
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Processing tweets for cybersecurity threat awareness
Fernando Alves, Aurélien Bettini, Pedro Ferreira, et al.
Information Systems (2020) Vol. 95, pp. 101586-101586
Open Access | Times Cited: 53
Fernando Alves, Aurélien Bettini, Pedro Ferreira, et al.
Information Systems (2020) Vol. 95, pp. 101586-101586
Open Access | Times Cited: 53
Showing 1-25 of 53 citing articles:
Artificial intelligence for cybersecurity: Literature review and future research directions
Ramanpreet Kaur, Dušan Gabrijelčič, Tomaž Klobučar
Information Fusion (2023) Vol. 97, pp. 101804-101804
Open Access | Times Cited: 248
Ramanpreet Kaur, Dušan Gabrijelčič, Tomaž Klobučar
Information Fusion (2023) Vol. 97, pp. 101804-101804
Open Access | Times Cited: 248
Multi‐aspects AI ‐based modeling and adversarial learning for cybersecurity intelligence and robustness: A comprehensive overview
Iqbal H. Sarker
Security and Privacy (2023) Vol. 6, Iss. 5
Open Access | Times Cited: 31
Iqbal H. Sarker
Security and Privacy (2023) Vol. 6, Iss. 5
Open Access | Times Cited: 31
inTIME: A Machine Learning-Based Framework for Gathering and Leveraging Web Data to Cyber-Threat Intelligence
Paris Koloveas, Thanasis Chantzios, Sofia Alevizopoulou, et al.
Electronics (2021) Vol. 10, Iss. 7, pp. 818-818
Open Access | Times Cited: 53
Paris Koloveas, Thanasis Chantzios, Sofia Alevizopoulou, et al.
Electronics (2021) Vol. 10, Iss. 7, pp. 818-818
Open Access | Times Cited: 53
Social Media Analytics on Russia–Ukraine Cyber War with Natural Language Processing: Perspectives and Challenges
Fahim Sufi
Information (2023) Vol. 14, Iss. 9, pp. 485-485
Open Access | Times Cited: 20
Fahim Sufi
Information (2023) Vol. 14, Iss. 9, pp. 485-485
Open Access | Times Cited: 20
What Are the Attackers Doing Now? Automating Cyberthreat Intelligence Extraction from Text on Pace with the Changing Threat Landscape: A Survey
Md Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie Williams
ACM Computing Surveys (2022) Vol. 55, Iss. 12, pp. 1-36
Open Access | Times Cited: 25
Md Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie Williams
ACM Computing Surveys (2022) Vol. 55, Iss. 12, pp. 1-36
Open Access | Times Cited: 25
Values and Value Conflicts in the Context of OSINT Technologies for Cybersecurity Incident Response: A Value Sensitive Design Perspective
Thea Riebe, Julian Bäumler, Marc–André Kaufhold, et al.
Computer Supported Cooperative Work (CSCW) (2023) Vol. 33, Iss. 2, pp. 205-251
Open Access | Times Cited: 14
Thea Riebe, Julian Bäumler, Marc–André Kaufhold, et al.
Computer Supported Cooperative Work (CSCW) (2023) Vol. 33, Iss. 2, pp. 205-251
Open Access | Times Cited: 14
A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications
Thomas Browne, Mohammad Z. Abedin, Mohammad Jabed Morshed Chowdhury
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2911-2938
Open Access | Times Cited: 5
Thomas Browne, Mohammad Z. Abedin, Mohammad Jabed Morshed Chowdhury
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2911-2938
Open Access | Times Cited: 5
Evaluation of LLM-based chatbots for OSINT-based Cyber Threat Awareness
Samaneh Shafee, Alysson Bessani, Pedro Ferreira
Expert Systems with Applications (2024) Vol. 261, pp. 125509-125509
Closed Access | Times Cited: 5
Samaneh Shafee, Alysson Bessani, Pedro Ferreira
Expert Systems with Applications (2024) Vol. 261, pp. 125509-125509
Closed Access | Times Cited: 5
ETIP: An Enriched Threat Intelligence Platform for improving OSINT correlation, analysis, visualization and sharing capabilities
Gustavo González-Granadillo, Mario Faiella, Ibéria Medeiros, et al.
Journal of Information Security and Applications (2021) Vol. 58, pp. 102715-102715
Closed Access | Times Cited: 28
Gustavo González-Granadillo, Mario Faiella, Ibéria Medeiros, et al.
Journal of Information Security and Applications (2021) Vol. 58, pp. 102715-102715
Closed Access | Times Cited: 28
An Automatic Generation Approach of the Cyber Threat Intelligence Records Based on Multi-Source Information Fusion
Tianfang Sun, Pin Yang, Mengming Li, et al.
Future Internet (2021) Vol. 13, Iss. 2, pp. 40-40
Open Access | Times Cited: 27
Tianfang Sun, Pin Yang, Mengming Li, et al.
Future Internet (2021) Vol. 13, Iss. 2, pp. 40-40
Open Access | Times Cited: 27
Systematic review of SIEM technology: SIEM-SC birth
Juan Miguel López Velásquez, Sergio Mauricio Martínez Monterrubio, Luis Sánchez, et al.
International Journal of Information Security (2023) Vol. 22, Iss. 3, pp. 691-711
Closed Access | Times Cited: 12
Juan Miguel López Velásquez, Sergio Mauricio Martínez Monterrubio, Luis Sánchez, et al.
International Journal of Information Security (2023) Vol. 22, Iss. 3, pp. 691-711
Closed Access | Times Cited: 12
An exploratory analysis of the DPRK cyber threat landscape using publicly available reports
Jeonggak Lyu, Ahyun Song, Euiseong Seo, et al.
International Journal of Information Security (2025) Vol. 24, Iss. 1
Closed Access
Jeonggak Lyu, Ahyun Song, Euiseong Seo, et al.
International Journal of Information Security (2025) Vol. 24, Iss. 1
Closed Access
Tweet question classification for enhancing Tweet Question Answering System
Chindukuri Mallikarjuna, S. Sangeetha
Natural Language Processing Journal (2025), pp. 100130-100130
Open Access
Chindukuri Mallikarjuna, S. Sangeetha
Natural Language Processing Journal (2025), pp. 100130-100130
Open Access
From Tweets to Threats: A Survey of Cybersecurity Threat Detection Challenges, AI-Based Solutions and Potential Opportunities in X
Omar Alsodi, Xujuan Zhou, Raj Gururajan, et al.
Applied Sciences (2025) Vol. 15, Iss. 7, pp. 3898-3898
Open Access
Omar Alsodi, Xujuan Zhou, Raj Gururajan, et al.
Applied Sciences (2025) Vol. 15, Iss. 7, pp. 3898-3898
Open Access
A Novel Approach for Cyber Threat Analysis Systems Using a Bidirectional Encoder Representations from Transformers Model from Cyber Threat Intelligence Data
Doygun Demirol, Resul Daş, Davut Hanbay
Symmetry (2025) Vol. 17, Iss. 4, pp. 587-587
Open Access
Doygun Demirol, Resul Daş, Davut Hanbay
Symmetry (2025) Vol. 17, Iss. 4, pp. 587-587
Open Access
Gathering Cyber Threat Intelligence from Twitter Using Novelty Classification
Ba Dung Le, Guanhua Wang, Mehwish Nasim, et al.
(2019), pp. 316-323
Open Access | Times Cited: 32
Ba Dung Le, Guanhua Wang, Mehwish Nasim, et al.
(2019), pp. 316-323
Open Access | Times Cited: 32
Perspectives of non-expert users on cyber security and privacy: An analysis of online discussions on twitter
Nandita Pattnaik, Shujun Li, Jason R. C. Nurse
Computers & Security (2022) Vol. 125, pp. 103008-103008
Open Access | Times Cited: 18
Nandita Pattnaik, Shujun Li, Jason R. C. Nurse
Computers & Security (2022) Vol. 125, pp. 103008-103008
Open Access | Times Cited: 18
Advanced Persistent Threat intelligent profiling technique: A survey
Binhui Tang, Junfeng Wang, Zhongkun Yu, et al.
Computers & Electrical Engineering (2022) Vol. 103, pp. 108261-108261
Closed Access | Times Cited: 17
Binhui Tang, Junfeng Wang, Zhongkun Yu, et al.
Computers & Electrical Engineering (2022) Vol. 103, pp. 108261-108261
Closed Access | Times Cited: 17
A New Social Media-Driven Cyber Threat Intelligence
Fahim Sufi
Electronics (2023) Vol. 12, Iss. 5, pp. 1242-1242
Open Access | Times Cited: 10
Fahim Sufi
Electronics (2023) Vol. 12, Iss. 5, pp. 1242-1242
Open Access | Times Cited: 10
Generating Quality Threat Intelligence Leveraging OSINT and a Cyber Threat Unified Taxonomy
Cláudio Martins, Ibéria Medeiros
ACM Transactions on Privacy and Security (2022) Vol. 25, Iss. 3, pp. 1-39
Open Access | Times Cited: 15
Cláudio Martins, Ibéria Medeiros
ACM Transactions on Privacy and Security (2022) Vol. 25, Iss. 3, pp. 1-39
Open Access | Times Cited: 15
Understanding EdTech's Privacy and Security Issues: Understanding the Perception and Awareness of Education Technologies' Privacy and Security Issues
Rakibul Hasan
Proceedings on Privacy Enhancing Technologies (2023) Vol. 2023, Iss. 4, pp. 269-286
Open Access | Times Cited: 8
Rakibul Hasan
Proceedings on Privacy Enhancing Technologies (2023) Vol. 2023, Iss. 4, pp. 269-286
Open Access | Times Cited: 8
PURE: Generating Quality Threat Intelligence by Clustering and Correlating OSINT
Rui Azevedo, Ibéria Medeiros, Alysson Bessani
(2019), pp. 483-490
Closed Access | Times Cited: 24
Rui Azevedo, Ibéria Medeiros, Alysson Bessani
(2019), pp. 483-490
Closed Access | Times Cited: 24
Multi-aspects AI-based Modeling and Adversarial Learning for Cybersecurity Intelligence and Robustness: A Comprehensive Overview
Iqbal H. Sarker
(2022)
Open Access | Times Cited: 13
Iqbal H. Sarker
(2022)
Open Access | Times Cited: 13
Cybersecurity Misinformation Detection on Social Media: Case Studies on Phishing Reports and Zoom’s Threat
Mohit Singhal, Nihal Kumarswamy, Shreyasi Kinhekar, et al.
Proceedings of the International AAAI Conference on Web and Social Media (2023) Vol. 17, pp. 796-807
Open Access | Times Cited: 5
Mohit Singhal, Nihal Kumarswamy, Shreyasi Kinhekar, et al.
Proceedings of the International AAAI Conference on Web and Social Media (2023) Vol. 17, pp. 796-807
Open Access | Times Cited: 5
Pedagogical discourse markers in online algebra learning: Unraveling instructor's communication using natural language processing
Jinnie Shin, Renu Balyan, Michelle Banawan, et al.
Computers & Education (2023) Vol. 205, pp. 104897-104897
Closed Access | Times Cited: 5
Jinnie Shin, Renu Balyan, Michelle Banawan, et al.
Computers & Education (2023) Vol. 205, pp. 104897-104897
Closed Access | Times Cited: 5