
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
The intersection of Artificial Intelligence and cybersecurity: Challenges and opportunities
Adewale Daniel Sontan, Segun Victor Samuel
World Journal of Advanced Research and Reviews (2024) Vol. 21, Iss. 2, pp. 1720-1736
Open Access | Times Cited: 32
Adewale Daniel Sontan, Segun Victor Samuel
World Journal of Advanced Research and Reviews (2024) Vol. 21, Iss. 2, pp. 1720-1736
Open Access | Times Cited: 32
Showing 1-25 of 32 citing articles:
CYBERSECURITY CHALLENGES IN THE AGE OF AI: THEORETICAL APPROACHES AND PRACTICAL SOLUTIONS
Babajide Tolulope Familoni
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 3, pp. 703-724
Open Access | Times Cited: 55
Babajide Tolulope Familoni
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 3, pp. 703-724
Open Access | Times Cited: 55
Applying Large Language Model (LLM) for Developing Cybersecurity Policies to Counteract Spear Phishing Attacks on Senior Corporate Managers
Thomas Quinn, Olivia Thompson
Research Square (Research Square) (2024)
Open Access | Times Cited: 13
Thomas Quinn, Olivia Thompson
Research Square (Research Square) (2024)
Open Access | Times Cited: 13
Enhancing Cybersecurity through AI and ML: Strategies, Challenges, and Future Directions
Maryam Roshanaei, Mahir R. Khan, Natalie N. Sylvester
Journal of Information Security (2024) Vol. 15, Iss. 03, pp. 320-339
Open Access | Times Cited: 11
Maryam Roshanaei, Mahir R. Khan, Natalie N. Sylvester
Journal of Information Security (2024) Vol. 15, Iss. 03, pp. 320-339
Open Access | Times Cited: 11
Securing tomorrow: a comprehensive survey on the synergy of Artificial Intelligence and information security
Ehtesham Hashmi, Muhammad Mudassar Yamin, Sule Yildirim Yayilgan
AI and Ethics (2024)
Open Access | Times Cited: 11
Ehtesham Hashmi, Muhammad Mudassar Yamin, Sule Yildirim Yayilgan
AI and Ethics (2024)
Open Access | Times Cited: 11
AI-driven fusion with cybersecurity: Exploring current trends, advanced techniques, future directions, and policy implications for evolving paradigms– A comprehensive review
Sijjad Ali, Jia Wang, Victor Chung Ming Leung
Information Fusion (2025), pp. 102922-102922
Closed Access | Times Cited: 1
Sijjad Ali, Jia Wang, Victor Chung Ming Leung
Information Fusion (2025), pp. 102922-102922
Closed Access | Times Cited: 1
EMERGING TRENDS IN CYBERSECURITY FOR CRITICAL INFRASTRUCTURE PROTECTION: A COMPREHENSIVE REVIEW
Sontan Adewale Daniel, Samuel Segun Victor
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 3, pp. 576-593
Open Access | Times Cited: 5
Sontan Adewale Daniel, Samuel Segun Victor
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 3, pp. 576-593
Open Access | Times Cited: 5
Examining the Role of Artificial Intelligence in Cyber Security (CS): A Systematic Review for Preventing Prospective Solutions in Financial Transactions
Mahfujur Rahman Faraji, Fisan Shikder, Md. Hasibul Hasan, et al.
International Journal of Religion (2024) Vol. 5, Iss. 10, pp. 4766-4782
Open Access | Times Cited: 5
Mahfujur Rahman Faraji, Fisan Shikder, Md. Hasibul Hasan, et al.
International Journal of Religion (2024) Vol. 5, Iss. 10, pp. 4766-4782
Open Access | Times Cited: 5
Artificial Intelligence (AI) in Cybersecurity: A Revolution in Threat Detection and Prevention
Sandeep Sengupta, Subhajit Roy
Lecture notes in networks and systems (2025), pp. 497-514
Closed Access
Sandeep Sengupta, Subhajit Roy
Lecture notes in networks and systems (2025), pp. 497-514
Closed Access
Ethics For Responsible Data Research: Integrating Cybersecurity Perspectives In Digital Era
Sheetal Temara
SSRN Electronic Journal (2025)
Open Access
Sheetal Temara
SSRN Electronic Journal (2025)
Open Access
The Use of Artificial Intelligence in a Desalination Plant Powered by Renewable Energy
Driss Azdem, Jamal Mabrouki, Souad El Hajjaji
Advances in computational intelligence and robotics book series (2025), pp. 81-94
Closed Access
Driss Azdem, Jamal Mabrouki, Souad El Hajjaji
Advances in computational intelligence and robotics book series (2025), pp. 81-94
Closed Access
AI-Powered Cybersecurity Governance: The Role of Business Analysts in Ethical AI Deployment
Comfort Claire Adaji, Alliy Adewale Bello, Chioma Emmanuela Ukatu, et al.
(2025), pp. 1384-1396
Closed Access
Comfort Claire Adaji, Alliy Adewale Bello, Chioma Emmanuela Ukatu, et al.
(2025), pp. 1384-1396
Closed Access
AI-Powered Cybersecurity Governance: The Role of Business Analysts in Ethical AI Deployment
Comfort Claire Adaji, Alliy Adewale Bello, Chioma Emmanuela Ukatu, et al.
(2025), pp. 1384-1396
Closed Access
Comfort Claire Adaji, Alliy Adewale Bello, Chioma Emmanuela Ukatu, et al.
(2025), pp. 1384-1396
Closed Access
Do geopolitical risks induce a butterfly effect on cybersecurity?
Khalid Khan, Adnan Khurshid, Javier Cifuentes‐Faura
Information Development (2025)
Closed Access
Khalid Khan, Adnan Khurshid, Javier Cifuentes‐Faura
Information Development (2025)
Closed Access
Future Trends in AI Security
Siva Raja Sindiramutty, N. Z. Jhanjhi, Navid Ali Khan
Advances in information security, privacy, and ethics book series (2025), pp. 229-262
Closed Access
Siva Raja Sindiramutty, N. Z. Jhanjhi, Navid Ali Khan
Advances in information security, privacy, and ethics book series (2025), pp. 229-262
Closed Access
Enhancing risk management in hospitals: leveraging artificial intelligence for improved outcomes
Ranieri Guerra
Italian Journal of Medicine (2024) Vol. 18, Iss. 2
Open Access | Times Cited: 3
Ranieri Guerra
Italian Journal of Medicine (2024) Vol. 18, Iss. 2
Open Access | Times Cited: 3
Artificial intelligence, machine learning, and deep learning for cybersecurity solutions: a review of emerging technologies and applications
Mallikarjuna Paramesha, Nitin Liladhar Rane, Jayesh Rane
SSRN Electronic Journal (2024)
Closed Access | Times Cited: 3
Mallikarjuna Paramesha, Nitin Liladhar Rane, Jayesh Rane
SSRN Electronic Journal (2024)
Closed Access | Times Cited: 3
Navigating AI Cybersecurity: Evolving Landscape and Challenges
Maryam Roshanaei, Mahir R. Khan, Natalie N. Sylvester
Journal of Intelligent Learning Systems and Applications (2024) Vol. 16, Iss. 03, pp. 155-174
Open Access | Times Cited: 3
Maryam Roshanaei, Mahir R. Khan, Natalie N. Sylvester
Journal of Intelligent Learning Systems and Applications (2024) Vol. 16, Iss. 03, pp. 155-174
Open Access | Times Cited: 3
Comprehensive review of AI and ML tools for earthquake damage assessment and retrofitting strategies
P. K. S. Bhadauria
Earth Science Informatics (2024) Vol. 17, Iss. 5, pp. 3945-3962
Closed Access | Times Cited: 3
P. K. S. Bhadauria
Earth Science Informatics (2024) Vol. 17, Iss. 5, pp. 3945-3962
Closed Access | Times Cited: 3
Enhancing resilience and security in the U.S. power grid against cyber-physical attacks
Innocent Oshoke. Asevameh, Oladipupo Dopamu, Joseph Seun. Adesiyan
World Journal of Advanced Research and Reviews (2024) Vol. 22, Iss. 2, pp. 1043-1052
Open Access | Times Cited: 2
Innocent Oshoke. Asevameh, Oladipupo Dopamu, Joseph Seun. Adesiyan
World Journal of Advanced Research and Reviews (2024) Vol. 22, Iss. 2, pp. 1043-1052
Open Access | Times Cited: 2
Generative AI for Threat Intelligence and Information Sharing
Siva Raja Sindiramutty, Krishna Raj V. Prabagaran, N. Z. Jhanjhi, et al.
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 191-234
Closed Access | Times Cited: 1
Siva Raja Sindiramutty, Krishna Raj V. Prabagaran, N. Z. Jhanjhi, et al.
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 191-234
Closed Access | Times Cited: 1
Artificial Intelligence and ChatGPT Models in Healthcare
William J. Triplett
Advances in logistics, operations, and management science book series (2024), pp. 35-60
Closed Access
William J. Triplett
Advances in logistics, operations, and management science book series (2024), pp. 35-60
Closed Access
Reviewing the impact of artificial intelligence and machine learning in enhancing IoT applications performance
Oluwaseyi Olakunle Mokuolu
International Journal of Science and Research Archive (2024) Vol. 12, Iss. 2, pp. 2869-2872
Open Access
Oluwaseyi Olakunle Mokuolu
International Journal of Science and Research Archive (2024) Vol. 12, Iss. 2, pp. 2869-2872
Open Access
Case Studies and Applications of Generative AI in Real-World Cybersecurity Scenarios
Azeem Khan, N. Z. Jhanjhi, Ghassan Ahmed Alı, et al.
Advances in human and social aspects of technology book series (2024), pp. 61-100
Closed Access
Azeem Khan, N. Z. Jhanjhi, Ghassan Ahmed Alı, et al.
Advances in human and social aspects of technology book series (2024), pp. 61-100
Closed Access
Managing deepfakes with artificial intelligence: Introducing the business privacy calculus
Giuseppe Vecchietti, Gajendra Liyanaarachchi, Giampaolo Viglia
Journal of Business Research (2024) Vol. 186, pp. 115010-115010
Open Access
Giuseppe Vecchietti, Gajendra Liyanaarachchi, Giampaolo Viglia
Journal of Business Research (2024) Vol. 186, pp. 115010-115010
Open Access
AI Cyber Defense and eBPF
Alex Mathew
World Journal of Advanced Research and Reviews (2024) Vol. 22, Iss. 1, pp. 1983-1989
Open Access
Alex Mathew
World Journal of Advanced Research and Reviews (2024) Vol. 22, Iss. 1, pp. 1983-1989
Open Access