
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Cybersecurity knowledge graphs construction and quality assessment
Hong‐Yi Li, Ze Shi, Chengwei Pan, et al.
Complex & Intelligent Systems (2023) Vol. 10, Iss. 1, pp. 1201-1217
Open Access | Times Cited: 10
Hong‐Yi Li, Ze Shi, Chengwei Pan, et al.
Complex & Intelligent Systems (2023) Vol. 10, Iss. 1, pp. 1201-1217
Open Access | Times Cited: 10
Showing 10 citing articles:
A data-driven and knowledge graph-based analysis of the risk hazard coupling mechanism in subway construction accidents
Xiaosen Huo, Yin Yuan, Liudan Jiao, et al.
Reliability Engineering & System Safety (2024) Vol. 250, pp. 110254-110254
Closed Access | Times Cited: 12
Xiaosen Huo, Yin Yuan, Liudan Jiao, et al.
Reliability Engineering & System Safety (2024) Vol. 250, pp. 110254-110254
Closed Access | Times Cited: 12
Towards a Knowledge Graph Based Approach for Vulnerable Code Weaknesses Identification
Martina Vecellio Reane, Daniele Dall’Anese, Rosmaël Zidane Lekeufack Foulefack, et al.
Lecture notes in computer science (2025), pp. 159-166
Closed Access
Martina Vecellio Reane, Daniele Dall’Anese, Rosmaël Zidane Lekeufack Foulefack, et al.
Lecture notes in computer science (2025), pp. 159-166
Closed Access
Research on Parameter-Efficient Knowledge Graph Completion Methods and Their Performance in the Cybersecurity Field
Bin Chen, Hongyi Li, Ze Shi
IEEE Access (2025) Vol. 13, pp. 22998-23012
Open Access
Bin Chen, Hongyi Li, Ze Shi
IEEE Access (2025) Vol. 13, pp. 22998-23012
Open Access
Knowledge Graph Construction: Extraction, Learning, and Evaluation
S. -K. Choi, Yuchul Jung
Applied Sciences (2025) Vol. 15, Iss. 7, pp. 3727-3727
Open Access
S. -K. Choi, Yuchul Jung
Applied Sciences (2025) Vol. 15, Iss. 7, pp. 3727-3727
Open Access
Research on quality assessment methods for cybersecurity knowledge graphs
Ze Shi, Hong‐Yi Li, Di Zhao, et al.
Computers & Security (2024) Vol. 142, pp. 103848-103848
Closed Access | Times Cited: 3
Ze Shi, Hong‐Yi Li, Di Zhao, et al.
Computers & Security (2024) Vol. 142, pp. 103848-103848
Closed Access | Times Cited: 3
Entity and relation extractions for threat intelligence knowledge graphs
Inoussa Mouiche, Sherif Saad
Computers & Security (2024), pp. 104120-104120
Open Access | Times Cited: 1
Inoussa Mouiche, Sherif Saad
Computers & Security (2024), pp. 104120-104120
Open Access | Times Cited: 1
Entity and Relation Extractions for Threat Intelligence Knowledge Graphs
INOUSSA MOUICHE, Sherif Saad
(2024)
Closed Access
INOUSSA MOUICHE, Sherif Saad
(2024)
Closed Access
Construct a Network Security Vulnerability Knowledge Graph Based on HPO-BiLSTM-CRF
Ruihan Sun, Yi Zhuang
Lecture notes in electrical engineering (2024), pp. 327-335
Closed Access
Ruihan Sun, Yi Zhuang
Lecture notes in electrical engineering (2024), pp. 327-335
Closed Access
Knowledge Graph for Solubility Big Data: Construction and Applications
Xiao Haiyang, Yan Ruomei, Wu Yan, et al.
Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery (2024)
Open Access
Xiao Haiyang, Yan Ruomei, Wu Yan, et al.
Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery (2024)
Open Access
Quality assessment of cyber threat intelligence knowledge graph based on adaptive joining of embedding model
Wei Li, Hong‐Yi Li, Di Zhao, et al.
Complex & Intelligent Systems (2024) Vol. 11, Iss. 1
Open Access
Wei Li, Hong‐Yi Li, Di Zhao, et al.
Complex & Intelligent Systems (2024) Vol. 11, Iss. 1
Open Access
Research on Spurious-Negative Sample Augmentation-Based Quality Evaluation Method for Cybersecurity Knowledge Graph
Bin Chen, Hong‐Yi Li, Ze Shi
Mathematics (2024) Vol. 13, Iss. 1, pp. 68-68
Open Access
Bin Chen, Hong‐Yi Li, Ze Shi
Mathematics (2024) Vol. 13, Iss. 1, pp. 68-68
Open Access