
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Deep Learning Approach for Intelligent Named Entity Recognition of Cyber Security
K. Simran, Sai Sriram, R. Vinayakumar, et al.
Communications in computer and information science (2020), pp. 163-172
Closed Access | Times Cited: 25
K. Simran, Sai Sriram, R. Vinayakumar, et al.
Communications in computer and information science (2020), pp. 163-172
Closed Access | Times Cited: 25
Showing 25 citing articles:
Open-CyKG: An Open Cyber Threat Intelligence Knowledge Graph
Injy Sarhan, Marco Spruit
Knowledge-Based Systems (2021) Vol. 233, pp. 107524-107524
Open Access | Times Cited: 69
Injy Sarhan, Marco Spruit
Knowledge-Based Systems (2021) Vol. 233, pp. 107524-107524
Open Access | Times Cited: 69
Data and knowledge-driven named entity recognition for cyber security
Chen Gao, Xuan Zhang, Hui Liu
Cybersecurity (2021) Vol. 4, Iss. 1
Open Access | Times Cited: 35
Chen Gao, Xuan Zhang, Hui Liu
Cybersecurity (2021) Vol. 4, Iss. 1
Open Access | Times Cited: 35
Named Entity Recognition Using BERT with Whole World Masking in Cybersecurity Domain
Shicheng Zhou, Jingju Liu, Xiaofeng Zhong, et al.
(2021), pp. 316-320
Closed Access | Times Cited: 30
Shicheng Zhou, Jingju Liu, Xiaofeng Zhong, et al.
(2021), pp. 316-320
Closed Access | Times Cited: 30
A review on cyber security named entity recognition
Chen Gao, Xuan Zhang, Meng-Ting Han, et al.
Frontiers of Information Technology & Electronic Engineering (2021) Vol. 22, Iss. 9, pp. 1153-1168
Closed Access | Times Cited: 24
Chen Gao, Xuan Zhang, Meng-Ting Han, et al.
Frontiers of Information Technology & Electronic Engineering (2021) Vol. 22, Iss. 9, pp. 1153-1168
Closed Access | Times Cited: 24
Joint contrastive learning and belief rule base for named entity recognition in cybersecurity
Chenxi Hu, Tao Wu, Chunsheng Liu, et al.
Cybersecurity (2024) Vol. 7, Iss. 1
Open Access | Times Cited: 3
Chenxi Hu, Tao Wu, Chunsheng Liu, et al.
Cybersecurity (2024) Vol. 7, Iss. 1
Open Access | Times Cited: 3
Quantifying the Significance and Relevance of Cyber-Security Text Through Textual Similarity and Cyber-Security Knowledge Graph
Otgonpurev Mendsaikhan, Hirokazu Hasegawa, Yukiko Yamaguchi, et al.
IEEE Access (2020) Vol. 8, pp. 177041-177052
Open Access | Times Cited: 19
Otgonpurev Mendsaikhan, Hirokazu Hasegawa, Yukiko Yamaguchi, et al.
IEEE Access (2020) Vol. 8, pp. 177041-177052
Open Access | Times Cited: 19
Protection of the patient data against intentional attacks using a hybrid robust watermarking code
Ahmad M. Nagm, Mohammed Elwan
PeerJ Computer Science (2021) Vol. 7, pp. e400-e400
Open Access | Times Cited: 11
Ahmad M. Nagm, Mohammed Elwan
PeerJ Computer Science (2021) Vol. 7, pp. e400-e400
Open Access | Times Cited: 11
Geostationary Satellite Observations Can Accurately Estimate Ecosystem Carbon Uptake and Respiration at Half Hourly Time Steps at Eddy Covariance Sites
Sadegh Ranjbar, Daniele Losos, Sophie Hoffman, et al.
(2023)
Closed Access | Times Cited: 4
Sadegh Ranjbar, Daniele Losos, Sophie Hoffman, et al.
(2023)
Closed Access | Times Cited: 4
An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions
Hodaya Binyamini, Ron Bitton, Masaki Inokuchi, et al.
arXiv (Cornell University) (2020)
Open Access | Times Cited: 10
Hodaya Binyamini, Ron Bitton, Masaki Inokuchi, et al.
arXiv (Cornell University) (2020)
Open Access | Times Cited: 10
Unsupervised Labeling and Extraction of Phrase-based Concepts in Vulnerability Descriptions
Sofonias Yitagesu, Zhenchang Xing, Xiaowang Zhang, et al.
2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE) (2021), pp. 943-954
Closed Access | Times Cited: 9
Sofonias Yitagesu, Zhenchang Xing, Xiaowang Zhang, et al.
2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE) (2021), pp. 943-954
Closed Access | Times Cited: 9
Extraction of Phrase-based Concepts in Vulnerability Descriptions through Unsupervised Labeling
Sofonias Yitagesu, Zhenchang Xing, Xiaowang Zhang, et al.
ACM Transactions on Software Engineering and Methodology (2023) Vol. 32, Iss. 5, pp. 1-45
Open Access | Times Cited: 3
Sofonias Yitagesu, Zhenchang Xing, Xiaowang Zhang, et al.
ACM Transactions on Software Engineering and Methodology (2023) Vol. 32, Iss. 5, pp. 1-45
Open Access | Times Cited: 3
Rule-based Entity Recognition for Forensic Timeline
Hudan Studiawan, Mhd. Fadly Hasan, Baskoro Adi Pratomo
(2023), pp. 1-6
Closed Access | Times Cited: 3
Hudan Studiawan, Mhd. Fadly Hasan, Baskoro Adi Pratomo
(2023), pp. 1-6
Closed Access | Times Cited: 3
Semi Supervised Approach for Relation Extraction in Agriculture Documents
G Veena, Deepa Gupta, Vani Kanjirangat
(2022), pp. 199-204
Closed Access | Times Cited: 3
G Veena, Deepa Gupta, Vani Kanjirangat
(2022), pp. 199-204
Closed Access | Times Cited: 3
ITIRel: Joint Entity and Relation Extraction for Internet of Things Threat Intelligence
Feng Zhu, Zidong Cheng, Peng Li, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 11, pp. 20867-20878
Closed Access
Feng Zhu, Zidong Cheng, Peng Li, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 11, pp. 20867-20878
Closed Access
Improved XLNet modeling for Chinese named entity recognition of edible fungus
Helong Yu, Chenxi Wang, Mingxuan Xue
Frontiers in Plant Science (2024) Vol. 15
Open Access
Helong Yu, Chenxi Wang, Mingxuan Xue
Frontiers in Plant Science (2024) Vol. 15
Open Access
P-TIMA: a framework of T witter threat intelligence mining and analysis based on a prompt-learning NER model
Yizhe You, Zhengwei Jiang, Peian Yang, et al.
The Computer Journal (2024) Vol. 67, Iss. 12, pp. 3221-3238
Closed Access
Yizhe You, Zhengwei Jiang, Peian Yang, et al.
The Computer Journal (2024) Vol. 67, Iss. 12, pp. 3221-3238
Closed Access
Domain-adaptive entity recognition: unveiling the potential of CSER in cybersecurity and beyond
Md. Abu Marjan, Toshiyuki Amagasa
International Journal of Machine Learning and Cybernetics (2024)
Open Access
Md. Abu Marjan, Toshiyuki Amagasa
International Journal of Machine Learning and Cybernetics (2024)
Open Access
Implementing deep learning-based named entity recognition for obtaining narcotics abuse data in Indonesia
Daris Azhar, Robert Kurniawan, Waris Marsisno, et al.
IAES International Journal of Artificial Intelligence (2023) Vol. 13, Iss. 1, pp. 375-375
Open Access | Times Cited: 1
Daris Azhar, Robert Kurniawan, Waris Marsisno, et al.
IAES International Journal of Artificial Intelligence (2023) Vol. 13, Iss. 1, pp. 375-375
Open Access | Times Cited: 1
CSER: Enhancing Cybersecurity Entity Recognition Through Multidimensional Feature Fusion
Md. Abu Marjan, Toshiyuki Amagasa
2021 IEEE International Conference on Big Data (Big Data) (2023), pp. 1214-1221
Closed Access | Times Cited: 1
Md. Abu Marjan, Toshiyuki Amagasa
2021 IEEE International Conference on Big Data (Big Data) (2023), pp. 1214-1221
Closed Access | Times Cited: 1
Research on Unified Cyber Threat Intelligence Entity Recognition Method Based on Multiple Features
Yu Chang, Gang Wang, Peng Zhu, et al.
(2023), pp. 233-240
Closed Access | Times Cited: 1
Yu Chang, Gang Wang, Peng Zhu, et al.
(2023), pp. 233-240
Closed Access | Times Cited: 1
Automated Corpus Annotation for Cybersecurity Named Entity Recognition with Small Keyword Dictionary
Kazuaki Kashihara, Harshdeep Singh Sandhu, Jana Shakarian
Lecture notes in networks and systems (2021), pp. 155-174
Closed Access | Times Cited: 2
Kazuaki Kashihara, Harshdeep Singh Sandhu, Jana Shakarian
Lecture notes in networks and systems (2021), pp. 155-174
Closed Access | Times Cited: 2
Research on Automated Cyber Asset Scanning Tools based on Cybersecurity Knowledge Graph
Xiaofeng Zhong, Yue Zhang, Jingju Liu, et al.
2021 7th International Conference on Computer and Communications (ICCC) (2021), pp. 2046-2049
Closed Access | Times Cited: 2
Xiaofeng Zhong, Yue Zhang, Jingju Liu, et al.
2021 7th International Conference on Computer and Communications (ICCC) (2021), pp. 2046-2049
Closed Access | Times Cited: 2
Automatically Identifying Bug Reports with Tactical Vulnerabilities by Deep Feature Learning
Wei Zheng, Manqing Zhang, Hui Tang, et al.
(2021), pp. 333-344
Closed Access | Times Cited: 2
Wei Zheng, Manqing Zhang, Hui Tang, et al.
(2021), pp. 333-344
Closed Access | Times Cited: 2
Name Entity Recognition (NER) Based Drug Related Page Classification on Dark Web
Ashwini Dalvi, Vaishnavi Shah, Dhruvin Gandhi, et al.
(2022), pp. 1-5
Closed Access | Times Cited: 1
Ashwini Dalvi, Vaishnavi Shah, Dhruvin Gandhi, et al.
(2022), pp. 1-5
Closed Access | Times Cited: 1
Measuring the Importance of Cyber-Security Text Using Typographical Correlation and a Graph of Cyber-Security Knowledge
Raja Ram S, Balasubramanian Balakumar, Kumar Parasuraman
(2023)
Closed Access
Raja Ram S, Balasubramanian Balakumar, Kumar Parasuraman
(2023)
Closed Access