OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A graph empowered insider threat detection framework based on daily activities
Wei Hong, Jiao Yin, Mingshan You, et al.
ISA Transactions (2023) Vol. 141, pp. 84-92
Open Access | Times Cited: 18

Showing 18 citing articles:

Mitigating Insider Threat: A Neural Network Approach for Enhanced Security
Pedapudi Lavanya, H. Anila Glory, V. S. Shankar Sriram
IEEE Access (2024) Vol. 12, pp. 73752-73768
Open Access | Times Cited: 4

A heterogeneous graph-based semi-supervised learning framework for access control decision-making
Jiao Yin, Guihong Chen, Wei Hong, et al.
World Wide Web (2024) Vol. 27, Iss. 4
Open Access | Times Cited: 4

Insights into user behavioral-based insider threat detection: systematic review
K. Kartheeban, E. Uma
International Journal of Information Security (2025) Vol. 24, Iss. 2
Closed Access

Insider threat detection for specific threat scenarios
Tian Tian, Chen Zhang, Bo Jiang, et al.
Cybersecurity (2025) Vol. 8, Iss. 1
Open Access

HpGraphNEI: A network entity identification model based on heterophilous graph learning
Na Li, Tianao Li, Zhaorui Ma, et al.
Information Processing & Management (2024) Vol. 61, Iss. 5, pp. 103810-103810
Closed Access | Times Cited: 2

Empowering Vulnerability Prioritization: A Heterogeneous Graph-Driven Framework for Exploitability Prediction
Jiao Yin, Guihong Chen, Wei Hong, et al.
Lecture notes in computer science (2023), pp. 289-299
Closed Access | Times Cited: 6

Bilateral Insider Threat Detection: Harnessing Standalone and Sequential Activities with Recurrent Neural Networks
Phavithra Manoharan, Wei Hong, Jiao Yin, et al.
Lecture notes in computer science (2023), pp. 179-188
Closed Access | Times Cited: 4

Ransomware Detection Using Stacked Autoencoder for Feature Selection
Mike Nkongolo, Mahmut TOKMAK
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) (2024) Vol. 12, Iss. 1
Open Access | Times Cited: 1

Edge contrastive learning for link prediction
Lei Liu Lei Liu, Qianqian Xie, Weidong Wen, et al.
Information Processing & Management (2024) Vol. 61, Iss. 6, pp. 103847-103847
Closed Access | Times Cited: 1

Blockchain-Empowered Resource Allocation and Data Security for Efficient Vehicular Edge Computing
Maojie Wang, Shaodong Han, Guihong Chen, et al.
Lecture notes in computer science (2023), pp. 205-219
Closed Access | Times Cited: 2

Surveying the Landscape: Compound Methods for Aspect-Based Sentiment Analysis
Marwah Alharbi, Jiao Yin, Hua Wang
Lecture notes in computer science (2023), pp. 101-115
Closed Access | Times Cited: 2

Log2Graph: A graph convolution neural network based method for insider threat detection
Kexiong Fei, Jiang Zhou, Lin Su, et al.
Journal of Computer Security (2024), pp. 1-24
Closed Access

Handling imbalance dataset issue in insider threat detection using machine learning methods
Ayshwarya Jaiswal, Pragya Dwivedi, Rupesh Kumar Dewang
Computers & Electrical Engineering (2024) Vol. 120, pp. 109726-109726
Closed Access

LAN: Learning Adaptive Neighbors for Real-Time Insider Threat Detection
Xiangrui Cai, Yang Wang, Sihan Xu, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 10157-10172
Open Access

Machine learning approaches to detect, prevent and mitigate malicious insider threats: State-of-the-art review
Ayshwarya Jaiswal, Pragya Dwivedi, Rupesh Kumar Dewang
Multimedia Tools and Applications (2024)
Closed Access

Unveiling the Pandemic’s Impact: A Dataset for Probing COVID-19’s Effects on E-Learning Activities and Academic Performance
Yanjun Liu, Daizhong Luo, Kate Wang, et al.
Lecture notes in computer science (2023), pp. 149-160
Closed Access

Analyzing the Impact of COVID-19 on Education: A Comparative Study Based on TOEFL Test Results
P. Xu, Wei Hong, Jiao Yin, et al.
Lecture notes in computer science (2023), pp. 175-184
Closed Access

Page 1

Scroll to top