
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Systematic Mapping Study on Security Approaches in Secure Software Engineering
Rafiq Ahmad Khan, Siffat Ullah Khan, Habib Ullah Khan, et al.
IEEE Access (2021) Vol. 9, pp. 19139-19160
Open Access | Times Cited: 56
Rafiq Ahmad Khan, Siffat Ullah Khan, Habib Ullah Khan, et al.
IEEE Access (2021) Vol. 9, pp. 19139-19160
Open Access | Times Cited: 56
Showing 1-25 of 56 citing articles:
Explainable Security Requirements Classification Through Transformer Models
Luca Petrillo, Fabio Martinelli, Antonella Santone, et al.
Future Internet (2025) Vol. 17, Iss. 1, pp. 15-15
Open Access | Times Cited: 2
Luca Petrillo, Fabio Martinelli, Antonella Santone, et al.
Future Internet (2025) Vol. 17, Iss. 1, pp. 15-15
Open Access | Times Cited: 2
Systematic Literature Review on Security Risks and its Practices in Secure Software Development
Rafiq Ahmad Khan, Siffat Ullah Khan, Habib Ullah Khan, et al.
IEEE Access (2022) Vol. 10, pp. 5456-5481
Open Access | Times Cited: 55
Rafiq Ahmad Khan, Siffat Ullah Khan, Habib Ullah Khan, et al.
IEEE Access (2022) Vol. 10, pp. 5456-5481
Open Access | Times Cited: 55
Security Threat and Vulnerability Assessment and Measurement in Secure Software Development
Mamoona Humayun, N. Z. Jhanjhi, Maram Fahhad Almufareh, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 71, Iss. 3, pp. 5039-5059
Open Access | Times Cited: 26
Mamoona Humayun, N. Z. Jhanjhi, Maram Fahhad Almufareh, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 71, Iss. 3, pp. 5039-5059
Open Access | Times Cited: 26
A Fuzzy‐AHP Decision‐Making Framework for Optimizing Software Maintenance and Deployment in Information Security Systems
Rafiq Ahmad Khan, Ismail Keshta, Hussein Al Hashimi, et al.
Journal of Software Evolution and Process (2025) Vol. 37, Iss. 1
Closed Access
Rafiq Ahmad Khan, Ismail Keshta, Hussein Al Hashimi, et al.
Journal of Software Evolution and Process (2025) Vol. 37, Iss. 1
Closed Access
Security Assurance Model of Software Development for Global Software Development Vendors
Rafiq Ahmad Khan, Siffat Ullah Khan, Musaad Alzahrani, et al.
IEEE Access (2022) Vol. 10, pp. 58458-58487
Open Access | Times Cited: 22
Rafiq Ahmad Khan, Siffat Ullah Khan, Musaad Alzahrani, et al.
IEEE Access (2022) Vol. 10, pp. 58458-58487
Open Access | Times Cited: 22
Design and Development of Artificial Intelligence Knowledge Processing System for Optimizing Security of Software System
Raghavendra Rao Althar, Debabrata Samanta, Sathvik Purushotham, et al.
SN Computer Science (2023) Vol. 4, Iss. 4
Open Access | Times Cited: 11
Raghavendra Rao Althar, Debabrata Samanta, Sathvik Purushotham, et al.
SN Computer Science (2023) Vol. 4, Iss. 4
Open Access | Times Cited: 11
5G Networks Security Mitigation Model: An ANN-ISM Hybrid Approach
Rafiq Ahmad Khan, Habib Ullah Khan, Hathal Salamah Alwageed, et al.
IEEE Open Journal of the Communications Society (2025) Vol. 6, pp. 881-925
Open Access
Rafiq Ahmad Khan, Habib Ullah Khan, Hathal Salamah Alwageed, et al.
IEEE Open Journal of the Communications Society (2025) Vol. 6, pp. 881-925
Open Access
XGV-BERT: Leveraging contextualized language model and graph neural network for efficient software vulnerability detection
Vu Le Anh Quan, Chau Thuan Phat, Kiet Van Nguyen, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 6
Closed Access
Vu Le Anh Quan, Chau Thuan Phat, Kiet Van Nguyen, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 6
Closed Access
NON-PERFORMING LOANS, MACROECONOMIC AND BANK-SPECIFIC VARIABLES IN SOUTHEAST ASIA DURING COVID-19 PANDEMIC
Ooi Kok Loang, Zamri Ahmad, R. V. Naveenan
The Singapore Economic Review (2022) Vol. 68, Iss. 03, pp. 941-961
Closed Access | Times Cited: 15
Ooi Kok Loang, Zamri Ahmad, R. V. Naveenan
The Singapore Economic Review (2022) Vol. 68, Iss. 03, pp. 941-961
Closed Access | Times Cited: 15
SECURE SOFTWARE DEVELOPMENT LIFECYCLE: A CASE FOR ADOPTION IN SOFTWARE SMES
Wisdom Umeugo
International Journal of Advanced Research in Computer Science (2023) Vol. 14, Iss. 01, pp. 5-12
Open Access | Times Cited: 8
Wisdom Umeugo
International Journal of Advanced Research in Computer Science (2023) Vol. 14, Iss. 01, pp. 5-12
Open Access | Times Cited: 8
Secure software design evaluation and decision making model for ubiquitous computing: A two-stage ANN-Fuzzy AHP approach
Abdulrahman Alzahrani, Rafiq Ahmad Khan
Computers in Human Behavior (2023) Vol. 153, pp. 108109-108109
Closed Access | Times Cited: 7
Abdulrahman Alzahrani, Rafiq Ahmad Khan
Computers in Human Behavior (2023) Vol. 153, pp. 108109-108109
Closed Access | Times Cited: 7
Analysis of Strategies for the Integration of Security Practices in Agile Software Development: A Sustainable SME Approach
Yolanda Valdés, Jorge Hochstetter, Mauricio Diéguez, et al.
IEEE Access (2024) Vol. 12, pp. 35204-35230
Open Access | Times Cited: 2
Yolanda Valdés, Jorge Hochstetter, Mauricio Diéguez, et al.
IEEE Access (2024) Vol. 12, pp. 35204-35230
Open Access | Times Cited: 2
Synthesizing secure software development activities for linear and agile lifecycle models
Mamdouh Alenezi, Hamid Abdul Basit, Maham Anwar Beg, et al.
Software Practice and Experience (2022) Vol. 52, Iss. 6, pp. 1426-1453
Closed Access | Times Cited: 11
Mamdouh Alenezi, Hamid Abdul Basit, Maham Anwar Beg, et al.
Software Practice and Experience (2022) Vol. 52, Iss. 6, pp. 1426-1453
Closed Access | Times Cited: 11
Security risks of global software development life cycle: Industry practitioner's perspective
Rafiq Ahmad Khan, Siffat Ullah Khan, Muhammad Azeem Akbar, et al.
Journal of Software Evolution and Process (2022) Vol. 36, Iss. 3
Open Access | Times Cited: 11
Rafiq Ahmad Khan, Siffat Ullah Khan, Muhammad Azeem Akbar, et al.
Journal of Software Evolution and Process (2022) Vol. 36, Iss. 3
Open Access | Times Cited: 11
Toward a readiness model for secure software coding
Mamoona Humayun, Mahmood Niazi, N. Z. Jhanjhi, et al.
Software Practice and Experience (2022) Vol. 53, Iss. 4, pp. 1013-1035
Closed Access | Times Cited: 9
Mamoona Humayun, Mahmood Niazi, N. Z. Jhanjhi, et al.
Software Practice and Experience (2022) Vol. 53, Iss. 4, pp. 1013-1035
Closed Access | Times Cited: 9
Exploring How to Apply Secure Software Design Principles
Shouki A. Ebad
IEEE Access (2022) Vol. 10, pp. 128983-128993
Open Access | Times Cited: 9
Shouki A. Ebad
IEEE Access (2022) Vol. 10, pp. 128983-128993
Open Access | Times Cited: 9
Challenges and Practices Identification via a Systematic Literature Review in the Adoption of Green Cloud Computing: Client’s Side Approach
Ashfaq Ahmad, Siffat Ullah Khan, Habib Ullah Khan, et al.
IEEE Access (2021) Vol. 9, pp. 81828-81840
Open Access | Times Cited: 11
Ashfaq Ahmad, Siffat Ullah Khan, Habib Ullah Khan, et al.
IEEE Access (2021) Vol. 9, pp. 81828-81840
Open Access | Times Cited: 11
Theory and practice in secure software development lifecycle: A comprehensive survey
Martin Otieno, David Odera, Jairus Ekume Ounza
World Journal of Advanced Research and Reviews (2023) Vol. 18, Iss. 3, pp. 053-078
Open Access | Times Cited: 4
Martin Otieno, David Odera, Jairus Ekume Ounza
World Journal of Advanced Research and Reviews (2023) Vol. 18, Iss. 3, pp. 053-078
Open Access | Times Cited: 4
Green cloud computing adoption challenges and practices: a client’s perspective-based empirical investigation
Ashfaq Ahmad, Rafiq Ahmad Khan, Siffat Ullah Khan, et al.
Cognition Technology & Work (2023) Vol. 25, Iss. 4, pp. 427-446
Open Access | Times Cited: 4
Ashfaq Ahmad, Rafiq Ahmad Khan, Siffat Ullah Khan, et al.
Cognition Technology & Work (2023) Vol. 25, Iss. 4, pp. 427-446
Open Access | Times Cited: 4
A Novel Framework for Information Security During the SDLC Implementation Stage: A Systematic Literature Review
Mikael Octavinus Chan, Setiadi Yazid
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) (2024) Vol. 8, Iss. 1, pp. 88-99
Open Access | Times Cited: 1
Mikael Octavinus Chan, Setiadi Yazid
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) (2024) Vol. 8, Iss. 1, pp. 88-99
Open Access | Times Cited: 1
Security Assurance in the Software Development Process: A Systematic Literature Review
Kedir Lemma Arega, Asrat Mulatu Beyene, Sofonias Yitagesu
Communications in computer and information science (2024), pp. 16-30
Closed Access | Times Cited: 1
Kedir Lemma Arega, Asrat Mulatu Beyene, Sofonias Yitagesu
Communications in computer and information science (2024), pp. 16-30
Closed Access | Times Cited: 1
Automated Security Findings Management: A Case Study in Industrial DevOps
Markus Voggenreiter, Florian Angermeir, Fabiola Moyón, et al.
(2024)
Open Access | Times Cited: 1
Markus Voggenreiter, Florian Angermeir, Fabiola Moyón, et al.
(2024)
Open Access | Times Cited: 1
Securing Software Development through People Maturity: A Fuzzy-AHP Decision Making Framework
Hussein Al Hashimi, Alaa Omran Almagrabi, Hathal Salamah Alwageed, et al.
(2024)
Open Access | Times Cited: 1
Hussein Al Hashimi, Alaa Omran Almagrabi, Hathal Salamah Alwageed, et al.
(2024)
Open Access | Times Cited: 1
An empirical study for mitigating sustainable cloud computing challenges using ISM-ANN
Hathal Salamah Alwageed, Ismail Keshta, Rafiq Ahmad Khan, et al.
PLoS ONE (2024) Vol. 19, Iss. 9, pp. e0308971-e0308971
Open Access | Times Cited: 1
Hathal Salamah Alwageed, Ismail Keshta, Rafiq Ahmad Khan, et al.
PLoS ONE (2024) Vol. 19, Iss. 9, pp. e0308971-e0308971
Open Access | Times Cited: 1
Exploring Security Procedures in Secure Software Engineering: A Systematic Mapping Study
Rafiq Ahmad Khan, Siffat Ullah Khan, Muhammad Ilyas
(2022), pp. 433-439
Closed Access | Times Cited: 7
Rafiq Ahmad Khan, Siffat Ullah Khan, Muhammad Ilyas
(2022), pp. 433-439
Closed Access | Times Cited: 7