Citedness in Scopus

Citedness of Journal Articles in Scopus.

Journal of Information Technology and Cyber Security (JITCS): Number of cited documents: 43% (13 out of 30 articles); cited by 21 documents indexed in Scopus. Updated on December 03, 2025.

  1. Journal of Information Technology and Cyber Security: 10 documents, 17 citations.

  2. J Inf Technol Cyber Secur: 2 documents, 2 citations.

  3. J Inform Technol Cyber Secur: 1 document, 1 citation.

  4. Recommendation System Using the K Nearest Neighbor Approach A Case Study of Dual Camera Quality as A Smartphone Selection Criterion: 1 document, 1 citation.

No. JITCS Article Vol. Issue Year Pages Cited By (Title & Source)
1 Recommendation System Using the K-Nearest Neighbor Approach: A Case Study of Dual Camera Quality as a Smartphone Selection Criterion 1 1 2023 9–15
  1. What matters for international consumers’ choice preferences for smartphones: Evidence from a cross-border ecommerce platform – PLoS ONE 18(5), 2023, Plos - 4
  2. Smartphone recommendation using popularity and collaborative filtering-based models – 6th ICRTAC, 2023, IEEE - 1
2 A Child Growth and Development Evaluation Using Weighted Product Method 1 1 2023 16–21
  1. Amalgamation evaluation model design based on modification weighted product-Provus-Alkin-Rwa Bhineda – International Journal of Evaluation and Research in Education 13(4), 2024, IAES - 1
  2. User interface design of context-input-process-product evaluation application based on weighted product – IAES International Journal of Artificial Intelligence 13(2), 2024, IAES - 1
3 The Utilization of Information System for Crime Rate Modelling in Surabaya Using K-means 1 1 2023 22–30
  1. Space-Time Autoregressive Integrated Moving Average (STARIMA) Modeling for Predicting Criminal Cases of Motor Vehicle Theft in Surabaya, Indonesia – Data and Metadata 3, 2024, AG Editor - 1
4 Delivery Route Estimation on a Web-Based Restaurant Delivery System Using Greedy Algorithm 1 1 2023 31-40
  1. Recommendation System for Boarding House Rental Using Greedy Algorithm – 4th ICERA, 2025, IEEE - 2
5 Navigating the Cyber Threat Landscape: A Comprehensive Analysis of Attacks and Security in the Digital Age 1 2 2023 53–67
  1. Responsible AI on National Cybersecurity Strategy with Enhancement of Cybersecurity in Education – IIPEM, 2024, IEEE - 1
  2. Taxonomy of Challenges of Cybersecurity Risk Assessment in Higher Learning Institutions – IGI Global, 2025 -1 
  3. Architecting the Digital Future: Platforms, Design, and Application – IGI Global, 2025 - 1 
  4. The Deep Learning-Based Security Assessment and Optimization Model for Enterprise Information Systems Under Digital Economy – Journal of Organizational and End User Computing 37(1), 2025, IGI Global - 1
  5. Research of Information Conflict between Humans and Artificial Intelligence in Information and Cybernetic Systems – CPITS 3991, 2025, CEUR-WS - 1
  6. Phishing Threat Landscape: An Overview of Attack Patterns and Preventive Measures – 8th ICCMC, 2025, IEEE - 1
  7. Anticipating and Handling Cyber Threats through Predictive Capabilities of Artificial Intelligence – Bentham Science Publishers, 2025 - 1
6 Decision Support System for Single Tuition Scholarship Awardees in Higher Education Using Mamdani Fuzzy Inference 1 2 2023 85–97
  1. Enhancement of Scholarship Decisions Precision Using Support Vector Machine Algorithm – 5th eSmarTA, 2025, IEEE - 2
7 Supervised Learning Methods Comparison for Android Malware Detection Based on System Calls Referring to ARM (32-bit/EABI) Table 2 1 2024 15–24
  1. Android Malware Detection System using Machine Learning – 6th IC3, 2024, ACM - 1
8 Identifying Dominant Actors of Ferdy Sambo's Case Network on Social Media X/Twitter Using Social Network Analysis for Public Relations Strategy 2 1 2024 25-39
  1. The Reduction of Criminal Justice Policy in Indonesia: Justice versus Virality – Journal of Human Rights, Culture and Legal System 5(2), 2025, Lembaga Contrarius Indonesia - 1
9 Risk Management Analysis of Information Security in an Academic Information System at a Public University in Indonesia: Implementation of ISO/IEC 27005:2018 and ISO/IEC 27001:2013 Security Controls 2 2 2024 58-75
  1. AI & machine learning models for cloud security risk assessment – EDPACS, 2025, Taylor & Francis - 1
10 The Waterfall Model in the Implementation of a Room Reservation Information System: A Case Study at a University 2 2 2024 95-110
  1. Development of a Social Network Analysis Application to Identify Influential Subgroups of Networks and Users Involved in Spreading Negative Issues - IAICT, 2025, IEEE - 1
11 Dialect Classification of the Javanese Language Using the K-Nearest Neighbor 2 2 2024 111-122
  1. Do Language Models Understand Honorific Systems in Javanese? - ACL-Long, 2025, ACL - 1
12 Ontology in Requirements Software Development Method: A Systematic Literature Review 3 1 2025 14-32
  1. Enhancing Agile Defect Prediction with Optimized Machine Learning and Feature Selection – Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 9(4), 2025, Ikatan Ahli Informatika Indonesia - 1
13 Clustering of Post-Disaster Building Damage Levels Using Discrete Wavelet Transform and Principal Component Analysis 3 1 2025 33-44
  1. A remote sensing approach for flood extent estimation and damage mapping in the Bramhani-Baitarani river basin using Sentinel data – International Journal of Information Technology 17(7), 2025, Springer - 3