OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Survey on Threat Hunting in Enterprise Networks
Boubakr Nour, Makan Pourzandi, Mourad Debbabi
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 4, pp. 2299-2324
Closed Access | Times Cited: 23

Showing 23 citing articles:

Detecting Cyber Threats With a Graph-Based NIDPS
Brendan Ooi Tze Wen, Najihah Syahriza, Nicholas Chan Wei Xian, et al.
Advances in logistics, operations, and management science book series (2023), pp. 36-74
Closed Access | Times Cited: 22

TrustNextGen: Security Aspects of Trustworthy Next-Generation Industrial Internet of Things
Geetanjali Rathee, Razi Iqbal, Chaker Abdelaziz Kerrache, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 15, pp. 25568-25576
Open Access | Times Cited: 10

Evolving techniques in cyber threat hunting: A systematic review
Arash Mahboubi, Khanh Luong, Hamed Aboutorab, et al.
Journal of Network and Computer Applications (2024) Vol. 232, pp. 104004-104004
Open Access | Times Cited: 8

Digital-Twin-Driven Deception Platform: Vision and Way Forward
Sabah Suhail, Mubashar Iqbal, Kieran McLaughlin
IEEE Internet Computing (2024) Vol. 28, Iss. 4, pp. 40-47
Open Access | Times Cited: 4

Insights into user behavioral-based insider threat detection: systematic review
K. Kartheeban, E. Uma
International Journal of Information Security (2025) Vol. 24, Iss. 2
Closed Access

Enterprise Networking Optimization: A Review of Challenges, Solutions, and Technological Interventions
Oladele F. Afolalu, Mohohlo Samuel Tšoeu
Future Internet (2025) Vol. 17, Iss. 4, pp. 133-133
Open Access

LLMCloudHunter: Harnessing LLMs for Automated Extraction of Detection Rules from Cloud-Based CTI
Yuval Schwartz, Lavi Ben-Shimol, Dudu Mimran, et al.
(2025), pp. 1922-1941
Closed Access

A sustainable and trusted solution for IoT-based federated learning using feedback behavior
Geetanjali Rathee, Chaker Abdelaziz Kerrache, Carlos T. Calafate
Internet of Things (2024) Vol. 26, pp. 101177-101177
Closed Access | Times Cited: 3

Proactive Threat Hunting in Critical Infrastructure Protection through Hybrid Machine Learning Algorithm Application
Shan Ali, Seunghwan Myeong
Sensors (2024) Vol. 24, Iss. 15, pp. 4888-4888
Open Access | Times Cited: 2

A Proposed Approach to Integrate Application Security Vulnerability Data with Incidence Response Systems
Santanam Kasturi, Xiaolong Li, Peng Li, et al.
American Journal of Networks and Communications (2024) Vol. 13, Iss. 1, pp. 19-29
Open Access | Times Cited: 1

On the Benefits of Vulnerability Data Consolidation in Application Security
Santanam Kasturi, Xiaolong Li, Peng Li, et al.
International Conference on Cyber Warfare and Security (2024) Vol. 19, Iss. 1, pp. 455-462
Open Access | Times Cited: 1

Generative AI for Threat Intelligence and Information Sharing
Siva Raja Sindiramutty, Krishna Raj V. Prabagaran, N. Z. Jhanjhi, et al.
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 191-234
Closed Access | Times Cited: 1

Efficient Host Intrusion Detection using Hyperdimensional Computing
Yujin Nam, Rachel King, Quinn Burke, et al.
2021 IEEE International Conference on Big Data (Big Data) (2024), pp. 2645-2652
Closed Access

AUTOMA: Automated Generation of Attack Hypotheses and Their Variants for Threat Hunting Using Knowledge Discovery
Boubakr Nour, Makan Pourzandi, Rushaan Kamran Qureshi, et al.
IEEE Transactions on Network and Service Management (2024) Vol. 21, Iss. 5, pp. 5178-5196
Closed Access

Accurify: Automated New Testflows Generation for Attack Variants in Threat Hunting
Boubakr Nour, Makan Pourzandi, Rushaan Kamran Qureshi, et al.
Lecture notes in computer science (2024), pp. 52-69
Closed Access

On the Use of Neurosymbolic AI for Defending Against Cyber Attacks
Gudmund Grov, Jonas Halvorsen, Magnus Wiik Eckhoff, et al.
Lecture notes in computer science (2024), pp. 119-140
Closed Access

Accelerating CKKS Homomorphic Encryption with Data Compression on GPUs
Quoc Bao Phan, Linh M. Nguyen, Tuy Tan Nguyen
2022 IEEE 65th International Midwest Symposium on Circuits and Systems (MWSCAS) (2024), pp. 1145-1149
Closed Access

Machine Learning and Large Language Models-based Techniques for Cyber Threat Detection: A Comparative Study
Anes Abdennebi, Reda Morsli, Nadjia Kara, et al.
(2024), pp. 1-9
Closed Access

Leveraging Tech Towards Keeping Ahead of Cyber Threats and Alleviating Security Analysts’ Alert Fatigue
S. A. Soman, Zoheir Ezziane
Lecture notes in networks and systems (2024), pp. 1-19
Closed Access

Editorial: Fourth Quarter 2023 IEEE Communications Surveys and Tutorials
Dusit Niyato
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 4, pp. i-viii
Open Access

A Modular Approach to Automatic Cyber Threat Attribution using Opinion Pools
Koen T. W. Teuwen
2021 IEEE International Conference on Big Data (Big Data) (2023), pp. 3089-3098
Open Access

Navigating the Landscape of Robust and Secure Artificial Intelligence: A Comprehensive Literature Review
Et al. Saurabh Suman Choudhuri
International Journal on Recent and Innovation Trends in Computing and Communication (2023) Vol. 11, Iss. 11, pp. 617-623
Open Access

Page 1

Scroll to top