OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Cybersecurity knowledge graphs construction and quality assessment
Hong‐Yi Li, Ze Shi, Chengwei Pan, et al.
Complex & Intelligent Systems (2023) Vol. 10, Iss. 1, pp. 1201-1217
Open Access | Times Cited: 10

Showing 10 citing articles:

A data-driven and knowledge graph-based analysis of the risk hazard coupling mechanism in subway construction accidents
Xiaosen Huo, Yin Yuan, Liudan Jiao, et al.
Reliability Engineering & System Safety (2024) Vol. 250, pp. 110254-110254
Closed Access | Times Cited: 12

Towards a Knowledge Graph Based Approach for Vulnerable Code Weaknesses Identification
Martina Vecellio Reane, Daniele Dall’Anese, Rosmaël Zidane Lekeufack Foulefack, et al.
Lecture notes in computer science (2025), pp. 159-166
Closed Access

Knowledge Graph Construction: Extraction, Learning, and Evaluation
S. -K. Choi, Yuchul Jung
Applied Sciences (2025) Vol. 15, Iss. 7, pp. 3727-3727
Open Access

Research on quality assessment methods for cybersecurity knowledge graphs
Ze Shi, Hong‐Yi Li, Di Zhao, et al.
Computers & Security (2024) Vol. 142, pp. 103848-103848
Closed Access | Times Cited: 3

Entity and relation extractions for threat intelligence knowledge graphs
Inoussa Mouiche, Sherif Saad
Computers & Security (2024), pp. 104120-104120
Open Access | Times Cited: 1

Entity and Relation Extractions for Threat Intelligence Knowledge Graphs
INOUSSA MOUICHE, Sherif Saad
(2024)
Closed Access

Construct a Network Security Vulnerability Knowledge Graph Based on HPO-BiLSTM-CRF
Ruihan Sun, Yi Zhuang
Lecture notes in electrical engineering (2024), pp. 327-335
Closed Access

Knowledge Graph for Solubility Big Data: Construction and Applications
Xiao Haiyang, Yan Ruomei, Wu Yan, et al.
Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery (2024)
Open Access

Quality assessment of cyber threat intelligence knowledge graph based on adaptive joining of embedding model
Wei Li, Hong‐Yi Li, Di Zhao, et al.
Complex & Intelligent Systems (2024) Vol. 11, Iss. 1
Open Access

Page 1

Scroll to top