
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Feature-driven Method for Automating the Assessment of OSINT Cyber Threat Sources
Andrea Tundis, Samuel Ruppert, Max Mühlhäuser
Computers & Security (2021) Vol. 113, pp. 102576-102576
Closed Access | Times Cited: 12
Andrea Tundis, Samuel Ruppert, Max Mühlhäuser
Computers & Security (2021) Vol. 113, pp. 102576-102576
Closed Access | Times Cited: 12
Showing 12 citing articles:
A cognitive platform for collecting cyber threat intelligence and real-time detection using cloud computing
Prasasthy Balasubramanian, Sadaf Nazari, Danial Khosh Kholgh, et al.
Decision Analytics Journal (2025), pp. 100545-100545
Open Access | Times Cited: 1
Prasasthy Balasubramanian, Sadaf Nazari, Danial Khosh Kholgh, et al.
Decision Analytics Journal (2025), pp. 100545-100545
Open Access | Times Cited: 1
Looking Beyond IoCs: Automatically Extracting Attack Patterns from External CTI
Tanvirul Alam, Dipkamal Bhusal, Youngja Park, et al.
(2023), pp. 92-108
Open Access | Times Cited: 19
Tanvirul Alam, Dipkamal Bhusal, Youngja Park, et al.
(2023), pp. 92-108
Open Access | Times Cited: 19
Cyber Threat Intelligence Sharing: Challenges and Opportunities
Carlos Roberto Viana, Milton Sérgio Fernandes de Lima, Byron Loureiro Lanverly de Melo, et al.
(2025)
Closed Access
Carlos Roberto Viana, Milton Sérgio Fernandes de Lima, Byron Loureiro Lanverly de Melo, et al.
(2025)
Closed Access
CARIOCA: prioritizing the use of IoC by threats assessment shared on the MISP platform
Piero Delvecchio, Stefano Galantucci, Andrea Iannacone, et al.
International Journal of Information Security (2025) Vol. 24, Iss. 2
Open Access
Piero Delvecchio, Stefano Galantucci, Andrea Iannacone, et al.
International Journal of Information Security (2025) Vol. 24, Iss. 2
Open Access
OSINT Clinic: Co-designing AI-Augmented Collaborative OSINT Investigations for Vulnerability Assessment
Anirban Mukhopadhyay, Kurt Luther
(2025), pp. 1-22
Closed Access
Anirban Mukhopadhyay, Kurt Luther
(2025), pp. 1-22
Closed Access
Taxonomy of Cyber Threat Intelligence Framework
Ahmad Naim Irfan, Suriayati Chuprat, Mohd Naz’ri Mahrin, et al.
2022 13th International Conference on Information and Communication Technology Convergence (ICTC) (2022), pp. 1295-1300
Closed Access | Times Cited: 10
Ahmad Naim Irfan, Suriayati Chuprat, Mohd Naz’ri Mahrin, et al.
2022 13th International Conference on Information and Communication Technology Convergence (ICTC) (2022), pp. 1295-1300
Closed Access | Times Cited: 10
An automated dynamic quality assessment method for cyber threat intelligence
Libin Yang, Menghan Wang, Wei Lou
Computers & Security (2024) Vol. 148, pp. 104079-104079
Open Access
Libin Yang, Menghan Wang, Wei Lou
Computers & Security (2024) Vol. 148, pp. 104079-104079
Open Access
Research by the method of an extended systematical literature review E-SLR the problem of ensuring the security of personal data when using OSINT
Natalia Romanova, Vitaly Gryzunov
Herald of Dagestan State Technical University Technical Sciences (2024) Vol. 51, Iss. 3, pp. 130-144
Open Access
Natalia Romanova, Vitaly Gryzunov
Herald of Dagestan State Technical University Technical Sciences (2024) Vol. 51, Iss. 3, pp. 130-144
Open Access
An Automatic Assessment Method of Cyber Threat Intelligence Combined with ATT&CK Matrix
Shuqin Zhang, Peng Chen, Guangyao Bai, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-12
Open Access | Times Cited: 2
Shuqin Zhang, Peng Chen, Guangyao Bai, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-12
Open Access | Times Cited: 2
WayPop Machine: A Wayback Machine to Investigate Popularity and Root Out Trolls
Tuğrulcan Elmas, Thomas Romain Ibanez, Alexandre Hutter, et al.
2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) (2022), pp. 391-395
Closed Access | Times Cited: 2
Tuğrulcan Elmas, Thomas Romain Ibanez, Alexandre Hutter, et al.
2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) (2022), pp. 391-395
Closed Access | Times Cited: 2
A Novel Cyber-Threat Awareness Framework based on Spatial-Temporal Transformer Encoder for Maritime Transportation Systems
Qiangqiang Shi, Jin Liu, Jiamao Zhi, et al.
(2023), pp. 1156-1162
Closed Access
Qiangqiang Shi, Jin Liu, Jiamao Zhi, et al.
(2023), pp. 1156-1162
Closed Access
Exploring OSINT for Modern Day Reconnaissance
Ajay S Ram, Arya Thalakkat, Devika Udayan, et al.
(2023), pp. 1-6
Closed Access
Ajay S Ram, Arya Thalakkat, Devika Udayan, et al.
(2023), pp. 1-6
Closed Access
Scoring Scheme to Determine the Sensitive Information Level in Surface Web and Dark Web
Rahul Singh, P. P. Amritha, M. Sethumadhavan
Communications in computer and information science (2022), pp. 157-167
Closed Access
Rahul Singh, P. P. Amritha, M. Sethumadhavan
Communications in computer and information science (2022), pp. 157-167
Closed Access