OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Data security crisis in universities: identification of key factors affecting data breach incidents
Li Jin, Wei Xiao, Chong Zhang
Humanities and Social Sciences Communications (2023) Vol. 10, Iss. 1
Open Access | Times Cited: 18

Showing 18 citing articles:

Securing the Digital Supply Chain Cyber Threats and Vulnerabilities
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in logistics, operations, and management science book series (2023), pp. 156-223
Closed Access | Times Cited: 20

Future Trends and Emerging Threats in Drone Cybersecurity
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 148-195
Closed Access | Times Cited: 7

Scamming higher ed: An analysis of phishing content and trends
Ethan Morrow
Computers in Human Behavior (2024) Vol. 158, pp. 108274-108274
Open Access | Times Cited: 5

Flow Table Modification Using Behavioral-Based Fingerprinting Technique to Facilitate Zero Trust Identity Management and Access Control
Vinton Morris, Kevin Kornegay
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) (2025), pp. 00307-00314
Closed Access

Understanding Data Privacy and Ethical Considerations in Learning Analytics
C.G. Balaji, G. Rajeswari, Harsh Jain, et al.
IGI Global eBooks (2025), pp. 579-606
Closed Access

Increasing the Security of Network Data Transmission with a Configurable Hardware Firewall Based on Field Programmable Gate Arrays
Marco Grossi, F. Alfonsi, Marco Prandini, et al.
Future Internet (2024) Vol. 16, Iss. 9, pp. 303-303
Open Access | Times Cited: 2

Integrating AI-based and Conventional Cybersecurity Measures into Online Higher Education Settings: Challenges, Opportunities, and Prospects
Medha Mohan Ambali Parambil, Jaloliddin Rustamov, Saeema Ahmed‐Kristensen, et al.
Computers and Education Artificial Intelligence (2024) Vol. 7, pp. 100327-100327
Open Access | Times Cited: 2

A high throughput Intrusion Detection System (IDS) to enhance the security of data transmission among research centers
Marco Grossi, F. Alfonsi, Marco Prandini, et al.
Journal of Instrumentation (2023) Vol. 18, Iss. 12, pp. C12017-C12017
Open Access | Times Cited: 2

Data Security Framework with Cognitive Theory on Higher Education
Drajad Wiryawan, Wisnu Ramadhan, Faldo Krisnata, et al.
(2024), pp. 263-268
Closed Access

Big Image Data 15Vs Model for Intelligent Data Ocean of Multimedia Things
Aminollah Mahabadi, Faezeh Abdolazimi
Research Square (Research Square) (2024)
Open Access

HPC and Cloud Convergence Beyond Technical Boundaries: Strategies for Economic Sustainability, Standardization, and Data Accessibility
Michela Taufer, Daniel J. Milroy, Todd Gamblin, et al.
Computer (2024) Vol. 57, Iss. 6, pp. 128-136
Closed Access

Digital Transformation of Entrepreneurship on a Global Scale Using a Technological Platform
André Silva, Filipe Sousa, Ítalo Miguel Langbehn Rocha, et al.
Springer proceedings in earth and environmental sciences (2024), pp. 93-108
Closed Access

This Is Going on Your Permanent Record: A Legal Analysis of Educational Data in the Cloud
Ben Cohen, Ashley Hu, Deisy Patino, et al.
ACM Journal on Responsible Computing (2024) Vol. 1, Iss. 3, pp. 1-27
Closed Access

Invasive and Creepy Technologies
Rochell R. McWhorter, Mandi M. Laurie
Advances in business information systems and analytics book series (2024), pp. 70-94
Closed Access

Knowledge production and epistemic injustices
Ana Isabel Zermeño Flores, Thomas Tufte, Mabel Andrea Navarrete Vega
MedieKultur Journal of media and communication research (2024) Vol. 40, Iss. 76, pp. 120-138
Open Access

Hybrid quantum enhanced federated learning for cyber attack detection
G. Ganesan Subramanian, M. Chinnadurai
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access

COMPARISON OF SPELL CORRECTION IN BAHASA INDONESIA: PETER NORVIG, LSTM, AND N-GRAM
Anggasta Tirta Adi Kusuma, Chanifah Indah Ratnasari
JIKO (Jurnal Informatika dan Komputer) (2023) Vol. 6, Iss. 3, pp. 214-220
Open Access | Times Cited: 1

Page 1

Scroll to top