
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Comparative Study of Web Application Security Parameters: Current Trends and Future Directions
Jahanzeb Shahid, Muhammad Khurram Hameed, Ibrahim Tariq Javed, et al.
Applied Sciences (2022) Vol. 12, Iss. 8, pp. 4077-4077
Open Access | Times Cited: 39
Jahanzeb Shahid, Muhammad Khurram Hameed, Ibrahim Tariq Javed, et al.
Applied Sciences (2022) Vol. 12, Iss. 8, pp. 4077-4077
Open Access | Times Cited: 39
Showing 1-25 of 39 citing articles:
Vulnerability Scanning Tools for Web Application Security Frameworks
Saud Altaf, Imdad Ali Shah, A Shah
IGI Global eBooks (2025), pp. 65-86
Closed Access
Saud Altaf, Imdad Ali Shah, A Shah
IGI Global eBooks (2025), pp. 65-86
Closed Access
Uncovering the Risk of Academic Information System Vulnerability through PTES and OWASP Method
Ferzha Putra Utama, Raden Muhammad Hilmi Nurhadi
CommIT (Communication and Information Technology) Journal (2024) Vol. 18, Iss. 1, pp. 39-51
Open Access | Times Cited: 2
Ferzha Putra Utama, Raden Muhammad Hilmi Nurhadi
CommIT (Communication and Information Technology) Journal (2024) Vol. 18, Iss. 1, pp. 39-51
Open Access | Times Cited: 2
Application layer security for Internet communications: A comprehensive review, challenges, and future trends
David Cevallos-Salas, José Estrada-Jiménez, Danny S. Guamán
Computers & Electrical Engineering (2024) Vol. 119, pp. 109498-109498
Closed Access | Times Cited: 2
David Cevallos-Salas, José Estrada-Jiménez, Danny S. Guamán
Computers & Electrical Engineering (2024) Vol. 119, pp. 109498-109498
Closed Access | Times Cited: 2
Analisis Metode Open Web Application Security Project (OWASP) Menggunakan Penetration Testing pada Keamanan Website Absensi
Ichsan Octama Riandhanu
Jurnal Informasi dan Teknologi (2022)
Open Access | Times Cited: 9
Ichsan Octama Riandhanu
Jurnal Informasi dan Teknologi (2022)
Open Access | Times Cited: 9
Enhancing Web Application Security through Automated Penetration Testing with Multiple Vulnerability Scanners
Khaled Abdulghaffar, Nebrase Elmrabit, M. Yousefi
Computers (2023) Vol. 12, Iss. 11, pp. 235-235
Open Access | Times Cited: 5
Khaled Abdulghaffar, Nebrase Elmrabit, M. Yousefi
Computers (2023) Vol. 12, Iss. 11, pp. 235-235
Open Access | Times Cited: 5
Navigating Web Application Security: A Survey of Vulnerabilities and Detection Solutions
Agnija Onukrane, Heinrihs Kristians Skrodelis, Gaļina Merkurjeva, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 5
Agnija Onukrane, Heinrihs Kristians Skrodelis, Gaļina Merkurjeva, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 5
Feasibility Analysis of Bengkel Koding Website Using Black Box Testing and Boundary Value Analysis
Clara Edrea Evelyna Sony Putri, Ajib Susanto
SinkrOn (2024) Vol. 8, Iss. 2, pp. 764-776
Open Access | Times Cited: 1
Clara Edrea Evelyna Sony Putri, Ajib Susanto
SinkrOn (2024) Vol. 8, Iss. 2, pp. 764-776
Open Access | Times Cited: 1
Systematic literature review on security misconfigurations in web applications
Samuel Luna Martins, Felipe Mendes da Cruz, Rogério Pontes de Araújo, et al.
International Journal of Computers and Applications (2024) Vol. 46, Iss. 10, pp. 840-852
Closed Access | Times Cited: 1
Samuel Luna Martins, Felipe Mendes da Cruz, Rogério Pontes de Araújo, et al.
International Journal of Computers and Applications (2024) Vol. 46, Iss. 10, pp. 840-852
Closed Access | Times Cited: 1
AlphaSecure: A state of the art framework for Web Application Vulnerabilities Detection and Patch Recommendation Using Automated Techniques
Kushagra Ojha, Aryan Mishra, Riya Mishra, et al.
(2024), pp. 601-611
Closed Access | Times Cited: 1
Kushagra Ojha, Aryan Mishra, Riya Mishra, et al.
(2024), pp. 601-611
Closed Access | Times Cited: 1
BACAD: AI-based framework for detecting vertical broken access control attacks
Ahmed Anas, Ayman Alhelbawy, Shimaa Gamal, et al.
Egyptian Informatics Journal (2024) Vol. 28, pp. 100571-100571
Closed Access | Times Cited: 1
Ahmed Anas, Ayman Alhelbawy, Shimaa Gamal, et al.
Egyptian Informatics Journal (2024) Vol. 28, pp. 100571-100571
Closed Access | Times Cited: 1
Effectiveness of Using OWASP TOP 10 as AppSec Standard
Teodora Petranović, Nikola Žarić
(2023), pp. 1-4
Closed Access | Times Cited: 2
Teodora Petranović, Nikola Žarić
(2023), pp. 1-4
Closed Access | Times Cited: 2
Review of the security challenges in web-based systems
Odiaga Gloria Awuor
World Journal of Advanced Engineering Technology and Sciences (2023) Vol. 8, Iss. 2, pp. 204-216
Open Access | Times Cited: 2
Odiaga Gloria Awuor
World Journal of Advanced Engineering Technology and Sciences (2023) Vol. 8, Iss. 2, pp. 204-216
Open Access | Times Cited: 2
The Reality of Internet Infrastructure and Services Defacement: A Second Look at Characterizing Web-Based Vulnerabilities
Neaimh Albalawi, Norah Alamrani, Rasha Aloufi, et al.
Electronics (2023) Vol. 12, Iss. 12, pp. 2664-2664
Open Access | Times Cited: 2
Neaimh Albalawi, Norah Alamrani, Rasha Aloufi, et al.
Electronics (2023) Vol. 12, Iss. 12, pp. 2664-2664
Open Access | Times Cited: 2
CYBERSECURITY ANALYSIS OF WEB-ORIENTED INDUSTRIAL IOT-SYSTEMS
Eugene Merzlikin, Eugene Babeshko
Innovative technologies and scientific solutions for industries (2023), Iss. 2 (24), pp. 131-144
Open Access | Times Cited: 2
Eugene Merzlikin, Eugene Babeshko
Innovative technologies and scientific solutions for industries (2023), Iss. 2 (24), pp. 131-144
Open Access | Times Cited: 2
Cyber-Attack Analysis Using Vulnerability Assessment and Penetration Testing
Vijayashree Budyal, Atul Vaibhav, C. U. Akshay, et al.
Lecture notes in networks and systems (2024), pp. 123-134
Closed Access
Vijayashree Budyal, Atul Vaibhav, C. U. Akshay, et al.
Lecture notes in networks and systems (2024), pp. 123-134
Closed Access
Strategies for Building and Maintaining Secure Web Applications
C. Sathiyapriyan, B. V. Manikandan, S. Gokul, et al.
(2024), pp. 803-809
Closed Access
C. Sathiyapriyan, B. V. Manikandan, S. Gokul, et al.
(2024), pp. 803-809
Closed Access
Web Application Vulnerability Analysis Using the OWASP Method (Case Study: OJS CSFD UIN Sunan Kalijaga Yogyakarta)
Bad’ul Hilmi Arromdoni, Mandahadi Kusuma, Bambang Sugiantoro
Engineering headway (2024) Vol. 6, pp. 211-218
Closed Access
Bad’ul Hilmi Arromdoni, Mandahadi Kusuma, Bambang Sugiantoro
Engineering headway (2024) Vol. 6, pp. 211-218
Closed Access
Countering DDoS threats: leveraging ensemble methods for detection and mitigation
Zafar Iqbal
Lahore Garrison University Research Journal of Computer Science and Information Technology (2024) Vol. 8, Iss. 1
Open Access
Zafar Iqbal
Lahore Garrison University Research Journal of Computer Science and Information Technology (2024) Vol. 8, Iss. 1
Open Access
ORAT - An Open Redirect Analysis Tool
José Martinho, Diogo Mendes, Pedro Pinto
(2024), pp. 1-5
Closed Access
José Martinho, Diogo Mendes, Pedro Pinto
(2024), pp. 1-5
Closed Access
Application of the OWASP Framework to Identify and Remediate Vulnerabilities in Java Web Applications
Francisco Hilario, Diego Chang, Carla Zafra, et al.
Journal of System and Management Sciences (2024)
Open Access
Francisco Hilario, Diego Chang, Carla Zafra, et al.
Journal of System and Management Sciences (2024)
Open Access
SQL Injection Attack Detection Using Machine Learning Techniques
Abeer Alkhalaf, Bassel Alkhatib, S. Ghanem
Lecture notes in networks and systems (2024), pp. 145-156
Closed Access
Abeer Alkhalaf, Bassel Alkhatib, S. Ghanem
Lecture notes in networks and systems (2024), pp. 145-156
Closed Access
Bridging the Gap: A Survey and Classification of Research-Informed Ethical Hacking Tools
Paolo Modesti, Lewis Golightly, Louis Holmes, et al.
Journal of Cybersecurity and Privacy (2024) Vol. 4, Iss. 3, pp. 410-448
Open Access
Paolo Modesti, Lewis Golightly, Louis Holmes, et al.
Journal of Cybersecurity and Privacy (2024) Vol. 4, Iss. 3, pp. 410-448
Open Access
ENSURING INFORMATION SECURITY IN THE INTELLIGENT SCIENTIFIC AND TECHNICAL INFORMATION SYSTEMS
Komil F. Kerimov, Zarina Azizova, Fayzi Bekkamov, et al.
Environment Technology Resources Proceedings of the International Scientific and Practical Conference (2024) Vol. 2, pp. 150-154
Open Access
Komil F. Kerimov, Zarina Azizova, Fayzi Bekkamov, et al.
Environment Technology Resources Proceedings of the International Scientific and Practical Conference (2024) Vol. 2, pp. 150-154
Open Access
Ensuring Web Application Security: An OWASP Driven Development Methodology
M. Sakthivel, S. Sivanantham, N. Bharathiraja, et al.
(2024), pp. 1-7
Closed Access
M. Sakthivel, S. Sivanantham, N. Bharathiraja, et al.
(2024), pp. 1-7
Closed Access
Introduction to Generative AI in Web Engineering
Poornima Mahadevappa, Syeda Mariam Muzammal, Muhammad Tayyab
Advances in web technologies and engineering book series (2024), pp. 297-330
Closed Access
Poornima Mahadevappa, Syeda Mariam Muzammal, Muhammad Tayyab
Advances in web technologies and engineering book series (2024), pp. 297-330
Closed Access