OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Zooming into the pandemic! A forensic analysis of the Zoom Application
Andrew Mahr, Meghan Cichon, Sophia Mateo, et al.
Forensic Science International Digital Investigation (2021) Vol. 36, pp. 301107-301107
Open Access | Times Cited: 57

Showing 1-25 of 57 citing articles:

Remote Academic Platforms in Times of a Pandemic
Nathalia Ospina García, María Fernanda Díaz Velásquez, Carlos Andrés Tavera Romero, et al.
International Journal of Emerging Technologies in Learning (iJET) (2021) Vol. 16, Iss. 21, pp. 121-121
Open Access | Times Cited: 63

Interpol review of digital evidence for 2019–2022
Paul Reedy
Forensic Science International Synergy (2023) Vol. 6, pp. 100313-100313
Open Access | Times Cited: 34

Preference analysis on the online learning attributes among senior high school students during the COVID-19 pandemic: A conjoint analysis approach
Ardvin Kester S. Ong, Yogi Tri Prasetyo, Thanatorn Chuenyindee, et al.
Evaluation and Program Planning (2022) Vol. 92, pp. 102100-102100
Open Access | Times Cited: 32

Zooming Into Video Conferencing Privacy
Dima Kagan, Galit Fuhrmann Alpert, Michael Fire
IEEE Transactions on Computational Social Systems (2023) Vol. 11, Iss. 1, pp. 933-944
Open Access | Times Cited: 19

Systematic review of deep learning solutions for malware detection and forensic analysis in IoT
Sirajuddin Qureshi, Jingsha He, Saima Tunio, et al.
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 8, pp. 102164-102164
Open Access | Times Cited: 5

Enabling passive measurement of zoom performance in production networks
Oliver Michel, Satadal Sengupta, Hyojoon Kim, et al.
(2022)
Open Access | Times Cited: 22

Learning from digital disorientations: Navigating virtual and physical spaces in library and information science research during lockdowns and beyond
Travis L. Wagner, Kaitlin Montague, Vanessa Kitzie, et al.
Library & Information Science Research (2025) Vol. 47, Iss. 1, pp. 101340-101340
Closed Access

The Utilization of “Google Meet” and “Zoom Meetings” to Support the Lecturing Process during the Pandemic of COVID-19
Bambang Budi Wiyono, Henny Indreswari, Arda Purnama Putra
(2021), pp. 25-29
Closed Access | Times Cited: 21

Zoom Session Quality: A Network-Level View
Albert H. Choi, Mehdi Karamollahi, Carey Williamson, et al.
Lecture notes in computer science (2022), pp. 555-572
Closed Access | Times Cited: 11

Alt-tech social forensics: Forensic analysis of alternative social networking applications
Hailey Johnson, Karl Volk, Robert Serafin, et al.
Forensic Science International Digital Investigation (2022) Vol. 42, pp. 301406-301406
Closed Access | Times Cited: 10

Factorizing 2FA: Forensic analysis of two-factor authentication applications
Jessica Berrios, Elias Mosher, Sankofa Benzo, et al.
Forensic Science International Digital Investigation (2023) Vol. 45, pp. 301569-301569
Open Access | Times Cited: 5

SpeechToText: An open-source software for automatic detection and transcription of voice recordings in digital forensics
Miguel Cerdeira Negrão, Patrício Domingues
Forensic Science International Digital Investigation (2021) Vol. 38, pp. 301223-301223
Closed Access | Times Cited: 12

The Zoom Boom: Assessing Videoconferencing Attitudes among College Students
Reham Salhab
International Journal of Information and Education Technology (2024) Vol. 14, Iss. 2, pp. 204-213
Open Access | Times Cited: 1

A forensic analysis of AnyDesk Remote Access application by using various forensic tools and techniques
N. Soni, Manpreet Kaur, Vishwas Bhardwaj
Forensic Science International Digital Investigation (2024) Vol. 48, pp. 301695-301695
Closed Access | Times Cited: 1

A Security Framework for Addressing Privacy Issues in the Zoom Conference System
Samer Atawneh, Ziad Alshammari, Mousa AL- Akhras, et al.
Journal of Internet Services and Information Security (2024) Vol. 14, Iss. 1, pp. 242-265
Open Access | Times Cited: 1

Forensic analysis and data decryption of tencent meeting in windows environment
Soojin Kang, Uk Hur, Giyoon Kim, et al.
Forensic Science International Digital Investigation (2024) Vol. 51, pp. 301818-301818
Closed Access | Times Cited: 1

Decoding digital interactions: An extensive study of TeamViewer's Forensic Artifacts across Windows and android platforms
N. Soni, Manpreet Kaur, Khalid Aziz
Forensic Science International Digital Investigation (2024) Vol. 51, pp. 301838-301838
Closed Access | Times Cited: 1

Forensic investigation of Google Meet for memory and browser artifacts
Farkhund Iqbal, Zainab Khalid, Andrew Marrington, et al.
Forensic Science International Digital Investigation (2022) Vol. 43, pp. 301448-301448
Open Access | Times Cited: 7

Forensic Analysis of the Cisco WebEx Application
Zainab Khalid, Farkhund Iqbal, Faouzi Kamoun, et al.
(2021)
Closed Access | Times Cited: 9

Expanding digital forensics education with artifact curation and scalable, accessible exercises via the Artifact Genome Project
Cinthya Grajeda, Jessica Berrios, Sankofa Benzo, et al.
Forensic Science International Digital Investigation (2023) Vol. 45, pp. 301566-301566
Open Access | Times Cited: 3

A Comprehensive Survey on Artifact Recovery from Social Media Platforms: Approaches and Future Research Directions
Khushi Gupta, Damilola Oladimeji, Cihan Varol, et al.
Information (2023) Vol. 14, Iss. 12, pp. 629-629
Open Access | Times Cited: 3

Forensic Analysis of Microsoft Teams: Investigating Memory, Disk and Network
Zainab Khalid, Farkhund Iqbal, Khalil Al-Hussaeni, et al.
Springer eBooks (2022), pp. 583-601
Closed Access | Times Cited: 5

To sell, or not to sell: social media data-breach in second-hand Android devices
Oussama Benrhouma, Ali Alzahrani, Ahmad Alkhodre, et al.
Information and Computer Security (2021) Vol. 30, Iss. 1, pp. 117-136
Closed Access | Times Cited: 7

Meta and Media Data Stream Forensics in the Encrypted Domain of Video Conferences
Robert Altschaffel, Jonas Hielscher, Stefan Kiltz, et al.
(2021)
Open Access | Times Cited: 6

Page 1 - Next Page

Scroll to top