OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Cybersecurity Enterprises Policies: A Comparative Study
Alok Mishra, Yehia Ibrahim Alzoubi, Asif Qumer Gill, et al.
Sensors (2022) Vol. 22, Iss. 2, pp. 538-538
Open Access | Times Cited: 45

Showing 1-25 of 45 citing articles:

Cyber security threats: A never-ending challenge for e-commerce
Xiang Liu, Sayed Fayaz Ahmad, Muhammad Khalid Anser, et al.
Frontiers in Psychology (2022) Vol. 13
Open Access | Times Cited: 69

Machine learning in cybersecurity: A review of threat detection and defense mechanisms
Ugochukwu Ikechukwu Okoli, Ogugua Chimezie, Adebunmi Okechukwu Adewusi, et al.
World Journal of Advanced Research and Reviews (2024) Vol. 21, Iss. 1, pp. 2286-2295
Open Access | Times Cited: 47

Exploring the Impact of AI-Based Cyber Security Financial Sector Management
Shailendra Mishra
Applied Sciences (2023) Vol. 13, Iss. 10, pp. 5875-5875
Open Access | Times Cited: 44

Attributes impacting cybersecurity policy development: An evidence from seven nations
Alok Mishra, Yehia Ibrahim Alzoubi, Memoona J. Anwar, et al.
Computers & Security (2022) Vol. 120, pp. 102820-102820
Open Access | Times Cited: 65

Global Digital Convergence: Impact of Cybersecurity, Business Transparency, Economic Transformation, and AML Efficiency
Aleksandra Kuzior, Tetiana Anatoliivna Vasylieva, Оlha Кuzmenko, et al.
Journal of Open Innovation Technology Market and Complexity (2022) Vol. 8, Iss. 4, pp. 195-195
Open Access | Times Cited: 31

Enhancing Cyber-Resilience for Small and Medium-Sized Organizations with Prescriptive Malware Analysis, Detection and Response
Lucian Florin Ilca, Petre Ogrutan, Titus Bălan
Sensors (2023) Vol. 23, Iss. 15, pp. 6757-6757
Open Access | Times Cited: 21

Exploring Cybersecurity Education and Training Techniques: A Comprehensive Review of Traditional, Virtual Reality, and Augmented Reality Approaches
Abdullah Alnajim, Shabana Habib, Muhammad Islam, et al.
Symmetry (2023) Vol. 15, Iss. 12, pp. 2175-2175
Open Access | Times Cited: 20

The Effectiveness and Privacy Preservation of IoT on Ubiquitous Learning: Modern Learning Paradigm to Enhance Higher Education
Nahla El-Haggar, Lobna Amouri, Albandari Alsumayt, et al.
Applied Sciences (2023) Vol. 13, Iss. 15, pp. 9003-9003
Open Access | Times Cited: 14

Research trends in deep learning and machine learning for cloud computing security
Yehia Ibrahim Alzoubi, Alok Mishra, Ahmet E. Topcu
Artificial Intelligence Review (2024) Vol. 57, Iss. 5
Closed Access | Times Cited: 5

An intelligentintegrated vehicle surveillance system for controlling the vehicle thefts/hacking using IoT and facial recognition
Mayank Pathak, Kamta Nath Mishra, Satya Prakash Singh
International Journal of Systems Assurance Engineering and Management (2025)
Closed Access

Machine learning-based cloud security system with multi authentication for data classification in Financial Sectors
P. V. Chandrika, Sandeep Kelkar, Bijith Marakarkandy, et al.
International Journal of Systems Assurance Engineering and Management (2025)
Closed Access

Cyber Security for Smart Transportation System
Roheen Qamar, Saima Siraj, Baqar Ali Zardari
Lecture notes in intelligent transportation and infrastructure (2025), pp. 619-636
Closed Access

Social Media Zero-Day Attack Detection Using TensorFlow
Ahmet E. Topcu, Yehia Ibrahim Alzoubi, Ersin Elbaşi, et al.
Electronics (2023) Vol. 12, Iss. 17, pp. 3554-3554
Open Access | Times Cited: 10

Enhancing privacy‐preserving mechanisms in Cloud storage: A novel conceptual framework
Alok Mishra, Thr Satar Jabar, Yehia Ibrahim Alzoubi, et al.
Concurrency and Computation Practice and Experience (2023) Vol. 35, Iss. 26
Open Access | Times Cited: 9

Cybersecurity Vulnerabilities in Healthcare: A Threat to Patient Security
William J. Triplett
Cybersecurity and Innovative Technology Journal (2024) Vol. 2, Iss. 1, pp. 15-25
Open Access | Times Cited: 3

Wearables and Cybersecurity: Navigating the Threat Landscape
Ayushi Hora, Prasanna Kulkarni
(2024), pp. 563-567
Closed Access | Times Cited: 3

Blockchain-Fog Computing Integration Applications: A Systematic Review
Yehia Ibrahim Alzoubi, Ali Aljaafreh
Cybernetics and Information Technologies (2023) Vol. 23, Iss. 1, pp. 3-37
Open Access | Times Cited: 8



(2024) Vol. 21, Iss. 4
Open Access | Times Cited: 1

A Review of the Insider Threat, a Practitioner Perspective Within the U.K. Financial Services
Findlay Whitelaw, Jackie Riley, Nebrase Elmrabit
IEEE Access (2024) Vol. 12, pp. 34752-34768
Open Access | Times Cited: 2

Digital wind of changes: navigating competitiveness in the maritime sector through the transformation in human resource development
Yuthana Autsadee, Jagan Jeevan, Nurul Haqimin Mohd Salleh, et al.
Maritime Business Review (2024) Vol. 9, Iss. 3, pp. 204-228
Open Access | Times Cited: 2

Modelling the conundrums to cyber-risks management in logistics firms for supply chain social sustainability
Ifeyinwa Juliet Orji, Chukwuebuka Martinjoe U-Dominic
Journal of Enterprise Information Management (2024)
Closed Access | Times Cited: 2

Factors impacting cybersecurity transformation: An Industry 5.0 perspective
Abhik Chaudhuri, Rajat Kumar Behera, Pradip Kumar Bala
Computers & Security (2024), pp. 104267-104267
Closed Access | Times Cited: 2

Cybersecurity challenges across sustainable development goals: A comprehensive review
Nur Nabila Mohamed, Bassam Hossam Hassan Abuobied
Sustainable Engineering and Innovation ISSN 2712-0562 (2024) Vol. 6, Iss. 1, pp. 57-86
Open Access | Times Cited: 1

Page 1 - Next Page

Scroll to top