OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Security Threats, Countermeasures, and Challenges of Digital Supply Chains
Badis Hammi, Sherali Zeadally, Jamel Nebhen
ACM Computing Surveys (2023) Vol. 55, Iss. 14s, pp. 1-40
Closed Access | Times Cited: 36

Showing 1-25 of 36 citing articles:

Data Security and Privacy Concerns in Drone Operations
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 236-290
Closed Access | Times Cited: 18

Effect of Adopting AI to Explore Big Data on Personally Identifiable Information (PII) for Financial and Economic Data Transformation
Samuel Oladiipo Olabanji, Oluseun Babatunde Oladoyinbo, Christopher Uzoma Asonze, et al.
Asian Journal of Economics Business and Accounting (2024) Vol. 24, Iss. 4, pp. 106-125
Open Access | Times Cited: 16

Integrating sustainability into cybersecurity: insights from machine learning based topic modeling
Krishnashree Achuthan, Sriram Sankaran, Swapnoneel Roy, et al.
Discover Sustainability (2025) Vol. 6, Iss. 1
Open Access | Times Cited: 3

Cybersecurity Measures for Logistics Industry
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 1-58
Closed Access | Times Cited: 13

Local Government Cybersecurity Landscape: A Systematic Review and Conceptual Framework
Sk Tahsin Hossain, Tan Yiğitcanlar, Kien Nguyen, et al.
Applied Sciences (2024) Vol. 14, Iss. 13, pp. 5501-5501
Open Access | Times Cited: 12

Securing the Digital Supply Chain Cyber Threats and Vulnerabilities
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in logistics, operations, and management science book series (2023), pp. 156-223
Closed Access | Times Cited: 20

IT Risk Management: Towards a System for Enhancing Objectivity in Asset Valuation That Engenders a Security Culture
Bilgin Metin, Sefa Duran, Eda Telli, et al.
Information (2024) Vol. 15, Iss. 1, pp. 55-55
Open Access | Times Cited: 4

Blockchain Technology in the Healthcare Sector: Overview and Security Analysis
Nour El Madhoun, Badis Hammi
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) (2024), pp. 0439-0446
Open Access | Times Cited: 4

An anomaly-based approach for cyber-physical threat detection using network and sensor data
Roberto Canonico, Giovanni Esposito, Annalisa Navarro, et al.
Computer Communications (2025), pp. 108087-108087
Open Access

Cyber Security in Healthcare Systems: A Review of Tools and Attack Mitigation Techniques
Kousik Barik, Sanjay Misra, Sabarathinam Chockalingam
Communications in computer and information science (2025), pp. 87-105
Closed Access

Consumer electronics supply chain poisoning: anatomizing the unified hardware and software threat model and countermeasures
Aditya K Sood, Sherali Zeadally
Information Security Journal A Global Perspective (2025), pp. 1-10
Closed Access

Automatic Software Vulnerability Detection in Binary Code
Shigang Liu, Lin Li, Xinbo Ban, et al.
Lecture notes in computer science (2025), pp. 148-166
Closed Access

Comprehensive Analysis of Blockchain Technology in the Healthcare Sector and Its Security Implications
Shynar Yelezhanova, Altynbek Seitenov, Aizhan Kenzhegarina, et al.
International Journal of E-Health and Medical Communications (2025) Vol. 15, Iss. 1, pp. 1-45
Open Access

Global supply chains security: a comparative analysis of emerging threats and traceability solutions
Betul Gokkaya, Erisa Karafili, Leonardo Aniello, et al.
Benchmarking An International Journal (2024)
Closed Access | Times Cited: 2

Digital Twins in Healthcare: Security, Privacy, Trust and Safety Challenges
Cecilie Solberg Jørgensen, Ankur Shukla, Basel Katt
Lecture notes in computer science (2024), pp. 140-153
Closed Access | Times Cited: 2

Software Supply-Chain Security: Issues and Countermeasures
Badis Hammi, Sherali Zeadally
Computer (2023) Vol. 56, Iss. 7, pp. 54-66
Open Access | Times Cited: 6

Cybersecurity challenges across sustainable development goals: A comprehensive review
Nur Nabila Mohamed, Bassam Hossam Hassan Abuobied
Sustainable Engineering and Innovation ISSN 2712-0562 (2024) Vol. 6, Iss. 1, pp. 57-86
Open Access | Times Cited: 1

Supply Chain Security, Technological Advancements, and Future Trends
Shahad Altamimi, Qasem Abu Al‐Haija
Advances in information security, privacy, and ethics book series (2024), pp. 211-234
Closed Access | Times Cited: 1

Establishing the robustness of chip trade networks by dynamically considering topology and risk cascading propagation
Yifan Liu, Chunpeng Du, Lei Shi
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1

Cyber Security for Cyber-Physical Systems in Critical Infrastructures: Bibliometrics Analysis and Future Directions
Mahdad Pourmadadkar, Marianna Lezzi, Angelo Corallo
IEEE Transactions on Engineering Management (2024) Vol. 71, pp. 15405-15421
Closed Access | Times Cited: 1

Business-Oriented Security Analysis of 6G for eHealth: An Impact Assessment Approach
Chiara Suraci, Sara Pizzi, Antonella Molinaro, et al.
Sensors (2023) Vol. 23, Iss. 9, pp. 4226-4226
Open Access | Times Cited: 3

Cybersecurity in Local Governments: A Review and Framework of Key Challenges
Sk Tahsin Hossain, Tan Yiğitcanlar, Kien Nguyen, et al.
(2023)
Closed Access | Times Cited: 2

Local Government Cybersecurity Landscape: A Systematic Review and Conceptual Framework
Sk Tahsin Hossain, Tan Yiğitcanlar, Kien Nguyen, et al.
(2023)
Open Access | Times Cited: 2

Page 1 - Next Page

Scroll to top