
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Automated Emerging Cyber Threat Identification and Profiling Based on Natural Language Processing
Renato Marinho, Raimir Holanda Filho
IEEE Access (2023) Vol. 11, pp. 58915-58936
Open Access | Times Cited: 18
Renato Marinho, Raimir Holanda Filho
IEEE Access (2023) Vol. 11, pp. 58915-58936
Open Access | Times Cited: 18
Showing 18 citing articles:
Machine learning for enhancing transportation security: A comprehensive analysis of electric and flying vehicle systems
Hamed Alqahtani, Gulshan Kumar
Engineering Applications of Artificial Intelligence (2023) Vol. 129, pp. 107667-107667
Closed Access | Times Cited: 60
Hamed Alqahtani, Gulshan Kumar
Engineering Applications of Artificial Intelligence (2023) Vol. 129, pp. 107667-107667
Closed Access | Times Cited: 60
Artificial intelligence (AI) advancements for transportation security: in-depth insights into electric and aerial vehicle systems
Gulshan Kumar, Ali Altalbe
Environment Development and Sustainability (2024)
Closed Access | Times Cited: 5
Gulshan Kumar, Ali Altalbe
Environment Development and Sustainability (2024)
Closed Access | Times Cited: 5
Enhancing Communication Networks in the New Era with Artificial Intelligence: Techniques, Applications, and Future Directions
Mohammed El‐Hajj
Network (2025) Vol. 5, Iss. 1, pp. 1-1
Open Access
Mohammed El‐Hajj
Network (2025) Vol. 5, Iss. 1, pp. 1-1
Open Access
Foundations of Autonomous Cyber Defense Systems
Salam Al-E’mari, Yousef Sanjalawe, Fuad Fataftah, et al.
Advances in computational intelligence and robotics book series (2025), pp. 1-34
Closed Access
Salam Al-E’mari, Yousef Sanjalawe, Fuad Fataftah, et al.
Advances in computational intelligence and robotics book series (2025), pp. 1-34
Closed Access
Social Media Zero-Day Attack Detection Using TensorFlow
Ahmet E. Topcu, Yehia Ibrahim Alzoubi, Ersin Elbaşi, et al.
Electronics (2023) Vol. 12, Iss. 17, pp. 3554-3554
Open Access | Times Cited: 10
Ahmet E. Topcu, Yehia Ibrahim Alzoubi, Ersin Elbaşi, et al.
Electronics (2023) Vol. 12, Iss. 17, pp. 3554-3554
Open Access | Times Cited: 10
Artificial intelligence, machine learning, and deep learning for cybersecurity solutions: a review of emerging technologies and applications
Mallikarjuna Paramesha, Nitin Liladhar Rane, Jayesh Rane
SSRN Electronic Journal (2024)
Closed Access | Times Cited: 3
Mallikarjuna Paramesha, Nitin Liladhar Rane, Jayesh Rane
SSRN Electronic Journal (2024)
Closed Access | Times Cited: 3
Open Source Intelligence Opportunities and Challenges: a Review
Sabina Szymoniak, Kacper Foks
Advances in Science and Technology – Research Journal (2024) Vol. 18, Iss. 3, pp. 123-139
Open Access | Times Cited: 2
Sabina Szymoniak, Kacper Foks
Advances in Science and Technology – Research Journal (2024) Vol. 18, Iss. 3, pp. 123-139
Open Access | Times Cited: 2
Social Media Mining to Detect Online Violent Extremism using Machine Learning Techniques
Shynar Mussiraliyeva, Kalamkas Bagitova, Daniyar Sultan
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 6
Open Access | Times Cited: 5
Shynar Mussiraliyeva, Kalamkas Bagitova, Daniyar Sultan
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 6
Open Access | Times Cited: 5
Automated AI Research On Cyber Attack Prediction And Security Design
Ravikiran Madala, N. Vijayakumar, N Nandini, et al.
(2023), pp. 1391-1395
Closed Access | Times Cited: 4
Ravikiran Madala, N. Vijayakumar, N Nandini, et al.
(2023), pp. 1391-1395
Closed Access | Times Cited: 4
Digital forensic of Maze ransomware: A case of electricity distributor enterprise in ASEAN
Krishna Chimmanee, Suttisak Jantavongso
Expert Systems with Applications (2024) Vol. 249, pp. 123652-123652
Open Access | Times Cited: 1
Krishna Chimmanee, Suttisak Jantavongso
Expert Systems with Applications (2024) Vol. 249, pp. 123652-123652
Open Access | Times Cited: 1
A Comprehensive Review on Transforming Security and Privacy with NLP
Rachit Garg, Anshul Gupta, Atul Srivastava
Lecture notes in networks and systems (2024), pp. 147-159
Closed Access | Times Cited: 1
Rachit Garg, Anshul Gupta, Atul Srivastava
Lecture notes in networks and systems (2024), pp. 147-159
Closed Access | Times Cited: 1
Malware Threats Targeting Cryptocurrency: A Comparative Study
Mohammad Alauthman, Ahmad Al–Qerem, Mouhammd Alkasassbeh, et al.
(2024), pp. 1-8
Closed Access | Times Cited: 1
Mohammad Alauthman, Ahmad Al–Qerem, Mouhammd Alkasassbeh, et al.
(2024), pp. 1-8
Closed Access | Times Cited: 1
Enhanced threat intelligence framework for advanced cybersecurity resilience
Moutaz Alazab, Ruba Abu Khurma, M. G. Arenas, et al.
Egyptian Informatics Journal (2024) Vol. 27, pp. 100521-100521
Open Access | Times Cited: 1
Moutaz Alazab, Ruba Abu Khurma, M. G. Arenas, et al.
Egyptian Informatics Journal (2024) Vol. 27, pp. 100521-100521
Open Access | Times Cited: 1
MSCMGTB: A Novel Approach for Multimodal Social Media Content Moderation Using Hybrid Graph Theory and Bio-Inspired Optimization
Premnarayan Arya, Amit Pandey, S. Gopal Krishna Patro, et al.
IEEE Access (2024) Vol. 12, pp. 73700-73718
Open Access
Premnarayan Arya, Amit Pandey, S. Gopal Krishna Patro, et al.
IEEE Access (2024) Vol. 12, pp. 73700-73718
Open Access
Malware Detection System Using Natural Language Processing Based on Website Links
Lare Adeola, Celestine Iwendi
(2024), pp. 1-5
Closed Access
Lare Adeola, Celestine Iwendi
(2024), pp. 1-5
Closed Access
Assessing Cybersecurity Threats: The Application of NLP in Advanced Threat Intelligence Systems
Md Aminul Islam, Rabiul Islam, Sabbir Ahmed Chowdhury, et al.
Lecture notes in networks and systems (2024), pp. 1-14
Closed Access
Md Aminul Islam, Rabiul Islam, Sabbir Ahmed Chowdhury, et al.
Lecture notes in networks and systems (2024), pp. 1-14
Closed Access
Wire Fraud Prevention in Digital Real Estate Transactions: a Comprehensive Security Framework
Sundar Subramanian -
International Journal For Multidisciplinary Research (2024) Vol. 6, Iss. 6
Closed Access
Sundar Subramanian -
International Journal For Multidisciplinary Research (2024) Vol. 6, Iss. 6
Closed Access
Factors Influencing Frameworks for Social Cybersecurity Management. A Systematic Literature Review
Edgar Rodriguez, José Santisteban, Vicente Morales, et al.
Lecture notes in networks and systems (2024), pp. 162-179
Closed Access
Edgar Rodriguez, José Santisteban, Vicente Morales, et al.
Lecture notes in networks and systems (2024), pp. 162-179
Closed Access
AI and NLP-Empowered Framework for Strengthening Social Cyber Security
Mudasir Ahmad Wani
Advances in data mining and database management book series (2023), pp. 32-45
Closed Access
Mudasir Ahmad Wani
Advances in data mining and database management book series (2023), pp. 32-45
Closed Access