
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
User Safety and Security in the Metaverse: A Critical Review
Saurabh Sharma, Jaiteg Singh, Ankur Gupta, et al.
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 5467-5487
Open Access | Times Cited: 13
Saurabh Sharma, Jaiteg Singh, Ankur Gupta, et al.
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 5467-5487
Open Access | Times Cited: 13
Showing 13 citing articles:
The Future of Education: A Multi-Layered Metaverse Classroom Model for Immersive and Inclusive Learning
Leyli Nouraei Yeganeh, Nicole S. Fenty, Yu Chen, et al.
Future Internet (2025) Vol. 17, Iss. 2, pp. 63-63
Open Access | Times Cited: 1
Leyli Nouraei Yeganeh, Nicole S. Fenty, Yu Chen, et al.
Future Internet (2025) Vol. 17, Iss. 2, pp. 63-63
Open Access | Times Cited: 1
Security and Privacy in Physical–Digital Environments: Trends and Opportunities
Carolina Alves Pereira, Anabela Marto, Roberto Ribeiro, et al.
Future Internet (2025) Vol. 17, Iss. 2, pp. 83-83
Open Access
Carolina Alves Pereira, Anabela Marto, Roberto Ribeiro, et al.
Future Internet (2025) Vol. 17, Iss. 2, pp. 83-83
Open Access
A study on Metaverse risk factors and user risk perception in South Korea
Seon Mi Shin, Jae-Hee Park
Telecommunications Policy (2025), pp. 102911-102911
Closed Access
Seon Mi Shin, Jae-Hee Park
Telecommunications Policy (2025), pp. 102911-102911
Closed Access
A Mini Review on Purchaser Security in the Metaverse: Challenges and Solutions
Mohammad Aloudat, Mahmoud Barhamgi, Elias Yaacoub
Lecture notes in computer science (2025), pp. 61-74
Closed Access
Mohammad Aloudat, Mahmoud Barhamgi, Elias Yaacoub
Lecture notes in computer science (2025), pp. 61-74
Closed Access
Reconceptualizing the metaverse: A taxonomy for user experience analysis and insights from real-world platforms
S. Park, Dongjae Kim, E. Jeong, et al.
Technology in Society (2025), pp. 102852-102852
Closed Access
S. Park, Dongjae Kim, E. Jeong, et al.
Technology in Society (2025), pp. 102852-102852
Closed Access
Comprehensive survey on resource allocation for edge-computing-enabled metaverse
Tanmay Baidya, Sangman Moh
Computer Science Review (2024) Vol. 54, pp. 100680-100680
Closed Access | Times Cited: 4
Tanmay Baidya, Sangman Moh
Computer Science Review (2024) Vol. 54, pp. 100680-100680
Closed Access | Times Cited: 4
Unlocking the Potential of Interconnected Blockchains: A Comprehensive Study of Cosmos Blockchain Interoperability
Mritunjay Shall Peelam, Brijesh Kumar Chaurasia, Aditya Kumar Sharma, et al.
IEEE Access (2024) Vol. 12, pp. 171753-171776
Open Access | Times Cited: 2
Mritunjay Shall Peelam, Brijesh Kumar Chaurasia, Aditya Kumar Sharma, et al.
IEEE Access (2024) Vol. 12, pp. 171753-171776
Open Access | Times Cited: 2
Metaverse Security Paradigms
Sreerakuvandana Sreerakuvandana, Princy Pappachan, Ritika Bansal
Advances in information security, privacy, and ethics book series (2024), pp. 228-252
Closed Access | Times Cited: 1
Sreerakuvandana Sreerakuvandana, Princy Pappachan, Ritika Bansal
Advances in information security, privacy, and ethics book series (2024), pp. 228-252
Closed Access | Times Cited: 1
Biometrics in extended reality: a review
Ayush Agarwal, Raghavendra Ramachandra, Sushma Venkatesh, et al.
Discover Artificial Intelligence (2024) Vol. 4, Iss. 1
Open Access
Ayush Agarwal, Raghavendra Ramachandra, Sushma Venkatesh, et al.
Discover Artificial Intelligence (2024) Vol. 4, Iss. 1
Open Access
Cyber Threats and Safeguarding Strategies in Metaverse Libraries: A Systematic Review
Bolaji David Oladokun, Ebiere Diana Orubebe, Yusuf Ayodeji Ajani, et al.
Southern African Journal of Security (2024)
Closed Access
Bolaji David Oladokun, Ebiere Diana Orubebe, Yusuf Ayodeji Ajani, et al.
Southern African Journal of Security (2024)
Closed Access
AI-Driven Security Measures in Virtual Worlds
Akshat Gaurav, Kwok Tai Chui
Advances in information security, privacy, and ethics book series (2024), pp. 39-53
Closed Access
Akshat Gaurav, Kwok Tai Chui
Advances in information security, privacy, and ethics book series (2024), pp. 39-53
Closed Access
Infrastructure and Network Security
Mosiur Rahaman, Sai Sravanthi Bakkireddygari, Sourasis Chattopadhyay, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 108-144
Closed Access
Mosiur Rahaman, Sai Sravanthi Bakkireddygari, Sourasis Chattopadhyay, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 108-144
Closed Access
Privacy-Preserving Techniques and User Anonymity in the Metaverse
Brij B. Gupta, Chunjia Han, Priyanka Chaurasia
Advances in information security, privacy, and ethics book series (2024), pp. 304-317
Closed Access
Brij B. Gupta, Chunjia Han, Priyanka Chaurasia
Advances in information security, privacy, and ethics book series (2024), pp. 304-317
Closed Access