
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Open source intelligence extraction for terrorism‐related information: A review
Megha Chaudhary, Divya Bansal
Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery (2022) Vol. 12, Iss. 5
Closed Access | Times Cited: 6
Megha Chaudhary, Divya Bansal
Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery (2022) Vol. 12, Iss. 5
Closed Access | Times Cited: 6
Showing 6 citing articles:
The rise of open-source intelligence
Damien Van Puyvelde, Fernando Tabárez Rienzi
European Journal of International Security (2025), pp. 1-15
Open Access | Times Cited: 1
Damien Van Puyvelde, Fernando Tabárez Rienzi
European Journal of International Security (2025), pp. 1-15
Open Access | Times Cited: 1
Open Source Intelligence Opportunities and Challenges: a Review
Sabina Szymoniak, Kacper Foks
Advances in Science and Technology – Research Journal (2024) Vol. 18, Iss. 3, pp. 123-139
Open Access | Times Cited: 2
Sabina Szymoniak, Kacper Foks
Advances in Science and Technology – Research Journal (2024) Vol. 18, Iss. 3, pp. 123-139
Open Access | Times Cited: 2
AI-Driven Counter-Terrorism: Enhancing Global Security Through Advanced Predictive Analytics
Fahad Ali Khan, Gang Li, Anam Nawaz Khan, et al.
IEEE Access (2023) Vol. 11, pp. 135864-135879
Open Access | Times Cited: 6
Fahad Ali Khan, Gang Li, Anam Nawaz Khan, et al.
IEEE Access (2023) Vol. 11, pp. 135864-135879
Open Access | Times Cited: 6
Terrorism Attack Classification Using Machine Learning: The Effectiveness of Using Textual Features Extracted from GTD Dataset
Mohammed Abdalsalam, Chunlin Li, Abdelghani Dahou, et al.
Computer Modeling in Engineering & Sciences (2023) Vol. 138, Iss. 2, pp. 1427-1467
Open Access | Times Cited: 5
Mohammed Abdalsalam, Chunlin Li, Abdelghani Dahou, et al.
Computer Modeling in Engineering & Sciences (2023) Vol. 138, Iss. 2, pp. 1427-1467
Open Access | Times Cited: 5
The use of big data and data mining in the investigation of criminal offences
Andriy Tymchyshyn, Anna Semeniaka, Serhii Bondar, et al.
Revista Amazonia Investiga (2022) Vol. 11, Iss. 56, pp. 278-290
Open Access | Times Cited: 1
Andriy Tymchyshyn, Anna Semeniaka, Serhii Bondar, et al.
Revista Amazonia Investiga (2022) Vol. 11, Iss. 56, pp. 278-290
Open Access | Times Cited: 1
The antithetical relationship of Entrepreneurship and Corruption on Radicalization among the Moroccan Youths: An Empirical study
Nicolas Hamelin, M. Ishaq Bhatti, Shahamak Rezaei
(2023)
Open Access
Nicolas Hamelin, M. Ishaq Bhatti, Shahamak Rezaei
(2023)
Open Access