
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Counterattacking Cyber Threats: A Framework for the Future of Cybersecurity
Muhammad Fakhrul Safitra, Muharman Lubis, Hanif Fakhrurroja
Sustainability (2023) Vol. 15, Iss. 18, pp. 13369-13369
Open Access | Times Cited: 68
Muhammad Fakhrul Safitra, Muharman Lubis, Hanif Fakhrurroja
Sustainability (2023) Vol. 15, Iss. 18, pp. 13369-13369
Open Access | Times Cited: 68
Showing 1-25 of 68 citing articles:
MASTERING COMPLIANCE: A COMPREHENSIVE REVIEW OF REGULATORY FRAMEWORKS IN ACCOUNTING AND CYBERSECURITY
Temitayo Oluwaseun Abrahams, Sarah Kuzankah Ewuga, Simon Kaggwa, et al.
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 1, pp. 120-140
Open Access | Times Cited: 61
Temitayo Oluwaseun Abrahams, Sarah Kuzankah Ewuga, Simon Kaggwa, et al.
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 1, pp. 120-140
Open Access | Times Cited: 61
ENTREPRENEURSHIP IN AFRICA: A REVIEW OF GROWTH AND CHALLENGES
Olubusola Odeyemi, Adedoyin Tolulope Oyewole, Omotoya Bukola Adeoye, et al.
International Journal of Management & Entrepreneurship Research (2024) Vol. 6, Iss. 3, pp. 608-622
Open Access | Times Cited: 39
Olubusola Odeyemi, Adedoyin Tolulope Oyewole, Omotoya Bukola Adeoye, et al.
International Journal of Management & Entrepreneurship Research (2024) Vol. 6, Iss. 3, pp. 608-622
Open Access | Times Cited: 39
CYBERSECURITY AWARENESS AND EDUCATION PROGRAMS: A REVIEW OF EMPLOYEE ENGAGEMENT AND ACCOUNTABILITY
Temitayo Oluwaseun Abrahams, Oluwatoyin Ajoke Farayola, Simon Kaggwa, et al.
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 1, pp. 100-119
Open Access | Times Cited: 34
Temitayo Oluwaseun Abrahams, Oluwatoyin Ajoke Farayola, Simon Kaggwa, et al.
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 1, pp. 100-119
Open Access | Times Cited: 34
Artificial intelligence (AI) cybersecurity dimensions: a comprehensive framework for understanding adversarial and offensive AI
Masike Malatji, Alaa Tolah
AI and Ethics (2024)
Open Access | Times Cited: 26
Masike Malatji, Alaa Tolah
AI and Ethics (2024)
Open Access | Times Cited: 26
COMPREHENSIVE REVIEW ON CYBERSECURITY: MODERN THREATS AND ADVANCED DEFENSE STRATEGIES
Ogugua Chimezie, Onyinyechi Vivian Akagha, Samuel Onimisi Dawodu, et al.
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 2, pp. 293-310
Open Access | Times Cited: 24
Ogugua Chimezie, Onyinyechi Vivian Akagha, Samuel Onimisi Dawodu, et al.
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 2, pp. 293-310
Open Access | Times Cited: 24
Continuous improvement in information security: A review of lessons from superannuation cybersecurity uplift programs
Temitayo Oluwaseun Abrahams, Oluwatoyin Ajoke Farayola, Olukunle Oladipupo Amoo, et al.
International Journal of Science and Research Archive (2024) Vol. 11, Iss. 1, pp. 1327-1337
Open Access | Times Cited: 21
Temitayo Oluwaseun Abrahams, Oluwatoyin Ajoke Farayola, Olukunle Oladipupo Amoo, et al.
International Journal of Science and Research Archive (2024) Vol. 11, Iss. 1, pp. 1327-1337
Open Access | Times Cited: 21
Cyber Resilience Framework: Strengthening Defenses and Enhancing Continuity in Business Security
Ahmad AL-Hawamleh
International Journal of Computing and Digital Systems (2024) Vol. 15, Iss. 1, pp. 1315-1331
Open Access | Times Cited: 20
Ahmad AL-Hawamleh
International Journal of Computing and Digital Systems (2024) Vol. 15, Iss. 1, pp. 1315-1331
Open Access | Times Cited: 20
REVIEWING THIRD-PARTY RISK MANAGEMENT: BEST PRACTICES IN ACCOUNTING AND CYBERSECURITY FOR SUPERANNUATION ORGANIZATIONS
Temitayo Oluwaseun Abrahams, Oluwatoyin Ajoke Farayola, Simon Kaggwa, et al.
Finance & Accounting Research Journal (2024) Vol. 6, Iss. 1, pp. 21-39
Open Access | Times Cited: 19
Temitayo Oluwaseun Abrahams, Oluwatoyin Ajoke Farayola, Simon Kaggwa, et al.
Finance & Accounting Research Journal (2024) Vol. 6, Iss. 1, pp. 21-39
Open Access | Times Cited: 19
Artificial intelligence in cybersecurity: Protecting national infrastructure: A USA review
Adebunmi Okechukwu Adewusi, Ugochukwu Ikechukwu Okoli, Temidayo Olorunsogo, et al.
World Journal of Advanced Research and Reviews (2024) Vol. 21, Iss. 1, pp. 2263-2275
Open Access | Times Cited: 16
Adebunmi Okechukwu Adewusi, Ugochukwu Ikechukwu Okoli, Temidayo Olorunsogo, et al.
World Journal of Advanced Research and Reviews (2024) Vol. 21, Iss. 1, pp. 2263-2275
Open Access | Times Cited: 16
From Vulnerability to Defense: The Role of Large Language Models in Enhancing Cybersecurity
Wafaa Kasri, Yassine Himeur, Hamzah Ali Alkhazaleh, et al.
Computation (2025) Vol. 13, Iss. 2, pp. 30-30
Open Access | Times Cited: 2
Wafaa Kasri, Yassine Himeur, Hamzah Ali Alkhazaleh, et al.
Computation (2025) Vol. 13, Iss. 2, pp. 30-30
Open Access | Times Cited: 2
A comprehensive review of machine learning's role in enhancing network security and threat detection
Akoh Atadoga, Enoch Oluwademilade Sodiya, Uchenna Joseph Umoga, et al.
World Journal of Advanced Research and Reviews (2024) Vol. 21, Iss. 2, pp. 877-886
Open Access | Times Cited: 10
Akoh Atadoga, Enoch Oluwademilade Sodiya, Uchenna Joseph Umoga, et al.
World Journal of Advanced Research and Reviews (2024) Vol. 21, Iss. 2, pp. 877-886
Open Access | Times Cited: 10
Applications of LLMs for Generating Cyber Security Exercise Scenarios
Muhammad Mudassar Yamin, Ehtesham Hashmi, Mohib Ullah, et al.
Research Square (Research Square) (2024)
Open Access | Times Cited: 10
Muhammad Mudassar Yamin, Ehtesham Hashmi, Mohib Ullah, et al.
Research Square (Research Square) (2024)
Open Access | Times Cited: 10
A comprehensive examination of security and privacy in precision agriculture technologies
Pauline A. Ongadi
GSC Advanced Research and Reviews (2024) Vol. 18, Iss. 1, pp. 336-363
Open Access | Times Cited: 4
Pauline A. Ongadi
GSC Advanced Research and Reviews (2024) Vol. 18, Iss. 1, pp. 336-363
Open Access | Times Cited: 4
The Need for Energy-Efficient Networks: A Review of Green Communication Systems and Network Architectures
Muhammad Fakhrul Safitra, Muharman Lubis, Arif Ridho Lubis, et al.
Lecture notes in networks and systems (2024), pp. 127-136
Closed Access | Times Cited: 4
Muhammad Fakhrul Safitra, Muharman Lubis, Arif Ridho Lubis, et al.
Lecture notes in networks and systems (2024), pp. 127-136
Closed Access | Times Cited: 4
Driving Technological Innovation for a Resilient Cybersecurity Landscape
Muritala Aminu, Sunday Anawansedo, Yusuf Ademola Sodiq, et al.
International Journal of Latest Technology in Engineering Management & Applied Science (2024) Vol. XIII, Iss. IV, pp. 126-133
Open Access | Times Cited: 4
Muritala Aminu, Sunday Anawansedo, Yusuf Ademola Sodiq, et al.
International Journal of Latest Technology in Engineering Management & Applied Science (2024) Vol. XIII, Iss. IV, pp. 126-133
Open Access | Times Cited: 4
Toward a Continental Financial Ecosystem: The Implications of AfCFTA for Fintech License Passporting
Hammed Adedeji Ajani, Saidu Patrick Conteh
(2025), pp. 1-17
Closed Access
Hammed Adedeji Ajani, Saidu Patrick Conteh
(2025), pp. 1-17
Closed Access
Towards a Three-Tiered Framework for Fostering Organizational Cybersecurity Culture
Meseret Assefa Adamu, Marko Niemimaa, Paolo Spagnoletti
Lecture notes in business information processing (2025), pp. 313-324
Closed Access
Meseret Assefa Adamu, Marko Niemimaa, Paolo Spagnoletti
Lecture notes in business information processing (2025), pp. 313-324
Closed Access
Cybersecurity resilience and innovation ecosystems for sustainable business excellence: Examining the dramatic changes in the macroeconomic business environment
Kuldeep Singh, Sheshadri Chatterjee, Marcello M. Mariani, et al.
Technovation (2025) Vol. 143, pp. 103219-103219
Open Access
Kuldeep Singh, Sheshadri Chatterjee, Marcello M. Mariani, et al.
Technovation (2025) Vol. 143, pp. 103219-103219
Open Access
New Approach to Learning Cyber-Security in Secondary School
Kornel Chromiński, Małgorzata Przybyła–Kasperek, Rafał Skinderowicz
(2025), pp. 193-207
Closed Access
Kornel Chromiński, Małgorzata Przybyła–Kasperek, Rafał Skinderowicz
(2025), pp. 193-207
Closed Access
Leadership agility in a VUCA world: a systematic review, conceptual insights, and research directions
Syamsir Syamsir, Nika Saputra, Rizki Afri Mulia
Cogent Business & Management (2025) Vol. 12, Iss. 1
Open Access
Syamsir Syamsir, Nika Saputra, Rizki Afri Mulia
Cogent Business & Management (2025) Vol. 12, Iss. 1
Open Access
Towards Improved Vulnerability Management in Digital Environments: A Comprehensive Framework for Cyber Security Enhancement
Ehigiator Egho-Promise, Emmanuel Lyada, Folayo Aina
International Research Journal of Computer Science (2024) Vol. 11, Iss. 05, pp. 441-449
Open Access | Times Cited: 3
Ehigiator Egho-Promise, Emmanuel Lyada, Folayo Aina
International Research Journal of Computer Science (2024) Vol. 11, Iss. 05, pp. 441-449
Open Access | Times Cited: 3
Insights into Cybercrime Detection and Response: A Review of Time Factor
Hamed Taherdoost
Information (2024) Vol. 15, Iss. 5, pp. 273-273
Open Access | Times Cited: 3
Hamed Taherdoost
Information (2024) Vol. 15, Iss. 5, pp. 273-273
Open Access | Times Cited: 3
Business Resilience in a Cyber World
Sharon L. Burton
Advances in medical technologies and clinical practice book series (2024), pp. 1-25
Closed Access | Times Cited: 2
Sharon L. Burton
Advances in medical technologies and clinical practice book series (2024), pp. 1-25
Closed Access | Times Cited: 2
Resilience in the Context of Cyber Security: A Review of the Fundamental Concepts and Relevance
Misael Sousa de Araujo, Bruna Aparecida Souza Machado, Francisco Uchôa Passos
Applied Sciences (2024) Vol. 14, Iss. 5, pp. 2116-2116
Open Access | Times Cited: 2
Misael Sousa de Araujo, Bruna Aparecida Souza Machado, Francisco Uchôa Passos
Applied Sciences (2024) Vol. 14, Iss. 5, pp. 2116-2116
Open Access | Times Cited: 2
Securing the Supply Chain
Siva Raja Sindiramutty, Chong Eng Tan, Wei Wei Goh, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 300-365
Closed Access | Times Cited: 2
Siva Raja Sindiramutty, Chong Eng Tan, Wei Wei Goh, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 300-365
Closed Access | Times Cited: 2