OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Quantifying the Significance and Relevance of Cyber-Security Text Through Textual Similarity and Cyber-Security Knowledge Graph
Otgonpurev Mendsaikhan, Hirokazu Hasegawa, Yukiko Yamaguchi, et al.
IEEE Access (2020) Vol. 8, pp. 177041-177052
Open Access | Times Cited: 19

Showing 19 citing articles:

An efficient cyber security system based on flow-based anomaly detection using Artificial neural network
J. Jasmine Hephzipah, Ranadheer Reddy Vallem, M.Sahaya Sheela, et al.
Deleted Journal (2023), pp. 48-56
Open Access | Times Cited: 15

Assessment of cyber security systems using atrous to enhance anomaly detection mechanism
Yogesh Pawar, Pawar Anil Bhausaheb
AIP conference proceedings (2025) Vol. 3175, pp. 020100-020100
Closed Access

Blockchain-Enabled Cybersecurity Provision for Scalable Heterogeneous Network: A Comprehensive Survey
Md. Shohidul Islam, Md. Arafatur Rahman, Mohamed Ariff Ameedeen, et al.
Computer Modeling in Engineering & Sciences (2023) Vol. 138, Iss. 1, pp. 43-123
Open Access | Times Cited: 8

An IoT-Based Deep Learning Approach for Online Fault Detection Against Cyber-Attacks
R. Sujatha, S. Lilly Sheeba, R. Sivakami, et al.
SN Computer Science (2023) Vol. 4, Iss. 4
Closed Access | Times Cited: 7

Impact of Information Leakage and Conserving Digital Privacy
Kishore Kumar Senapati, Abhishek Kumar, Kunal Sinha
Advances in information security, privacy, and ethics book series (2023), pp. 166-188
Closed Access | Times Cited: 4

SECDFAN: A Cyber Threat Intelligence System for Discussion Forums Utilization
Georgios Sakellariou, Panagiotis Fouliras, Ioannis Mavridis
Eng—Advances in Engineering (2023) Vol. 4, Iss. 1, pp. 615-634
Open Access | Times Cited: 3

KGSecConfig: A Knowledge Graph Based Approach for Secured Container Orchestrator Configuration
Mubin Ul Haque, M. Mehdi Kholoosi, Muhammad Ali Babar
2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER) (2022), pp. 420-431
Open Access | Times Cited: 5

Application of User and Entity Behavioral Analytics (UEBA) in the Detection of Cyber Threats and Vulnerabilities Management
Rahma Olaniyan, Sandip Rakshit, Narasimha Rao Vajjhala
Lecture notes in electrical engineering (2023), pp. 419-426
Closed Access | Times Cited: 2

Visualization Method of Key Knowledge Points of Nursing Teaching Management System Based on SOM Algorithm and Biomedical Diagnosis
Die Hu, Le Fang
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-9
Open Access | Times Cited: 3

Towards Selecting Informative Content for Cyber Threat Intelligence
Panos Panagiotou, Christos Iliou, Konstantinos Apostolou, et al.
(2021), pp. 354-359
Closed Access | Times Cited: 4

Detecting and mitigating cyber-physical attacks in microgrids to ensure resilient and sustainable communities
A. Sahaya Sudha, C.M. Naga Sudha, Anand Shajina
Elsevier eBooks (2024), pp. 215-231
Closed Access

Efficient Cyber Security Framework for IoT Using Machine Learning Algorithms
Urvashi Sangwan
Deleted Journal (2024) Vol. 20, Iss. 6s, pp. 2444-2451
Open Access

Deep Learning-based Knowledge Graph and Digital Twin Relationship Mining and Prediction Modeling
Fangzhou He, Wei Bai, Zhiqi Wang
Applied Mathematics and Nonlinear Sciences (2024) Vol. 9, Iss. 1
Open Access

Knowledge Graphs and Semantic Web Tools in Cyber Threat Intelligence: A Systematic Literature Review
Charalampos Bratsas, Efstathios Konstantinos Anastasiadis, A. Angelidis, et al.
Journal of Cybersecurity and Privacy (2024) Vol. 4, Iss. 3, pp. 518-545
Open Access

Cyber Security Unveiled: Trends and Protections in the Digital World
M. P. Haripriya
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT (2023) Vol. 07, Iss. 07
Open Access | Times Cited: 1

An Overview of Cybersecurity Knowledge Graphs Mapped to the MITRE ATT&CK Framework Domains
Joshua Bolton, Lavanya Elluri, Karuna Pande Joshi
(2023), pp. 01-06
Closed Access | Times Cited: 1

Securing IoT Networks for Detection of Cyber Attacks using Automated Machine Learning
Urvashi Sangwan, Rajender Singh Chhillar
International Journal on Recent and Innovation Trends in Computing and Communication (2023) Vol. 11, Iss. 5s, pp. 172-177
Open Access

Data Security Knowledge Graph for Active Distribution Network
Qianliang Li, Renjie Dai, Siming Wei, et al.
Communications in computer and information science (2022), pp. 193-204
Closed Access

The Computational and Symbolic Security Analysis Connections
U Vinod Kumar, Sanjay Pachauri
2022 4th International Conference on Inventive Research in Computing Applications (ICIRCA) (2022), pp. 617-620
Closed Access

Page 1

Scroll to top