OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Sec-Buzzer: cyber security emerging topic mining with open threat intelligence retrieval and timeline event annotation
Kuo-Chan Lee, Chih-Hung Hsieh, Li-Jia Wei, et al.
Soft Computing (2016) Vol. 21, Iss. 11, pp. 2883-2896
Closed Access | Times Cited: 41

Showing 26-50 of 41 citing articles:

Social Media Data Mining for Proactive Cyber Defense
Ariel Rodríguez, Koji Okamura
Journal of Information Processing (2020) Vol. 28, pp. 230-238
Open Access | Times Cited: 8

Domain-Oriented Topic Discovery Based on Features Extraction and Topic Clustering
Xiaofeng Lu, Xiao Zhou, Meng Wan, et al.
IEEE Access (2020) Vol. 8, pp. 93648-93662
Open Access | Times Cited: 7

Enhancing data quality in real-time threat intelligence systems using machine learning
Ariel Rodríguez, Koji Okamura
Social Network Analysis and Mining (2020) Vol. 10, Iss. 1
Closed Access | Times Cited: 7

Detecting cyber security related Twitter accounts and different sub-groups
Mohamad Imad Mahaini, Shujun Li
(2021), pp. 599-606
Open Access | Times Cited: 6

What are the attackers doing now? Automating cyber threat intelligence extraction from text on pace with the changing threat landscape: A survey
Md Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie Williams
arXiv (Cornell University) (2021)
Open Access | Times Cited: 5

Cybersecurity Text Data Classification and Optimization for CTI Systems
Ariel Rodríguez, Koji Okamura
Advances in intelligent systems and computing (2020), pp. 410-419
Closed Access | Times Cited: 4

Development of a system for the detection of cyber attacks based on the clustering and formation of reference deviations of attributes
Valeriy Lakhno, V. Malyukov, В. Н. Домрачев, et al.
Eastern-European Journal of Enterprise Technologies (2017) Vol. 3, Iss. 9 (87), pp. 43-52
Open Access | Times Cited: 3

Invesitigation of Malware and Forensic Tools on Internet
Tarun Kumar, Sanjeev Sharma, Ravi Dhaundiyal, et al.
International Journal of Electrical and Computer Engineering (IJECE) (2018) Vol. 8, Iss. 5, pp. 3179-3179
Open Access | Times Cited: 3

Burst Topic Detection in Real Time Spatial–Temporal Data Stream
Chuangying Zhu, Junping Du, Qiang Zhang, et al.
IEEE Access (2019) Vol. 7, pp. 82709-82720
Open Access | Times Cited: 3

Open source threat intelligence discovery based on topic detection
Dong Li, Xiao Zhou, Ao X
(2020), pp. 1-4
Closed Access | Times Cited: 3

A new SOCMINT framework for Threat Intelligence Identification
Marco San Biagio, Roberto Acquaviva, Valentina Mazzonello, et al.
2021 International Conference on Computational Science and Computational Intelligence (CSCI) (2021)
Closed Access | Times Cited: 3

EXTRACTING THREAT INTELLIGENCE RELATIONS USING DISTANT SUPERVISION AND NEURAL NETWORKS
Yali Luo, Shengqin Ao, Ning Luo, et al.
IFIP advances in information and communication technology (2021), pp. 193-211
Closed Access | Times Cited: 2

A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter Streams
Avishek Joey Bose, Vahid Behzadan, Carlos Aguirre, et al.
arXiv (Cornell University) (2019)
Closed Access

Previous Page - Page 2

Scroll to top