
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Local Government Cybersecurity Landscape: A Systematic Review and Conceptual Framework
Sk Tahsin Hossain, Tan Yiğitcanlar, Kien Nguyen, et al.
Applied Sciences (2024) Vol. 14, Iss. 13, pp. 5501-5501
Open Access | Times Cited: 12
Sk Tahsin Hossain, Tan Yiğitcanlar, Kien Nguyen, et al.
Applied Sciences (2024) Vol. 14, Iss. 13, pp. 5501-5501
Open Access | Times Cited: 12
Showing 12 citing articles:
Examining the Role of Artificial Intelligence in Cyber Security (CS): A Systematic Review for Preventing Prospective Solutions in Financial Transactions
Mahfujur Rahman Faraji, Fisan Shikder, Md. Hasibul Hasan, et al.
International Journal of Religion (2024) Vol. 5, Iss. 10, pp. 4766-4782
Open Access | Times Cited: 5
Mahfujur Rahman Faraji, Fisan Shikder, Md. Hasibul Hasan, et al.
International Journal of Religion (2024) Vol. 5, Iss. 10, pp. 4766-4782
Open Access | Times Cited: 5
Cybersecurity in Local Governments: A Systematic Review and Framework of Key Challenges
Sk Tahsin Hossain, Tan Yiğitcanlar, Kien Nguyen, et al.
Urban Governance (2025)
Open Access
Sk Tahsin Hossain, Tan Yiğitcanlar, Kien Nguyen, et al.
Urban Governance (2025)
Open Access
Kajian Normatif terhadap Efektivitas Peraturan Perlindungan Anak dalam Penanggulangan Eksploitasi Anak di Dunia Maya
Devi Zakiyatus Solihah, Kholifah Nyawiji, Fera, et al.
Perkara. (2025) Vol. 2, Iss. 4, pp. 603-614
Closed Access
Devi Zakiyatus Solihah, Kholifah Nyawiji, Fera, et al.
Perkara. (2025) Vol. 2, Iss. 4, pp. 603-614
Closed Access
Detection and prevention of spear phishing attacks: A comprehensive survey
Santosh Kumar Birthriya, Priyanka Ahlawat, Ankit Kumar Jain
Computers & Security (2025) Vol. 151, pp. 104317-104317
Closed Access
Santosh Kumar Birthriya, Priyanka Ahlawat, Ankit Kumar Jain
Computers & Security (2025) Vol. 151, pp. 104317-104317
Closed Access
Real-Time Data Governance and Compliance in Cloud-Native Robotics Systems
Onyinye Obioha-Val, Oluwatosin Selesi-Aina, Titilayo Modupe Kolade, et al.
SSRN Electronic Journal (2025)
Closed Access
Onyinye Obioha-Val, Oluwatosin Selesi-Aina, Titilayo Modupe Kolade, et al.
SSRN Electronic Journal (2025)
Closed Access
Comparative Analysis of EU-Based Cybersecurity Skills Frameworks
Fernando Almeida
Computers & Security (2025), pp. 104329-104329
Open Access
Fernando Almeida
Computers & Security (2025), pp. 104329-104329
Open Access
Building security and resilience: a guide to implementing effective cybersecurity and data protection measures in smart cities
Martin Lněnička, Tomas Kysela, Oldřich Horák
Smart and Sustainable Built Environment (2025)
Closed Access
Martin Lněnička, Tomas Kysela, Oldřich Horák
Smart and Sustainable Built Environment (2025)
Closed Access
Risk management in smart cities: influence analysis using DEMATEL
Adalberto Freitas, Carlos Rafael Silva de Oliveira, Pedro Fernandes de Oliveira Gomes, et al.
Environmental Hazards (2025), pp. 1-27
Closed Access
Adalberto Freitas, Carlos Rafael Silva de Oliveira, Pedro Fernandes de Oliveira Gomes, et al.
Environmental Hazards (2025), pp. 1-27
Closed Access
A Country Risk Assessment from the Perspective of Cybersecurity in Local Entities
Javier Sánchez-Zurdo, Jose San Martin
Applied Sciences (2024) Vol. 14, Iss. 24, pp. 12036-12036
Open Access | Times Cited: 1
Javier Sánchez-Zurdo, Jose San Martin
Applied Sciences (2024) Vol. 14, Iss. 24, pp. 12036-12036
Open Access | Times Cited: 1
A Comprehensive State-of-the-Art Review for Digital Twin: Cybersecurity Perspectives and Open Challenges
Aws Naser Jaber, Ioannis Koufos, Maria Christopoulou
Lecture notes on data engineering and communications technologies (2024), pp. 78-98
Closed Access
Aws Naser Jaber, Ioannis Koufos, Maria Christopoulou
Lecture notes on data engineering and communications technologies (2024), pp. 78-98
Closed Access
Mapping Cyber-Financial Risk Profiles: Implications for European Cybersecurity and Financial Literacy
Alexandru Răzvan Căciulescu, Răzvan Rughiniş, Dinu Țurcanu, et al.
Risks (2024) Vol. 12, Iss. 12, pp. 200-200
Open Access
Alexandru Răzvan Căciulescu, Răzvan Rughiniş, Dinu Țurcanu, et al.
Risks (2024) Vol. 12, Iss. 12, pp. 200-200
Open Access
Enhancing Access Control, Authorization, and Accountability in Cyber-Physical Systems Using Machine Learning
Isaac Adom, Muhammad Awais, Mohsin Raza, et al.
(2024), pp. 1-6
Closed Access
Isaac Adom, Muhammad Awais, Mohsin Raza, et al.
(2024), pp. 1-6
Closed Access