OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Sec-Buzzer: cyber security emerging topic mining with open threat intelligence retrieval and timeline event annotation
Kuo-Chan Lee, Chih-Hung Hsieh, Li-Jia Wei, et al.
Soft Computing (2016) Vol. 21, Iss. 11, pp. 2883-2896
Closed Access | Times Cited: 41

Showing 1-25 of 41 citing articles:

Text Mining in Big Data Analytics
Hossein Hassani, Christina Beneki, Stephan Unger, et al.
Big Data and Cognitive Computing (2020) Vol. 4, Iss. 1, pp. 1-1
Open Access | Times Cited: 240

The current state and future of mobile security in the light of the recent mobile security threat reports
Ahmet Cevahir Çınar, Turkan Beyza Kara
Multimedia Tools and Applications (2023) Vol. 82, Iss. 13, pp. 20269-20281
Open Access | Times Cited: 29

Processing tweets for cybersecurity threat awareness
Fernando Alves, Aurélien Bettini, Pedro Ferreira, et al.
Information Systems (2020) Vol. 95, pp. 101586-101586
Open Access | Times Cited: 53

Automated Emerging Cyber Threat Identification and Profiling Based on Natural Language Processing
Renato Marinho, Raimir Holanda Filho
IEEE Access (2023) Vol. 11, pp. 58915-58936
Open Access | Times Cited: 18

Text Mining in Cybersecurity
Luciano Ignaczak, Guilherme Goldschmidt, Cristiano André da Costa, et al.
ACM Computing Surveys (2021) Vol. 54, Iss. 7, pp. 1-36
Closed Access | Times Cited: 34

What Are the Attackers Doing Now? Automating Cyberthreat Intelligence Extraction from Text on Pace with the Changing Threat Landscape: A Survey
Md Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie Williams
ACM Computing Surveys (2022) Vol. 55, Iss. 12, pp. 1-36
Open Access | Times Cited: 25

A data-driven multi-perspective approach to cybersecurity knowledge discovery through topic modelling
Fahad Alqurashi, Istiak Ahmad
Alexandria Engineering Journal (2024) Vol. 107, pp. 374-389
Open Access | Times Cited: 5

Corpus and Deep Learning Classifier for Collection of Cyber Threat Indicators in Twitter Stream
Vahid Behzadan, Carlos Aguirre, Avishek Joey Bose, et al.
2021 IEEE International Conference on Big Data (Big Data) (2018), pp. 5002-5007
Closed Access | Times Cited: 46

Canary in the Coal Mine: Identifying Cyber Threat Trends Through Topic Mining – Stack Overflow Case Study
Matthijs Koier, Hugo Kuipers, Marre Slikker, et al.
Lecture notes in computer science (2025), pp. 518-538
Closed Access

Maloid-DS: Labeled Dataset for Android Malware Forensics
Iman Almomani, Tala Almashat, Walid El‐Shafai
IEEE Access (2024) Vol. 12, pp. 73481-73546
Open Access | Times Cited: 3

Designing a decision support system for the weakly formalized problems in the provision of cybersecurity
Бахытжан Ахметов, Valeriy Lakhno, Yuliia Boiko, et al.
Eastern-European Journal of Enterprise Technologies (2017) Vol. 1, Iss. 2 (85), pp. 4-15
Open Access | Times Cited: 28

Development of decision support system based on feature matrix for cyber threat assessment
Timur Kartbayev, Бахытжан Ахметов, Aliya Doszhanova, et al.
International Journal of Electronics and Telecommunications (2019), pp. 545-550
Open Access | Times Cited: 25

Automatic Detection of Cyber Security Related Accounts on Online Social Networks
Cagri Burak Aslan, Rahime Belen Sağlam, Shujun Li
(2018)
Open Access | Times Cited: 23

A novel approach for detection and ranking of trendy and emerging cyber threat events in Twitter streams
Avishek Joey Bose, Vahid Behzadan, Carlos Aguirre, et al.
(2019)
Open Access | Times Cited: 21

On the Automated Assessment of Open-Source Cyber Threat Intelligence Sources
Andrea Tundis, Samuel Ruppert, Max Mühlhäuser
Lecture notes in computer science (2020), pp. 453-467
Open Access | Times Cited: 20

A Literature Review on Mining Cyberthreat Intelligence from Unstructured Texts
Md Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie Williams
2021 International Conference on Data Mining Workshops (ICDMW) (2020), pp. 516-525
Closed Access | Times Cited: 17

Security Management and Visualization in a Blockchain-based Collaborative Defense
Christian Killer, Bruno Rodrigues, Burkhard Stiller
2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (2019), pp. 108-111
Open Access | Times Cited: 16

A Method for Extracting Unstructured Threat Intelligence Based on Dictionary Template and Reinforcement Learning
Xuren Wang, Rong Chen, Binghua Song, et al.
2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD) (2021), pp. 262-267
Closed Access | Times Cited: 14

CySecAlert: An Alert Generation System for Cyber Security Events Using Open Source Intelligence Data
Thea Riebe, Tristan Wirth, Markus Bayer, et al.
Lecture notes in computer science (2021), pp. 429-446
Closed Access | Times Cited: 14

Information Security and Cryptology
Yu Yu, Moti Yung
Lecture notes in computer science (2021)
Closed Access | Times Cited: 13

An Approach to Estimating of Criticality of Social Engineering Attacks Traces
Anastasiia Khlobystova, Maxim V. Abramov, Alexander Lvovich Tulupyev
Studies in systems, decision and control (2019), pp. 446-456
Closed Access | Times Cited: 15

Deep Learning Approach for Enhanced Cyber Threat Indicators in Twitter Stream
K. Simran, Prathiksha Balakrishna, R. Vinayakumar, et al.
Communications in computer and information science (2020), pp. 135-145
Closed Access | Times Cited: 13

A Feature-driven Method for Automating the Assessment of OSINT Cyber Threat Sources
Andrea Tundis, Samuel Ruppert, Max Mühlhäuser
Computers & Security (2021) Vol. 113, pp. 102576-102576
Closed Access | Times Cited: 12

Cyber Threat Intelligence Entity Extraction Based on Deep Learning and Field Knowledge Engineering
Xuren Wang, Runshi Liu, Jie Yang, et al.
2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD) (2022), pp. 406-413
Closed Access | Times Cited: 8

A Study of Optimizing Search Engine Results Through User Interaction
Lin‐Chih Chen
IEEE Access (2020) Vol. 8, pp. 79024-79045
Open Access | Times Cited: 9

Page 1 - Next Page

Scroll to top