OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Comparative Study of Web Application Security Parameters: Current Trends and Future Directions
Jahanzeb Shahid, Muhammad Khurram Hameed, Ibrahim Tariq Javed, et al.
Applied Sciences (2022) Vol. 12, Iss. 8, pp. 4077-4077
Open Access | Times Cited: 39

Showing 1-25 of 39 citing articles:

Vulnerability Scanning Tools for Web Application Security Frameworks
Saud Altaf, Imdad Ali Shah, A Shah
IGI Global eBooks (2025), pp. 65-86
Closed Access

Uncovering the Risk of Academic Information System Vulnerability through PTES and OWASP Method
Ferzha Putra Utama, Raden Muhammad Hilmi Nurhadi
CommIT (Communication and Information Technology) Journal (2024) Vol. 18, Iss. 1, pp. 39-51
Open Access | Times Cited: 2

Application layer security for Internet communications: A comprehensive review, challenges, and future trends
David Cevallos-Salas, José Estrada-Jiménez, Danny S. Guamán
Computers & Electrical Engineering (2024) Vol. 119, pp. 109498-109498
Closed Access | Times Cited: 2

Enhancing Web Application Security through Automated Penetration Testing with Multiple Vulnerability Scanners
Khaled Abdulghaffar, Nebrase Elmrabit, M. Yousefi
Computers (2023) Vol. 12, Iss. 11, pp. 235-235
Open Access | Times Cited: 5

Navigating Web Application Security: A Survey of Vulnerabilities and Detection Solutions
Agnija Onukrane, Heinrihs Kristians Skrodelis, Gaļina Merkurjeva, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 5

Feasibility Analysis of Bengkel Koding Website Using Black Box Testing and Boundary Value Analysis
Clara Edrea Evelyna Sony Putri, Ajib Susanto
SinkrOn (2024) Vol. 8, Iss. 2, pp. 764-776
Open Access | Times Cited: 1

Systematic literature review on security misconfigurations in web applications
Samuel Luna Martins, Felipe Mendes da Cruz, Rogério Pontes de Araújo, et al.
International Journal of Computers and Applications (2024) Vol. 46, Iss. 10, pp. 840-852
Closed Access | Times Cited: 1

AlphaSecure: A state of the art framework for Web Application Vulnerabilities Detection and Patch Recommendation Using Automated Techniques
Kushagra Ojha, Aryan Mishra, Riya Mishra, et al.
(2024), pp. 601-611
Closed Access | Times Cited: 1

BACAD: AI-based framework for detecting vertical broken access control attacks
Ahmed Anas, Ayman Alhelbawy, Shimaa Gamal, et al.
Egyptian Informatics Journal (2024) Vol. 28, pp. 100571-100571
Closed Access | Times Cited: 1

Effectiveness of Using OWASP TOP 10 as AppSec Standard
Teodora Petranović, Nikola Žarić
(2023), pp. 1-4
Closed Access | Times Cited: 2

Review of the security challenges in web-based systems
Odiaga Gloria Awuor
World Journal of Advanced Engineering Technology and Sciences (2023) Vol. 8, Iss. 2, pp. 204-216
Open Access | Times Cited: 2

The Reality of Internet Infrastructure and Services Defacement: A Second Look at Characterizing Web-Based Vulnerabilities
Neaimh Albalawi, Norah Alamrani, Rasha Aloufi, et al.
Electronics (2023) Vol. 12, Iss. 12, pp. 2664-2664
Open Access | Times Cited: 2

CYBERSECURITY ANALYSIS OF WEB-ORIENTED INDUSTRIAL IOT-SYSTEMS
Eugene Merzlikin, Eugene Babeshko
Innovative technologies and scientific solutions for industries (2023), Iss. 2 (24), pp. 131-144
Open Access | Times Cited: 2

Cyber-Attack Analysis Using Vulnerability Assessment and Penetration Testing
Vijayashree Budyal, Atul Vaibhav, C. U. Akshay, et al.
Lecture notes in networks and systems (2024), pp. 123-134
Closed Access

Strategies for Building and Maintaining Secure Web Applications
C. Sathiyapriyan, B. V. Manikandan, S. Gokul, et al.
(2024), pp. 803-809
Closed Access

Web Application Vulnerability Analysis Using the OWASP Method (Case Study: OJS CSFD UIN Sunan Kalijaga Yogyakarta)
Bad’ul Hilmi Arromdoni, Mandahadi Kusuma, Bambang Sugiantoro
Engineering headway (2024) Vol. 6, pp. 211-218
Closed Access

Countering DDoS threats: leveraging ensemble methods for detection and mitigation
Zafar Iqbal
Lahore Garrison University Research Journal of Computer Science and Information Technology (2024) Vol. 8, Iss. 1
Open Access

ORAT - An Open Redirect Analysis Tool
José Martinho, Diogo Mendes, Pedro Pinto
(2024), pp. 1-5
Closed Access

Application of the OWASP Framework to Identify and Remediate Vulnerabilities in Java Web Applications
Francisco Hilario, Diego Chang, Carla Zafra, et al.
Journal of System and Management Sciences (2024)
Open Access

SQL Injection Attack Detection Using Machine Learning Techniques
Abeer Alkhalaf, Bassel Alkhatib, S. Ghanem
Lecture notes in networks and systems (2024), pp. 145-156
Closed Access

Bridging the Gap: A Survey and Classification of Research-Informed Ethical Hacking Tools
Paolo Modesti, Lewis Golightly, Louis Holmes, et al.
Journal of Cybersecurity and Privacy (2024) Vol. 4, Iss. 3, pp. 410-448
Open Access

ENSURING INFORMATION SECURITY IN THE INTELLIGENT SCIENTIFIC AND TECHNICAL INFORMATION SYSTEMS
Komil F. Kerimov, Zarina Azizova, Fayzi Bekkamov, et al.
Environment Technology Resources Proceedings of the International Scientific and Practical Conference (2024) Vol. 2, pp. 150-154
Open Access

Ensuring Web Application Security: An OWASP Driven Development Methodology
M. Sakthivel, S. Sivanantham, N. Bharathiraja, et al.
(2024), pp. 1-7
Closed Access

Introduction to Generative AI in Web Engineering
Poornima Mahadevappa, Syeda Mariam Muzammal, Muhammad Tayyab
Advances in web technologies and engineering book series (2024), pp. 297-330
Closed Access

Page 1 - Next Page

Scroll to top