OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

On the Automated Assessment of Open-Source Cyber Threat Intelligence Sources
Andrea Tundis, Samuel Ruppert, Max Mühlhäuser
Lecture notes in computer science (2020), pp. 453-467
Open Access | Times Cited: 20

Showing 20 citing articles:

Automation and Orchestration of Zero Trust Architecture: Potential Solutions and Challenges
Yang Cao, Shiva Raj Pokhrel, Ye Zhu, et al.
Deleted Journal (2024) Vol. 21, Iss. 2, pp. 294-317
Open Access | Times Cited: 8

Anomaly Detection in Cybersecurity Datasets via Cooperative Co-evolution-based Feature Selection
Ayesha Rashid, Mohiuddin Ahmed, Leslie F. Sikos, et al.
ACM Transactions on Management Information Systems (2022) Vol. 13, Iss. 3, pp. 1-39
Open Access | Times Cited: 31

Values and Value Conflicts in the Context of OSINT Technologies for Cybersecurity Incident Response: A Value Sensitive Design Perspective
Thea Riebe, Julian Bäumler, Marc–André Kaufhold, et al.
Computer Supported Cooperative Work (CSCW) (2023) Vol. 33, Iss. 2, pp. 205-251
Open Access | Times Cited: 14

A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications
Thomas Browne, Mohammad Z. Abedin, Mohammad Jabed Morshed Chowdhury
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2911-2938
Open Access | Times Cited: 5

Computational Science – ICCS 2020

Lecture notes in computer science (2020)
Closed Access | Times Cited: 36

Detecting and Tracking Criminals in the Real World through an IoT-Based System
Andrea Tundis, Humayun Kaleem, Max Mühlhäuser
Sensors (2020) Vol. 20, Iss. 13, pp. 3795-3795
Open Access | Times Cited: 34

Data Elimination on Repetition using a Blockchain based Cyber Threat Intelligence
S. Smys, Haoxiang Wang
IRO Journal on Sustainable Wireless Systems (2021) Vol. 2, Iss. 4, pp. 149-154
Open Access | Times Cited: 27

Swarm-intelligence for the modern ICT ecosystems
George Hatzivasilis, Eftychia Lakka, Manos Athanatos, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2951-2975
Closed Access | Times Cited: 3

CySecAlert: An Alert Generation System for Cyber Security Events Using Open Source Intelligence Data
Thea Riebe, Tristan Wirth, Markus Bayer, et al.
Lecture notes in computer science (2021), pp. 429-446
Closed Access | Times Cited: 14

Incorporating Cyber Threat Intelligence into Complex Cyber-Physical Systems: A STIX Model for Active Buildings
Ricardo M. Czekster, Roberto Metere, C. Morisset
Applied Sciences (2022) Vol. 12, Iss. 10, pp. 5005-5005
Open Access | Times Cited: 9

Actionable Cyber Threat Intelligence for Automated Incident Response
Cristoffer Leite, Jerry den Hartog, Daniel Ricardo dos Santos, et al.
Lecture notes in computer science (2022), pp. 368-385
Closed Access | Times Cited: 8

Threat Miner - A Text Analysis Engine for Threat Identification Using Dark Web Data
Nathan Deguara, Junaid Arshad, Anum Paracha, et al.
2021 IEEE International Conference on Big Data (Big Data) (2022), pp. 3043-3052
Open Access | Times Cited: 7

A Systematic Mapping Study on Cyber Security Indicator Data
Per Håkon Meland, Shukun Tokas, Gencer Erdogan, et al.
Electronics (2021) Vol. 10, Iss. 9, pp. 1092-1092
Open Access | Times Cited: 7

TI-Prompt: Towards a Prompt Tuning Method for Few-shot Threat Intelligence Twitter Classification
Yizhe You, Zhengwei Jiang, Kai Zhang, et al.
2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) (2022), pp. 272-279
Closed Access | Times Cited: 4

Investigation of Cyber Situation Awareness via SIEM tools: a constructive review
Uğur Ünal, Ceyda Nur Kahya, Yaprak Kurtlutepe, et al.
2021 6th International Conference on Computer Science and Engineering (UBMK) (2021) Vol. 2, pp. 676-681
Closed Access | Times Cited: 5

Agriculture 4.0 and Beyond: Evaluating Cyber Threat Intelligence Sources and Techniques in Smart Farming Ecosystems
Hang Thanh Bui, Dr Hamed Aboutorab, Dr Arash Mahboubi, et al.
(2024)
Closed Access

Analysis of Data Exchange Systems about Information Security Threats
E. Yu. Pavlenko, N. V. Polosukhin
Automatic Control and Computer Sciences (2024) Vol. 58, Iss. 8, pp. 1365-1372
Closed Access

Page 1

Scroll to top