OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Backwards from zero: How the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity
Marcelo Mesquita Leal, Paul Musgrave
Contemporary Security Policy (2023) Vol. 44, Iss. 3, pp. 437-461
Closed Access | Times Cited: 8

Showing 8 citing articles:

Securing the Digital Supply Chain Cyber Threats and Vulnerabilities
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in logistics, operations, and management science book series (2023), pp. 156-223
Closed Access | Times Cited: 20

What drives new knowledge in human cybersecurity behavior? Insights from bibliometrics and thematic review
Dragoș M. Obreja, Răzvan Rughiniş, Dinu Țurcanu
Computers in Human Behavior Reports (2025), pp. 100650-100650
Open Access

Examining cybersecurity culture in Leon city organizations: Insights from 2022
Francisco Javier García Arellano, ítalo Donoso Barraza, Angélica Flores Bustos, et al.
Ingeniare. Revista chilena de ingeniería (2024) Vol. 32
Open Access | Times Cited: 1

Zero-Day Vulnerabilities: Unveiling the Threat Landscape in Network Security
Raheela zaib
Deleted Journal (2022), pp. 57-64
Open Access | Times Cited: 7

The limits of cyberattacks in eroding political trust: A tripartite survey experiment
Sharon Matzkin, Ryan Shandler, Daphna Canetti
The British Journal of Politics and International Relations (2023) Vol. 26, Iss. 4, pp. 1033-1054
Open Access | Times Cited: 3

Bridging the Gap: A Survey and Classification of Research-Informed Ethical Hacking Tools
Paolo Modesti, Lewis Golightly, Louis Holmes, et al.
Journal of Cybersecurity and Privacy (2024) Vol. 4, Iss. 3, pp. 410-448
Open Access


Charles Kriel, Steve Bannon, Mark Alfano, et al.
Defence Strategic Communications (2024) Vol. 13
Open Access

Page 1

Scroll to top