
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Security Threats, Countermeasures, and Challenges of Digital Supply Chains
Badis Hammi, Sherali Zeadally, Jamel Nebhen
ACM Computing Surveys (2023) Vol. 55, Iss. 14s, pp. 1-40
Closed Access | Times Cited: 36
Badis Hammi, Sherali Zeadally, Jamel Nebhen
ACM Computing Surveys (2023) Vol. 55, Iss. 14s, pp. 1-40
Closed Access | Times Cited: 36
Showing 1-25 of 36 citing articles:
Artificial intelligence (AI) cybersecurity dimensions: a comprehensive framework for understanding adversarial and offensive AI
Masike Malatji, Alaa Tolah
AI and Ethics (2024)
Open Access | Times Cited: 31
Masike Malatji, Alaa Tolah
AI and Ethics (2024)
Open Access | Times Cited: 31
Data Security and Privacy Concerns in Drone Operations
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 236-290
Closed Access | Times Cited: 18
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 236-290
Closed Access | Times Cited: 18
Effect of Adopting AI to Explore Big Data on Personally Identifiable Information (PII) for Financial and Economic Data Transformation
Samuel Oladiipo Olabanji, Oluseun Babatunde Oladoyinbo, Christopher Uzoma Asonze, et al.
Asian Journal of Economics Business and Accounting (2024) Vol. 24, Iss. 4, pp. 106-125
Open Access | Times Cited: 16
Samuel Oladiipo Olabanji, Oluseun Babatunde Oladoyinbo, Christopher Uzoma Asonze, et al.
Asian Journal of Economics Business and Accounting (2024) Vol. 24, Iss. 4, pp. 106-125
Open Access | Times Cited: 16
Integrating sustainability into cybersecurity: insights from machine learning based topic modeling
Krishnashree Achuthan, Sriram Sankaran, Swapnoneel Roy, et al.
Discover Sustainability (2025) Vol. 6, Iss. 1
Open Access | Times Cited: 3
Krishnashree Achuthan, Sriram Sankaran, Swapnoneel Roy, et al.
Discover Sustainability (2025) Vol. 6, Iss. 1
Open Access | Times Cited: 3
Cybersecurity Measures for Logistics Industry
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 1-58
Closed Access | Times Cited: 13
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 1-58
Closed Access | Times Cited: 13
Local Government Cybersecurity Landscape: A Systematic Review and Conceptual Framework
Sk Tahsin Hossain, Tan Yiğitcanlar, Kien Nguyen, et al.
Applied Sciences (2024) Vol. 14, Iss. 13, pp. 5501-5501
Open Access | Times Cited: 12
Sk Tahsin Hossain, Tan Yiğitcanlar, Kien Nguyen, et al.
Applied Sciences (2024) Vol. 14, Iss. 13, pp. 5501-5501
Open Access | Times Cited: 12
Securing the Digital Supply Chain Cyber Threats and Vulnerabilities
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in logistics, operations, and management science book series (2023), pp. 156-223
Closed Access | Times Cited: 20
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in logistics, operations, and management science book series (2023), pp. 156-223
Closed Access | Times Cited: 20
IT Risk Management: Towards a System for Enhancing Objectivity in Asset Valuation That Engenders a Security Culture
Bilgin Metin, Sefa Duran, Eda Telli, et al.
Information (2024) Vol. 15, Iss. 1, pp. 55-55
Open Access | Times Cited: 4
Bilgin Metin, Sefa Duran, Eda Telli, et al.
Information (2024) Vol. 15, Iss. 1, pp. 55-55
Open Access | Times Cited: 4
Blockchain Technology in the Healthcare Sector: Overview and Security Analysis
Nour El Madhoun, Badis Hammi
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) (2024), pp. 0439-0446
Open Access | Times Cited: 4
Nour El Madhoun, Badis Hammi
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) (2024), pp. 0439-0446
Open Access | Times Cited: 4
Intelligent Network Element: A Programmable Switch Based on Machine Learning to Defend Against DDoS Attacks
Jingfu Yan, Huachun Zhou, Weilin Wang
Information Systems Frontiers (2025)
Open Access
Jingfu Yan, Huachun Zhou, Weilin Wang
Information Systems Frontiers (2025)
Open Access
An anomaly-based approach for cyber-physical threat detection using network and sensor data
Roberto Canonico, Giovanni Esposito, Annalisa Navarro, et al.
Computer Communications (2025), pp. 108087-108087
Open Access
Roberto Canonico, Giovanni Esposito, Annalisa Navarro, et al.
Computer Communications (2025), pp. 108087-108087
Open Access
Cyber Security in Healthcare Systems: A Review of Tools and Attack Mitigation Techniques
Kousik Barik, Sanjay Misra, Sabarathinam Chockalingam
Communications in computer and information science (2025), pp. 87-105
Closed Access
Kousik Barik, Sanjay Misra, Sabarathinam Chockalingam
Communications in computer and information science (2025), pp. 87-105
Closed Access
Consumer electronics supply chain poisoning: anatomizing the unified hardware and software threat model and countermeasures
Aditya K Sood, Sherali Zeadally
Information Security Journal A Global Perspective (2025), pp. 1-10
Closed Access
Aditya K Sood, Sherali Zeadally
Information Security Journal A Global Perspective (2025), pp. 1-10
Closed Access
Automatic Software Vulnerability Detection in Binary Code
Shigang Liu, Lin Li, Xinbo Ban, et al.
Lecture notes in computer science (2025), pp. 148-166
Closed Access
Shigang Liu, Lin Li, Xinbo Ban, et al.
Lecture notes in computer science (2025), pp. 148-166
Closed Access
Comprehensive Analysis of Blockchain Technology in the Healthcare Sector and Its Security Implications
Shynar Yelezhanova, Altynbek Seitenov, Aizhan Kenzhegarina, et al.
International Journal of E-Health and Medical Communications (2025) Vol. 15, Iss. 1, pp. 1-45
Open Access
Shynar Yelezhanova, Altynbek Seitenov, Aizhan Kenzhegarina, et al.
International Journal of E-Health and Medical Communications (2025) Vol. 15, Iss. 1, pp. 1-45
Open Access
Global supply chains security: a comparative analysis of emerging threats and traceability solutions
Betul Gokkaya, Erisa Karafili, Leonardo Aniello, et al.
Benchmarking An International Journal (2024)
Closed Access | Times Cited: 2
Betul Gokkaya, Erisa Karafili, Leonardo Aniello, et al.
Benchmarking An International Journal (2024)
Closed Access | Times Cited: 2
Digital Twins in Healthcare: Security, Privacy, Trust and Safety Challenges
Cecilie Solberg Jørgensen, Ankur Shukla, Basel Katt
Lecture notes in computer science (2024), pp. 140-153
Closed Access | Times Cited: 2
Cecilie Solberg Jørgensen, Ankur Shukla, Basel Katt
Lecture notes in computer science (2024), pp. 140-153
Closed Access | Times Cited: 2
Software Supply-Chain Security: Issues and Countermeasures
Badis Hammi, Sherali Zeadally
Computer (2023) Vol. 56, Iss. 7, pp. 54-66
Open Access | Times Cited: 6
Badis Hammi, Sherali Zeadally
Computer (2023) Vol. 56, Iss. 7, pp. 54-66
Open Access | Times Cited: 6
Cybersecurity challenges across sustainable development goals: A comprehensive review
Nur Nabila Mohamed, Bassam Hossam Hassan Abuobied
Sustainable Engineering and Innovation ISSN 2712-0562 (2024) Vol. 6, Iss. 1, pp. 57-86
Open Access | Times Cited: 1
Nur Nabila Mohamed, Bassam Hossam Hassan Abuobied
Sustainable Engineering and Innovation ISSN 2712-0562 (2024) Vol. 6, Iss. 1, pp. 57-86
Open Access | Times Cited: 1
Supply Chain Security, Technological Advancements, and Future Trends
Shahad Altamimi, Qasem Abu Al‐Haija
Advances in information security, privacy, and ethics book series (2024), pp. 211-234
Closed Access | Times Cited: 1
Shahad Altamimi, Qasem Abu Al‐Haija
Advances in information security, privacy, and ethics book series (2024), pp. 211-234
Closed Access | Times Cited: 1
Establishing the robustness of chip trade networks by dynamically considering topology and risk cascading propagation
Yifan Liu, Chunpeng Du, Lei Shi
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1
Yifan Liu, Chunpeng Du, Lei Shi
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1
Cyber Security for Cyber-Physical Systems in Critical Infrastructures: Bibliometrics Analysis and Future Directions
Mahdad Pourmadadkar, Marianna Lezzi, Angelo Corallo
IEEE Transactions on Engineering Management (2024) Vol. 71, pp. 15405-15421
Closed Access | Times Cited: 1
Mahdad Pourmadadkar, Marianna Lezzi, Angelo Corallo
IEEE Transactions on Engineering Management (2024) Vol. 71, pp. 15405-15421
Closed Access | Times Cited: 1
Business-Oriented Security Analysis of 6G for eHealth: An Impact Assessment Approach
Chiara Suraci, Sara Pizzi, Antonella Molinaro, et al.
Sensors (2023) Vol. 23, Iss. 9, pp. 4226-4226
Open Access | Times Cited: 3
Chiara Suraci, Sara Pizzi, Antonella Molinaro, et al.
Sensors (2023) Vol. 23, Iss. 9, pp. 4226-4226
Open Access | Times Cited: 3
Cybersecurity in Local Governments: A Review and Framework of Key Challenges
Sk Tahsin Hossain, Tan Yiğitcanlar, Kien Nguyen, et al.
(2023)
Closed Access | Times Cited: 2
Sk Tahsin Hossain, Tan Yiğitcanlar, Kien Nguyen, et al.
(2023)
Closed Access | Times Cited: 2
Local Government Cybersecurity Landscape: A Systematic Review and Conceptual Framework
Sk Tahsin Hossain, Tan Yiğitcanlar, Kien Nguyen, et al.
(2023)
Open Access | Times Cited: 2
Sk Tahsin Hossain, Tan Yiğitcanlar, Kien Nguyen, et al.
(2023)
Open Access | Times Cited: 2