
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Automatic Detection of Cyber Security Related Accounts on Online Social Networks
Cagri Burak Aslan, Rahime Belen Sağlam, Shujun Li
(2018)
Open Access | Times Cited: 23
Cagri Burak Aslan, Rahime Belen Sağlam, Shujun Li
(2018)
Open Access | Times Cited: 23
Showing 23 citing articles:
Computational System to Classify Cyber Crime Offenses using Machine Learning
Ch. Rupa, Thippa Reddy Gadekallu, Mustufa Haider Abidi, et al.
Sustainability (2020) Vol. 12, Iss. 10, pp. 4087-4087
Open Access | Times Cited: 90
Ch. Rupa, Thippa Reddy Gadekallu, Mustufa Haider Abidi, et al.
Sustainability (2020) Vol. 12, Iss. 10, pp. 4087-4087
Open Access | Times Cited: 90
A Systematic Literature Review on the Cyber Security
Dr.Yusuf Perwej, Syed Qamar Abbas, Jai Pratap Dixit, et al.
International Journal of Scientific Research and Management (IJSRM) (2021) Vol. 9, Iss. 12, pp. 669-710
Open Access | Times Cited: 82
Dr.Yusuf Perwej, Syed Qamar Abbas, Jai Pratap Dixit, et al.
International Journal of Scientific Research and Management (IJSRM) (2021) Vol. 9, Iss. 12, pp. 669-710
Open Access | Times Cited: 82
Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security
Ashok Yadav, Atul Kumar, Vrijendra Singh
Artificial Intelligence Review (2023) Vol. 56, Iss. 11, pp. 12407-12438
Open Access | Times Cited: 19
Ashok Yadav, Atul Kumar, Vrijendra Singh
Artificial Intelligence Review (2023) Vol. 56, Iss. 11, pp. 12407-12438
Open Access | Times Cited: 19
Classification of spammer and nonspammer content in online social network using genetic algorithm-based feature selection
Somya Ranjan Sahoo, Brij B. Gupta
Enterprise Information Systems (2020) Vol. 14, Iss. 5, pp. 710-736
Closed Access | Times Cited: 42
Somya Ranjan Sahoo, Brij B. Gupta
Enterprise Information Systems (2020) Vol. 14, Iss. 5, pp. 710-736
Closed Access | Times Cited: 42
Spammer Detection Approaches in Online Social Network (OSNs): A Survey
Somya Ranjan Sahoo, Brij B. Gupta, Dragan Peraković, et al.
EAI/Springer Innovations in Communication and Computing (2022), pp. 159-180
Closed Access | Times Cited: 17
Somya Ranjan Sahoo, Brij B. Gupta, Dragan Peraković, et al.
EAI/Springer Innovations in Communication and Computing (2022), pp. 159-180
Closed Access | Times Cited: 17
Twitter Fake Account Detection and Classification using Ontological Engineering and Semantic Web Rule Language
Mohammed Hussein Jabardi, Asaad Sabah Hadi
Karbala International Journal of Modern Science (2020) Vol. 6, Iss. 4
Open Access | Times Cited: 25
Mohammed Hussein Jabardi, Asaad Sabah Hadi
Karbala International Journal of Modern Science (2020) Vol. 6, Iss. 4
Open Access | Times Cited: 25
Popularity-Based Detection of Malicious Content in Facebook Using Machine Learning Approach
Somya Ranjan Sahoo, Brij B. Gupta
Advances in intelligent systems and computing (2019), pp. 163-176
Closed Access | Times Cited: 14
Somya Ranjan Sahoo, Brij B. Gupta
Advances in intelligent systems and computing (2019), pp. 163-176
Closed Access | Times Cited: 14
A Study On Various Cyber Attacks And A Proposed Intelligent System For Monitoring Such Attacks
Atul S. Choudhary, Pankaj P Choudhary, Shrikant Salve
(2018), pp. 612-617
Closed Access | Times Cited: 13
Atul S. Choudhary, Pankaj P Choudhary, Shrikant Salve
(2018), pp. 612-617
Closed Access | Times Cited: 13
The World of Defacers: Looking Through the Lens of Their Activities on Twitter
Cagri Burak Aslan, Shujun Li, Fatih V. Çelebi, et al.
IEEE Access (2020) Vol. 8, pp. 204132-204143
Open Access | Times Cited: 9
Cagri Burak Aslan, Shujun Li, Fatih V. Çelebi, et al.
IEEE Access (2020) Vol. 8, pp. 204132-204143
Open Access | Times Cited: 9
Behind the Mask: A Computational Study of Anonymous' Presence on Twitter
Keenan Jones, Jason R. C. Nurse, Shujun Li
Proceedings of the International AAAI Conference on Web and Social Media (2020) Vol. 14, pp. 327-338
Open Access | Times Cited: 8
Keenan Jones, Jason R. C. Nurse, Shujun Li
Proceedings of the International AAAI Conference on Web and Social Media (2020) Vol. 14, pp. 327-338
Open Access | Times Cited: 8
Detecting cyber security related Twitter accounts and different sub-groups
Mohamad Imad Mahaini, Shujun Li
(2021), pp. 599-606
Open Access | Times Cited: 6
Mohamad Imad Mahaini, Shujun Li
(2021), pp. 599-606
Open Access | Times Cited: 6
Building Taxonomies based on Human-Machine Teaming
Mohamad Imad Mahaini, Shujun Li, Rahime Belen Sağlam
Proceedings of the 17th International Conference on Availability, Reliability and Security (2019) Vol. 5, pp. 1-9
Open Access | Times Cited: 5
Mohamad Imad Mahaini, Shujun Li, Rahime Belen Sağlam
Proceedings of the 17th International Conference on Availability, Reliability and Security (2019) Vol. 5, pp. 1-9
Open Access | Times Cited: 5
Spam Detection using ANN and ABC Algorithm
Amar Singh, Nidhi Chahal, Simranjit Singh, et al.
2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (2021)
Closed Access | Times Cited: 4
Amar Singh, Nidhi Chahal, Simranjit Singh, et al.
2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (2021)
Closed Access | Times Cited: 4
Obtaining Cyber Threat Intelligence Data From Twitter With Deep Learning Methods
Ugur Tekin, Ercan Nurcan Yılmaz
2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT) (2021)
Closed Access | Times Cited: 4
Ugur Tekin, Ercan Nurcan Yılmaz
2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT) (2021)
Closed Access | Times Cited: 4
Inductive-Deductive Reasoning in Qualitative Analysis using ATLAS.ti: Trending Cybersecurity Twitter Data Analytics
Ani Munirah Mohamad, Felicia Yong Yan Yan, Nurhazman Abdul Aziz, et al.
2022 3rd International Conference for Emerging Technology (INCET) (2022), pp. 1-5
Closed Access | Times Cited: 3
Ani Munirah Mohamad, Felicia Yong Yan Yan, Nurhazman Abdul Aziz, et al.
2022 3rd International Conference for Emerging Technology (INCET) (2022), pp. 1-5
Closed Access | Times Cited: 3
A Comprehensive Review of Anomaly Detection in Web Logs
Mehryar Majd, Pejman Najafi, Seyed Ali Alhosseini, et al.
(2022), pp. 158-165
Closed Access | Times Cited: 3
Mehryar Majd, Pejman Najafi, Seyed Ali Alhosseini, et al.
(2022), pp. 158-165
Closed Access | Times Cited: 3
Social Spammer Detection Based on PSO-CatBoost
LI Shu-peng, Frank Jiang, Yunbai Qin, et al.
Lecture notes in computer science (2021), pp. 382-395
Closed Access | Times Cited: 2
LI Shu-peng, Frank Jiang, Yunbai Qin, et al.
Lecture notes in computer science (2021), pp. 382-395
Closed Access | Times Cited: 2
Filtering Users Accounts for Enhancing the Results of Social Media Mining Tasks
May Shalaby, Ahmed Rafea
Advances in intelligent systems and computing (2020), pp. 391-400
Closed Access | Times Cited: 1
May Shalaby, Ahmed Rafea
Advances in intelligent systems and computing (2020), pp. 391-400
Closed Access | Times Cited: 1
Social cyber-criminal, towards automatic real time recognition of malicious posts on Twitter
Yasser Ibrahim, Mohammed Abdel Razek, Nasser A. El-Sherbeny
Indonesian Journal of Electrical Engineering and Computer Science (2022) Vol. 25, Iss. 2, pp. 1199-1199
Open Access | Times Cited: 1
Yasser Ibrahim, Mohammed Abdel Razek, Nasser A. El-Sherbeny
Indonesian Journal of Electrical Engineering and Computer Science (2022) Vol. 25, Iss. 2, pp. 1199-1199
Open Access | Times Cited: 1
Social Spammer Detection Based on Semi-Supervised Learning
Xulong Zhang, Frank Jiang, Ran Zhang, et al.
2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (2021), pp. 849-855
Closed Access | Times Cited: 1
Xulong Zhang, Frank Jiang, Ran Zhang, et al.
2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (2021), pp. 849-855
Closed Access | Times Cited: 1
CSCD: A Cyber Security Community Detection Scheme on Online Social Networks
Yutong Zeng, Honghao Yu, WU Tie-jun, et al.
(2023), pp. 135-150
Closed Access
Yutong Zeng, Honghao Yu, WU Tie-jun, et al.
(2023), pp. 135-150
Closed Access
Cyber Security Researchers on Online Social Networks: From the Lens of the UK’s ACEs-CSR on Twitter
Mohamad Imad Mahaini, Shujun Li
Lecture notes in computer science (2023), pp. 129-148
Closed Access
Mohamad Imad Mahaini, Shujun Li
Lecture notes in computer science (2023), pp. 129-148
Closed Access
Image Based Classification of Rumor Information from the Social Network Platform
V. Sreenivasulu, Mohammed Abdul Wajeed
Traitement du signal (2021) Vol. 38, Iss. 5, pp. 1413-1421
Open Access
V. Sreenivasulu, Mohammed Abdul Wajeed
Traitement du signal (2021) Vol. 38, Iss. 5, pp. 1413-1421
Open Access