
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Assessing nation‐state‐sponsored cyberattacks using aspects of Situational Crime Prevention
Thomas J. Holt, Mae Griffith, Noah D. Turner, et al.
Criminology & Public Policy (2023) Vol. 22, Iss. 4, pp. 825-848
Open Access | Times Cited: 7
Thomas J. Holt, Mae Griffith, Noah D. Turner, et al.
Criminology & Public Policy (2023) Vol. 22, Iss. 4, pp. 825-848
Open Access | Times Cited: 7
Showing 7 citing articles:
Stolen Valor? Examining the Associations Between Military Service, Data Breach Victimization, and Identity Theft Victimization
Cooper A. Maher, Thomas J. Holt
Crime & Delinquency (2025)
Closed Access
Cooper A. Maher, Thomas J. Holt
Crime & Delinquency (2025)
Closed Access
Vendor Communication Themes in Darknet Ransomware-as-a-Service (RaaS) Advertisements
Taylor Fisher, Zacharias P. Pieri, C. Jordan Howell, et al.
Computers in Human Behavior (2025), pp. 108571-108571
Closed Access
Taylor Fisher, Zacharias P. Pieri, C. Jordan Howell, et al.
Computers in Human Behavior (2025), pp. 108571-108571
Closed Access
The types of hackers and cyberattacks in the aviation industry
Lázaro Florido-Benítez
Journal of Transportation Security (2024) Vol. 17, Iss. 1
Open Access | Times Cited: 4
Lázaro Florido-Benítez
Journal of Transportation Security (2024) Vol. 17, Iss. 1
Open Access | Times Cited: 4
Explainable deep learning approach for advanced persistent threats (APTs) detection in cybersecurity: a review
Noor Hazlina Abdul Mutalib, Aznul Qalid Md Sabri, Ainuddin Wahid Abdul Wahab, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 11
Open Access | Times Cited: 4
Noor Hazlina Abdul Mutalib, Aznul Qalid Md Sabri, Ainuddin Wahid Abdul Wahab, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 11
Open Access | Times Cited: 4
Mapping the landscape of government data breaches: A bibliometric analysis of literature from 2006 to 2023
Supardi Hamid, Mohammad Nurul Huda
Social Sciences & Humanities Open (2024) Vol. 11, pp. 101234-101234
Open Access | Times Cited: 3
Supardi Hamid, Mohammad Nurul Huda
Social Sciences & Humanities Open (2024) Vol. 11, pp. 101234-101234
Open Access | Times Cited: 3
A Review of Artificial Intelligence Techniques for Improved Cloud and IoT Security
Kassim Kalinaki, Wasswa Shafik, Magezi Masha, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 38-68
Closed Access | Times Cited: 1
Kassim Kalinaki, Wasswa Shafik, Magezi Masha, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 38-68
Closed Access | Times Cited: 1
Examining the factors that impact the severity of cyberattacks on critical infrastructures
Yaman Roumani, Mais Alraee
Computers & Security (2024) Vol. 148, pp. 104074-104074
Closed Access
Yaman Roumani, Mais Alraee
Computers & Security (2024) Vol. 148, pp. 104074-104074
Closed Access