OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A survey on cybersecurity knowledge graph construction
Xiaojuan Zhao, Rong Jiang, Yue Han, et al.
Computers & Security (2023) Vol. 136, pp. 103524-103524
Closed Access | Times Cited: 20

Showing 20 citing articles:

A data-driven multi-perspective approach to cybersecurity knowledge discovery through topic modelling
Fahad Alqurashi, Istiak Ahmad
Alexandria Engineering Journal (2024) Vol. 107, pp. 374-389
Open Access | Times Cited: 5

AT4CTIRE: Adversarial Training for Cyber Threat Intelligence Relation Extraction
Y. A. Han, Rong Jiang, Changjian Li, et al.
Electronics (2025) Vol. 14, Iss. 2, pp. 324-324
Open Access

Realization of Network Security Knowledge Base with Knowledge Graph
Z. C. Ou-Yang, Xiang‐Yang Li, Bing Wang, et al.
Lecture notes in electrical engineering (2025), pp. 59-66
Closed Access

An evolutionary prediction model for enterprise basic research based on knowledge graph
Diao Haican, Yanqun Zhang, Xu Chen
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access

Research on APT group classification method based on graph attention networks
Yazhou Du, Weiwu Ren, Xintong Song, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 4
Closed Access

Automatic Knowledge Graph Construction and Dynamic Fusion Method Using LLMs and Graph Embedding for Medical Informatics Education
Yongting Zhang, HuanHuan Wang, Pauline Shan Qing Yeoh, et al.
Communications in computer and information science (2025), pp. 222-240
Closed Access

APT-MMF: An advanced persistent threat actor attribution method based on multimodal and multilevel feature fusion
Nan Xiao, Bo Lang, Ting Wang, et al.
Computers & Security (2024) Vol. 144, pp. 103960-103960
Open Access | Times Cited: 3

A review of graph neural networks and pretrained language models for knowledge graph reasoning
Jiangtao Ma, Бо Лю, Kunlin Li, et al.
Neurocomputing (2024) Vol. 609, pp. 128490-128490
Closed Access | Times Cited: 3

OSTIS: A novel Organization-Specific Threat Intelligence System
Dincy R. Arikkat, P. K. Vinod, Rafidha Rehiman K. A., et al.
Computers & Security (2024) Vol. 145, pp. 103990-103990
Closed Access | Times Cited: 1

Construction and Application of User Check-in Spatiotemporal Knowledge Graph Based on Neo4j
Ye Liu, Yin Yimeng, Cheng Wei, et al.
Procedia Computer Science (2024) Vol. 242, pp. 609-616
Open Access | Times Cited: 1

Cyber-risk Perception and Prioritization for Decision-Making and Threat Intelligence
Mario Angelelli, Serena Arima, Christian Catalano, et al.
arXiv (Cornell University) (2023)
Open Access | Times Cited: 2

A robust statistical framework for cyber-vulnerability prioritisation under partial information in threat intelligence
Mario Angelelli, Serena Arima, Christian Catalano, et al.
Expert Systems with Applications (2024) Vol. 255, pp. 124572-124572
Open Access

On the Use of Complex Systems Engineering for the Development of Industry 4.0 Technologies: Case for Robotic Systems
Jaime Alonso Restrepo-Carmona, Elkin A. Taborda, Esteban Paniagua-García, et al.
(2024)
Open Access

Toward a Unified Cybersecurity Knowledge Graph: Leveraging Ontologies and Open Data Sources
A. M. Boyer, Erdoğan Doğdu, Roya Choupani, et al.
Communications in computer and information science (2024), pp. 17-33
Closed Access

On the Integration of Complex Systems Engineering and Industry 4.0 Technologies for the Conceptual Design of Robotic Systems
Jaime Alonso Restrepo-Carmona, Elkin A. Taborda, Esteban Paniagua-García, et al.
Machines (2024) Vol. 12, Iss. 9, pp. 625-625
Open Access

Relation Extraction Techniques in Cyber Threat Intelligence
Dincy R. Arikkat, P. K. Vinod, Rafidha Rehiman K. A., et al.
Lecture notes in computer science (2024), pp. 348-363
Closed Access

SecKG2vec: A Novel Security Knowledge Graph Relational Reasoning Method based on Semantic and Structural Fusion Embedding
Xiaojian Liu, Xinwei Guo, Wen Gu
Computers & Security (2024) Vol. 149, pp. 104192-104192
Closed Access

The ICS-SEC KG: An Integrated Cybersecurity Resource for Industrial Control Systems
Kabul Kurniawan, Elmar Kiesling, Dietmar Winkler, et al.
Lecture notes in computer science (2024), pp. 153-170
Closed Access

AT4CTIRE: Adversarial Training for Cyber Threat Intelligence Relation Extraction
Yue Han, Rong Jiang, Changjian Li, et al.
Research Square (Research Square) (2024)
Open Access

Page 1

Scroll to top