OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

VulDetect: A novel technique for detecting software vulnerabilities using Language Models
Marwan Omar, Stavros Shiaeles
(2023), pp. 105-110
Closed Access | Times Cited: 20

Showing 20 citing articles:

Revolutionizing Malware Detection
Marwan Omar
Advances in medical technologies and clinical practice book series (2024), pp. 196-220
Closed Access | Times Cited: 32

When LLMs meet cybersecurity: a systematic literature review
Jie Zhang, H. Bu, Hui Wen, et al.
Cybersecurity (2025) Vol. 8, Iss. 1
Open Access | Times Cited: 3

Using Large Language Models to Better Detect and Handle Software Vulnerabilities and Cyber Security Threats
Seyed Mohammad Taghavi, Farid Feyzi
Research Square (Research Square) (2024)
Open Access | Times Cited: 10

A New Approach to Web Application Security: Utilizing GPT Language Models for Source Code Inspection
Zoltán Szabó, Vilmos Bilicki
Future Internet (2023) Vol. 15, Iss. 10, pp. 326-326
Open Access | Times Cited: 20

Large language models for software vulnerability detection: a guide for researchers on models, methods, techniques, datasets, and metrics
Seyed Mohammad Taghavi Far, Farid Feyzi
International Journal of Information Security (2025) Vol. 24, Iss. 2
Closed Access

Enhancing Cryptocurrency Security: Leveraging Embeddings and Large Language Models for Creating Cryptocurrency Security Expert Systems
Ahmed Mohamed Abdallah, Heba K. Aslan, Mohamed S. Abdallah, et al.
Symmetry (2025) Vol. 17, Iss. 4, pp. 496-496
Open Access

Integrating MLSecOps in the Biotechnology Industry 5.0
Naseela Pervez, Alexander J. Titus
IntechOpen eBooks (2024)
Open Access | Times Cited: 2

Automated Evidence Collection and Analysis Using AI
Luay Albtosh
Advances in information security, privacy, and ethics book series (2024), pp. 143-186
Closed Access | Times Cited: 2

May the Source Be with You: On ChatGPT, Cybersecurity, and Secure Coding
Tiago Espinha Gasiba, Andrei-Cristian Iosif, Ibrahim Kessba, et al.
Information (2024) Vol. 15, Iss. 9, pp. 572-572
Open Access | Times Cited: 1

Digital Forensic Data Mining and Pattern Recognition
Luay Albtosh
Advances in information security, privacy, and ethics book series (2024), pp. 245-294
Closed Access | Times Cited: 1

Advances in Cybersecurity and AI: Integrating Machine Learning, IoT, and Smart Systems for Resilience and Innovation Across Domains
Yara Shamoo
World Journal of Advanced Research and Reviews (2024) Vol. 23, Iss. 2, pp. 2450-2461
Open Access

ChatGPT-enabled Network Automation using API-based Prompts
Olasupo Okunaiya, Ron Austin, Shao Ying Zhu
(2024), pp. 1-5
Closed Access

Beyond Detection: Leveraging Large Language Models for Cyber Attack Prediction in IoT Networks
Alaeddine Diaf, Abdelaziz Amara Korba, Nour Elislem Karabadji, et al.
(2024), pp. 117-123
Open Access

LLM-based Vulnerability Sourcing from Unstructured Data
Virendra Ashiwal, Sören Finster, Abdallah Dawoud
(2024), pp. 634-641
Closed Access

PatUntrack: Automated Generating Patch Examples for Issue Reports without Tracked Insecure Code
Ziyou Jiang, Lin Shi, Guowei Yang, et al.
(2024) Vol. 1547, pp. 1-13
Closed Access

Benchmarking Out of the Box Open-Source LLMs for Malware Detection Based on API Calls Sequences
Ciprian-Alin Simion, Gheorghe Balan, Dragoş Teodor Gavriluţ
Lecture notes in computer science (2024), pp. 133-142
Closed Access

Source Code Analysis With Deep Neural Networks
Rebet Jones
Advances in information security, privacy, and ethics book series (2024), pp. 355-378
Closed Access

The Role of Cybersecurity Legislation in Promoting Data Privacy
Ngozi Tracy Aleke
Advances in information security, privacy, and ethics book series (2024), pp. 205-244
Closed Access

Page 1

Scroll to top