OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Extractor: Extracting Attack Behavior from Threat Reports
Kiavash Satvat, Rigel Gjomemo, V. N. Venkatakrishnan
(2021), pp. 598-615
Open Access | Times Cited: 60

Showing 1-25 of 60 citing articles:

Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives
Nan Sun, Ming Ding, Jiaojiao Jiang, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 3, pp. 1748-1774
Open Access | Times Cited: 104

CSKG4APT: A Cybersecurity Knowledge Graph for Advanced Persistent Threat Organization Attribution
Yitong Ren, Yanjun Xiao, Yinghai Zhou, et al.
IEEE Transactions on Knowledge and Data Engineering (2022), pp. 1-15
Closed Access | Times Cited: 79

AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports
Zhenyuan Li, Jun Zeng, Yan Chen, et al.
Lecture notes in computer science (2022), pp. 589-609
Open Access | Times Cited: 60

Understanding Indicators of Compromise against Cyber-attacks in Industrial Control Systems: A Security Perspective
Mohammed Asiri, Neetesh Saxena, Rigel Gjomemo, et al.
ACM Transactions on Cyber-Physical Systems (2023) Vol. 7, Iss. 2, pp. 1-33
Open Access | Times Cited: 29

A Survey on Threat Hunting in Enterprise Networks
Boubakr Nour, Makan Pourzandi, Mourad Debbabi
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 4, pp. 2299-2324
Closed Access | Times Cited: 22

Looking Beyond IoCs: Automatically Extracting Attack Patterns from External CTI
Tanvirul Alam, Dipkamal Bhusal, Youngja Park, et al.
(2023), pp. 92-108
Open Access | Times Cited: 19

CDTier: A Chinese Dataset of Threat Intelligence Entity Relationships
Yinghai Zhou, Yitong Ren, Ming Yi, et al.
IEEE Transactions on Sustainable Computing (2023) Vol. 8, Iss. 4, pp. 627-638
Open Access | Times Cited: 18

K-CTIAA: Automatic Analysis of Cyber Threat Intelligence Based on a Knowledge Graph
LI Zong-xun, Yujun Li, Yiwei Liu, et al.
Symmetry (2023) Vol. 15, Iss. 2, pp. 337-337
Open Access | Times Cited: 15

The Rise of GoodFATR: A Novel Accuracy Comparison Methodology for Indicator Extraction Tools
Juan Caballero, Gibran Gómez, Srdjan Matic, et al.
Future Generation Computer Systems (2023) Vol. 144, pp. 74-89
Open Access | Times Cited: 13

DeepOP: A Hybrid Framework for MITRE ATT&CK Sequence Prediction via Deep Learning and Ontology
Shuqin Zhang, Xiao Xue, Xinyu Su
Electronics (2025) Vol. 14, Iss. 2, pp. 257-257
Open Access

Detection and Threat-Hunting Approaches for Advanced Persistent Threats
Sutanu Kumar Ghosh, Rigel Gjomemo
(2025), pp. 623-627
Closed Access

Alert Fatigue in Security Operations Centres: Research Challenges and Opportunities
Shahroz Tariq, Mohan Baruwal Chhetri, ‪Surya Nepal‬, et al.
ACM Computing Surveys (2025)
Closed Access

NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation
Shaofei Li, Feng Dong, Xusheng Xiao, et al.
(2024)
Open Access | Times Cited: 4

Advanced Persistent Threat intelligent profiling technique: A survey
Binhui Tang, Junfeng Wang, Zhongkun Yu, et al.
Computers & Electrical Engineering (2022) Vol. 103, pp. 108261-108261
Closed Access | Times Cited: 17

Privacy-Preserving Few-Shot Traffic Detection Against Advanced Persistent Threats via Federated Meta Learning
Y.-Q. Hu, Jun Wu, Gaolei Li, et al.
IEEE Transactions on Network Science and Engineering (2023) Vol. 11, Iss. 3, pp. 2549-2560
Closed Access | Times Cited: 10

AttacKG+: Boosting attack graph construction with Large Language Models
Yongheng Zhang, Tingwen Du, Yunshan Ma, et al.
Computers & Security (2024), pp. 104220-104220
Open Access | Times Cited: 3

Inferring Recovery Steps from Cyber Threat Intelligence Reports
Zsolt Levente Kucsván, Marco Caselli, Andreas Peter, et al.
Lecture notes in computer science (2024), pp. 330-349
Closed Access | Times Cited: 2

Constructing Knowledge Graph from Cyber Threat Intelligence Using Large Language Model
Jiehui Liu, Jieyu Zhan
2021 IEEE International Conference on Big Data (Big Data) (2023), pp. 516-521
Closed Access | Times Cited: 6

CyNER: Information Extraction from Unstructured Text of CTI Sources with Noncontextual IOCs
Shota Fujii, Nobutaka Kawaguchi, Tomohiro Shigemoto, et al.
Lecture notes in computer science (2022), pp. 85-104
Closed Access | Times Cited: 10

SeqMask: Behavior Extraction Over Cyber Threat Intelligence Via Multi-Instance Learning
Wenhan Ge, Junfeng Wang
The Computer Journal (2022) Vol. 67, Iss. 1, pp. 253-273
Closed Access | Times Cited: 10

Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study: (Practical Experience Report)
Vittorio Orbinato, Mariarosaria Barbaraci, Roberto Natella, et al.
(2022), pp. 181-192
Closed Access | Times Cited: 10

Context2Vector: Accelerating security event triage via context representation learning
Jia Liu, Runzi Zhang, Wenmao Liu, et al.
Information and Software Technology (2022) Vol. 146, pp. 106856-106856
Closed Access | Times Cited: 8

Software Updates Strategies: A Quantitative Evaluation Against Advanced Persistent Threats
Giorgio Di Tizio, Michele Armellini, Fabio Massacci
IEEE Transactions on Software Engineering (2022) Vol. 49, Iss. 3, pp. 1359-1373
Open Access | Times Cited: 8

MITREtrieval: Retrieving MITRE Techniques From Unstructured Threat Reports by Fusion of Deep Learning and Ontology
Yi-Ting Huang, R. Vaitheeshwari, Meng Chang Chen, et al.
IEEE Transactions on Network and Service Management (2024) Vol. 21, Iss. 4, pp. 4871-4887
Closed Access | Times Cited: 1

Page 1 - Next Page

Scroll to top