OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

The hidden threat of cyber-attacks – undermining public confidence in government
Ryan Shandler, Miguel Alberto Gomez
Journal of Information Technology & Politics (2022) Vol. 20, Iss. 4, pp. 359-374
Open Access | Times Cited: 51

Showing 1-25 of 51 citing articles:

CYBERSECURITY CHALLENGES IN SMART CITIES: A CASE REVIEW OF AFRICAN METROPOLISES
Islam Ahmad, Anthony Anyanwu, Shedrack Onwusinkwue, et al.
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 2, pp. 254-269
Open Access | Times Cited: 34

Introduction: Cyber-conflict – Moving from speculation to investigation
Ryan Shandler, Daphna Canetti
Journal of Peace Research (2024) Vol. 61, Iss. 1, pp. 3-9
Closed Access | Times Cited: 15

Cyberattacks, Psychological Distress, and Military Escalation: An Internal Meta-Analysis
Ryan Shandler, Michael L. Gross, Daphna Canetti
Journal of Global Security Studies (2022) Vol. 8, Iss. 1
Open Access | Times Cited: 47

Cyberattacks and public opinion – The effect of uncertainty in guiding preferences
Eric Jardine, Nathaniel D. Porter, Ryan Shandler
Journal of Peace Research (2024) Vol. 61, Iss. 1, pp. 103-118
Open Access | Times Cited: 11

GITM: A GINI Index-Based Trust Mechanism to Mitigate and Isolate Sybil Attack in RPL-Enabled Smart Grid Advanced Metering Infrastructures
Muhammad Uzair-ul-Hassan, Noshina Tariq, Amjad Alsirhani, et al.
IEEE Access (2023) Vol. 11, pp. 62697-62720
Open Access | Times Cited: 17

More than malware: unmasking the hidden risk of cybersecurity regulations
Mazaher Kianpour, Shahid Raza
International Cybersecurity Law Review (2024) Vol. 5, Iss. 1, pp. 169-212
Open Access | Times Cited: 7

Cyber-enabled influence operations as a ‘center of gravity’ in cyberconflict: The example of Russian foreign interference in the 2016 US federal election
Jelena Vićić, Erik Gartzke
Journal of Peace Research (2024) Vol. 61, Iss. 1, pp. 10-27
Closed Access | Times Cited: 7

Trust at Risk: The Effect of Proximity to Cyberattacks
Miguel Alberto Gomez, Ryan Shandler
Journal of Global Security Studies (2024) Vol. 9, Iss. 2
Open Access | Times Cited: 6

An intrusion detection model based on Convolutional Kolmogorov-Arnold Networks
Zhen Wang, Anazida Zainal, Maheyzah Md Siraj, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access

A comprehensive framework for cyber threat detection: leveraging AI, NLP, and malware analysis
Nachaat Mohamed
International Journal of Information Technology (2025)
Closed Access

Cybercrime through the public lens: a longitudinal analysis
Krishnashree Achuthan, Sugandh Khobragade, Robin M. Kowalski
Humanities and Social Sciences Communications (2025) Vol. 12, Iss. 1
Open Access

Cyber Security in Healthcare Systems: A Review of Tools and Attack Mitigation Techniques
Kousik Barik, Sanjay Misra, Sabarathinam Chockalingam
Communications in computer and information science (2025), pp. 87-105
Closed Access

Does digital transformation affect systemic risk? Evidence from the banking sector in China
Yawen Li, Yufei Xia, Zhen Sun, et al.
International Review of Financial Analysis (2025), pp. 104137-104137
Closed Access

Cyber Conflict & Domestic Audience Costs
Ryan Shandler
International Interactions (2025), pp. 1-25
Closed Access

Managing cyber harm: a survey of challenges, practices, and opportunities
Ekramul Islam, Carsten Rudolph, Gillian Oliver
Information Security Journal A Global Perspective (2025), pp. 1-31
Open Access

The role of digital governance instruments and internet usage on government stability and regime durability
Nasr G. Elbahnasawy, Ahmad Reshad Osmani, Timothy M. Shaughnessy
Applied Economics (2025), pp. 1-18
Closed Access

Managing cyber risk, a science in the making
Michel M. Dacorogna, Marie Kratz
Scandinavian Actuarial Journal (2023) Vol. 2023, Iss. 10, pp. 1000-1021
Open Access | Times Cited: 12

Public Opinion and Cyberterrorism
Ryan Shandler, Nadiya Kostyuk, Harry Oppenheimer
Public Opinion Quarterly (2023) Vol. 87, Iss. 1, pp. 92-119
Open Access | Times Cited: 10

Systematic Literature Review and Assessment for Cyber Terrorism Communication and Recruitment Activities
Romil Rawat, Josefa Díaz, Francisco Chávez
Studies in big data (2024), pp. 83-108
Closed Access | Times Cited: 3

Backwards from zero: How the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity
Marcelo Mesquita Leal, Paul Musgrave
Contemporary Security Policy (2023) Vol. 44, Iss. 3, pp. 437-461
Closed Access | Times Cited: 8

Building Confidence In A World of Eroding Trust
Jonathan W. Z. Lim, Vrizlynn L. L. Thing
Digital Government Research and Practice (2024) Vol. 5, Iss. 2, pp. 1-17
Open Access | Times Cited: 2

How cyberspace affects international relations: The promise of structural modifiers
Michiel Foulon, Gustav Meibauer
Contemporary Security Policy (2024) Vol. 45, Iss. 3, pp. 426-458
Open Access | Times Cited: 2

Informational inequality: the role of resources and attributes in information security awareness
Gregory Lyon
Information and Computer Security (2023) Vol. 32, Iss. 2, pp. 197-217
Closed Access | Times Cited: 5

The rise of companies in the cyber era and the pursuant shift in national security
Udi Sommer, Eviatar Matania, Nir Hassid
Political Science (2023) Vol. 75, Iss. 2, pp. 140-164
Open Access | Times Cited: 5

Page 1 - Next Page

Scroll to top