
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Cyber security: State of the art, challenges and future directions
Wasyihun Sema Admass, Yirga Yayeh Munaye, Abebe Diro
Cyber Security and Applications (2023) Vol. 2, pp. 100031-100031
Open Access | Times Cited: 61
Wasyihun Sema Admass, Yirga Yayeh Munaye, Abebe Diro
Cyber Security and Applications (2023) Vol. 2, pp. 100031-100031
Open Access | Times Cited: 61
Showing 1-25 of 61 citing articles:
The Convergence of Artificial Intelligence and Cybersecurity
Oana Alexandra Sarcea Manea, Alexandra Zbuchea
Advances in finance, accounting, and economics book series (2025), pp. 321-350
Closed Access | Times Cited: 2
Oana Alexandra Sarcea Manea, Alexandra Zbuchea
Advances in finance, accounting, and economics book series (2025), pp. 321-350
Closed Access | Times Cited: 2
A Secure Deepfake Mitigation Framework: Architecture, Issues, Challenges, and Societal Impact
Mohammad Wazid, Amit Kumar Mishra, Noor Mohd, et al.
Cyber Security and Applications (2024) Vol. 2, pp. 100040-100040
Open Access | Times Cited: 10
Mohammad Wazid, Amit Kumar Mishra, Noor Mohd, et al.
Cyber Security and Applications (2024) Vol. 2, pp. 100040-100040
Open Access | Times Cited: 10
AIDS-Based Cyber Threat Detection Framework for Secure Cloud-Native Microservices
Han-Kyo Park, Abir El Azzaoui, Jong Hyuk Park
Electronics (2025) Vol. 14, Iss. 2, pp. 229-229
Open Access
Han-Kyo Park, Abir El Azzaoui, Jong Hyuk Park
Electronics (2025) Vol. 14, Iss. 2, pp. 229-229
Open Access
AI-based Malware Detection in IoT Networks within Smart Cities: A Survey
Mustafa J.M. Alhamdi, José Manuel López-Guede, Jafar AlQaryouti, et al.
Computer Communications (2025), pp. 108055-108055
Closed Access
Mustafa J.M. Alhamdi, José Manuel López-Guede, Jafar AlQaryouti, et al.
Computer Communications (2025), pp. 108055-108055
Closed Access
Comparative Analysis of EU-Based Cybersecurity Skills Frameworks
Fernando Almeida
Computers & Security (2025), pp. 104329-104329
Open Access
Fernando Almeida
Computers & Security (2025), pp. 104329-104329
Open Access
A Fuzzy‐AHP Decision‐Making Framework for Optimizing Software Maintenance and Deployment in Information Security Systems
Rafiq Ahmad Khan, Ismail Keshta, Hussein Al Hashimi, et al.
Journal of Software Evolution and Process (2025) Vol. 37, Iss. 1
Closed Access
Rafiq Ahmad Khan, Ismail Keshta, Hussein Al Hashimi, et al.
Journal of Software Evolution and Process (2025) Vol. 37, Iss. 1
Closed Access
Global Adoption of Artificial Intelligence in the Manufacturing Industries
Evariste Gatabazi, Maad M. Mijwil, Mostafa Abotaleb, et al.
Advances in computational intelligence and robotics book series (2025), pp. 399-412
Closed Access
Evariste Gatabazi, Maad M. Mijwil, Mostafa Abotaleb, et al.
Advances in computational intelligence and robotics book series (2025), pp. 399-412
Closed Access
A Robust Framework for Detecting Brute-Force Attacks through Deep Learning Techniques
Nouf Awadh, H Nasralla Zaid, Samah H. Alajmani
International Journal of Recent Technology and Engineering (IJRTE) (2025) Vol. 13, Iss. 5, pp. 27-42
Closed Access
Nouf Awadh, H Nasralla Zaid, Samah H. Alajmani
International Journal of Recent Technology and Engineering (IJRTE) (2025) Vol. 13, Iss. 5, pp. 27-42
Closed Access
Ciberseguridad desde las ciencias de la computación: un estudio bibliométrico sobre el Perú y los países limítrofes
Paolo Víctor Cuya-Chamilco, Pablo Saavedra-Villar, Lizeth Erly Mescua-Ampuero, et al.
Revista Cientifica de Sistemas e Informatica (2025) Vol. 5, Iss. 1, pp. e862-e862
Open Access
Paolo Víctor Cuya-Chamilco, Pablo Saavedra-Villar, Lizeth Erly Mescua-Ampuero, et al.
Revista Cientifica de Sistemas e Informatica (2025) Vol. 5, Iss. 1, pp. e862-e862
Open Access
Optimal coordination of Production, Logistics, and Maintenance 4.0: A framework for Multi-Site Stamping Plants
Raoua Zerrad, Kamar Diaz, Meriem Hayani Mechkouri, et al.
Procedia Computer Science (2025) Vol. 253, pp. 2899-2908
Open Access
Raoua Zerrad, Kamar Diaz, Meriem Hayani Mechkouri, et al.
Procedia Computer Science (2025) Vol. 253, pp. 2899-2908
Open Access
Assessing Browser Security: A Detailed Study Based on CVE Metrics
Oleksii Chalyi, Kęstutis Driaunys, Vytautas Rudžionis
Future Internet (2025) Vol. 17, Iss. 3, pp. 104-104
Open Access
Oleksii Chalyi, Kęstutis Driaunys, Vytautas Rudžionis
Future Internet (2025) Vol. 17, Iss. 3, pp. 104-104
Open Access
A comprehensive framework for cyber threat detection: leveraging AI, NLP, and malware analysis
Nachaat Mohamed
International Journal of Information Technology (2025)
Closed Access
Nachaat Mohamed
International Journal of Information Technology (2025)
Closed Access
Unlocking digitalization in the spool fabrication industry: analysis of roadblocks using the IMF-SWARA integrated TFBM
Kiran Sankar, Sumit Gupta, Sunil Luthra
Procedia CIRP (2025) Vol. 132, pp. 171-177
Open Access
Kiran Sankar, Sumit Gupta, Sunil Luthra
Procedia CIRP (2025) Vol. 132, pp. 171-177
Open Access
AI for Healthcare Security: The Intersection of Innovation and Resilience
Ankur Shukla
Communications in computer and information science (2025), pp. 109-127
Closed Access
Ankur Shukla
Communications in computer and information science (2025), pp. 109-127
Closed Access
Cyber Security in Healthcare Systems: A Review of Tools and Attack Mitigation Techniques
Kousik Barik, Sanjay Misra, Sabarathinam Chockalingam
Communications in computer and information science (2025), pp. 87-105
Closed Access
Kousik Barik, Sanjay Misra, Sabarathinam Chockalingam
Communications in computer and information science (2025), pp. 87-105
Closed Access
Toward Efficient Secure Threat Information Analysis in Cyber‐Physical Systems
Hanbing Yu, Q. Zhang
Security and Privacy (2025) Vol. 8, Iss. 2
Closed Access
Hanbing Yu, Q. Zhang
Security and Privacy (2025) Vol. 8, Iss. 2
Closed Access
Emerging Technologies and Future Trends in Cyber‐Physical Power Systems: Toward a New Era of Innovations
Ali Parizad, Hamid Reza Baghaee, Vahid Alizadeh, et al.
(2025), pp. 525-565
Closed Access
Ali Parizad, Hamid Reza Baghaee, Vahid Alizadeh, et al.
(2025), pp. 525-565
Closed Access
Machine Learning Approaches in Software Vulnerability Detection: A Systematic Review and Analysis of Contemporary Methods
Jude E. Ameh, Abayomi Otebolaku, Alex Shenfield, et al.
Research Square (Research Square) (2025)
Closed Access
Jude E. Ameh, Abayomi Otebolaku, Alex Shenfield, et al.
Research Square (Research Square) (2025)
Closed Access
A Secure and Scalable Authentication and Communication Protocol for Smart Grids
Muhammad Asfand Hafeez, Kazi Hassan Shakib, Arslan Munir
Journal of Cybersecurity and Privacy (2025) Vol. 5, Iss. 2, pp. 11-11
Open Access
Muhammad Asfand Hafeez, Kazi Hassan Shakib, Arslan Munir
Journal of Cybersecurity and Privacy (2025) Vol. 5, Iss. 2, pp. 11-11
Open Access
Post-quantum healthcare: A roadmap for cybersecurity resilience in medical data
Morteza SaberiKamarposhti, Kok-Why Ng, Fang-Fang Chua, et al.
Heliyon (2024) Vol. 10, Iss. 10, pp. e31406-e31406
Open Access | Times Cited: 4
Morteza SaberiKamarposhti, Kok-Why Ng, Fang-Fang Chua, et al.
Heliyon (2024) Vol. 10, Iss. 10, pp. e31406-e31406
Open Access | Times Cited: 4
Integrating industry 4.0 technologies in defense manufacturing: Challenges, solutions, and potential opportunities
Habib Ullah, Muhammad Uzair, Zohaib Jan, et al.
Array (2024) Vol. 23, pp. 100358-100358
Open Access | Times Cited: 4
Habib Ullah, Muhammad Uzair, Zohaib Jan, et al.
Array (2024) Vol. 23, pp. 100358-100358
Open Access | Times Cited: 4
Navigating the Cyber Threat Landscape: An In-Depth Analysis of Attack Detection within IoT Ecosystems
Samar AboulEla, Nourhan M. Ibrahim, Sarama Shehmir, et al.
AI (2024) Vol. 5, Iss. 2, pp. 704-732
Open Access | Times Cited: 3
Samar AboulEla, Nourhan M. Ibrahim, Sarama Shehmir, et al.
AI (2024) Vol. 5, Iss. 2, pp. 704-732
Open Access | Times Cited: 3
The Digital Evolution Strategies for Overcoming Cybersecurity and Adoption Challenges in French SMEs
Rachid Ejjami -
International Journal For Multidisciplinary Research (2024) Vol. 6, Iss. 3
Open Access | Times Cited: 2
Rachid Ejjami -
International Journal For Multidisciplinary Research (2024) Vol. 6, Iss. 3
Open Access | Times Cited: 2
Enhancing cyber safety in e-learning environment through cybersecurity awareness and information security compliance: PLS-SEM and FsQCA analysis
Chrispus Zacharia Oroni, Xianping Fu, Daniela Daniel Ndunguru, et al.
Computers & Security (2024) Vol. 150, pp. 104276-104276
Closed Access | Times Cited: 2
Chrispus Zacharia Oroni, Xianping Fu, Daniela Daniel Ndunguru, et al.
Computers & Security (2024) Vol. 150, pp. 104276-104276
Closed Access | Times Cited: 2
A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies
Khalid Bennouk, Nawal Ait Aali, Younès El Bouzekri El Idrissi, et al.
Journal of Cybersecurity and Privacy (2024) Vol. 4, Iss. 4, pp. 853-908
Open Access | Times Cited: 1
Khalid Bennouk, Nawal Ait Aali, Younès El Bouzekri El Idrissi, et al.
Journal of Cybersecurity and Privacy (2024) Vol. 4, Iss. 4, pp. 853-908
Open Access | Times Cited: 1