges in French SMEs
Rachid Ejjami -
International Journal For Multidisciplinary Research (2024) Vol. 6, Iss. 3
Open Access | Times Cited: 2

Enhancing cyber safety in e-learning environment through cybersecurity awareness and information security compliance: PLS-SEM and FsQCA analysis
Chrispus Zacharia Oroni, Xianping Fu, Daniela Daniel Ndunguru, et al.
Computers & Security (2024) Vol. 150, pp. 104276-104276
Closed Access | Times Cited: 2

A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies
Khalid Bennouk, Nawal Ait Aali, Younès El Bouzekri El Idrissi, et al.
Journal of Cybersecurity and Privacy (2024) Vol. 4, Iss. 4, pp. 853-908
Open Access | Times Cited: 1

Page 1 - Next Page

Scroll to top