OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A novel approach for detection and ranking of trendy and emerging cyber threat events in Twitter streams
Avishek Joey Bose, Vahid Behzadan, Carlos Aguirre, et al.
(2019)
Open Access | Times Cited: 21

Showing 21 citing articles:

A survey on cybersecurity knowledge graph construction
Xiaojuan Zhao, Rong Jiang, Yue Han, et al.
Computers & Security (2023) Vol. 136, pp. 103524-103524
Closed Access | Times Cited: 25

Processing tweets for cybersecurity threat awareness
Fernando Alves, Aurélien Bettini, Pedro Ferreira, et al.
Information Systems (2020) Vol. 95, pp. 101586-101586
Open Access | Times Cited: 53

Automated Emerging Cyber Threat Identification and Profiling Based on Natural Language Processing
Renato Marinho, Raimir Holanda Filho
IEEE Access (2023) Vol. 11, pp. 58915-58936
Open Access | Times Cited: 18

AI-based Cyber Event OSINT via Twitter Data
Dakota S. Dale, Kylie McClanahan, Qinghua Li
2016 International Conference on Computing, Networking and Communications (ICNC) (2023), pp. 436-442
Closed Access | Times Cited: 8

Detecting Cyber Threat Event from Twitter Using IDCNN and BiLSTM
Yong Fang, Jian Gao, Zhonglin Liu, et al.
Applied Sciences (2020) Vol. 10, Iss. 17, pp. 5922-5922
Open Access | Times Cited: 22

A Literature Review on Mining Cyberthreat Intelligence from Unstructured Texts
Md Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie Williams
2021 International Conference on Data Mining Workshops (ICDMW) (2020), pp. 516-525
Closed Access | Times Cited: 17

CySecAlert: An Alert Generation System for Cyber Security Events Using Open Source Intelligence Data
Thea Riebe, Tristan Wirth, Markus Bayer, et al.
Lecture notes in computer science (2021), pp. 429-446
Closed Access | Times Cited: 14

Detecting Trending Terms in Cybersecurity Forum Discussions
Jack Hughes, Seth Aycock, Andrew Caines, et al.
(2020)
Open Access | Times Cited: 14

Semantically Modeling Cyber Influence Campaigns (CICs): Ontology Model and Case Studies
Nathan Johnson, Benjamin Turnbull, T. P. Maher, et al.
IEEE Access (2020) Vol. 9, pp. 9365-9382
Open Access | Times Cited: 4

Towards Selecting Informative Content for Cyber Threat Intelligence
Panos Panagiotou, Christos Iliou, Konstantinos Apostolou, et al.
(2021), pp. 354-359
Closed Access | Times Cited: 4

Obtaining Cyber Threat Intelligence Data From Twitter With Deep Learning Methods
Ugur Tekin, Ercan Nurcan Yılmaz
2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT) (2021)
Closed Access | Times Cited: 4

Inductive-Deductive Reasoning in Qualitative Analysis using ATLAS.ti: Trending Cybersecurity Twitter Data Analytics
Ani Munirah Mohamad, Felicia Yong Yan Yan, Nurhazman Abdul Aziz, et al.
2022 3rd International Conference for Emerging Technology (INCET) (2022), pp. 1-5
Closed Access | Times Cited: 3

Can social media shape the security of next-generation connected vehicles?
Nicola Scarano, Luca Mannella, Alessandro Savino, et al.
(2024), pp. 1-4
Open Access

Detection and Classification of Cyber Threats in Tweets Toward Prevention
Sayanta Harh, Sourav Mandal, Debasis Giri
Lecture notes in electrical engineering (2023), pp. 83-98
Closed Access | Times Cited: 1

Tracing Relevant Twitter Accounts Active in Cyber Threat Intelligence Domain by Exploiting Content and Structure of Twitter Network
Avishek Joey Bose, Shreya Gopal Sundari, Vahid Behzadan, et al.
(2021), pp. 1-6
Closed Access | Times Cited: 3

A Framework to Detect Crime through Twitter Data in Cyberbullying with EFFDT Model
M. Nisha, J. Jebathangam
(2022), pp. 1544-1549
Closed Access | Times Cited: 2

Cyber Buzz: Examining Virality Characteristics of Cybersecurity Content In Social Networks
Thomas J. Shields, Hannah Li, Peter A. Lebedev, et al.
Proceedings of the Human Factors and Ergonomics Society Annual Meeting (2020) Vol. 64, Iss. 1, pp. 441-445
Closed Access | Times Cited: 1

Project Umbra
Timothy Wright, Shaun Whitfield, Sean Cahill, et al.
2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) (2020), pp. 748-751
Closed Access | Times Cited: 1

Motion-Based Handwriting Recognition and Word Reconstruction
Junshen Kevin Chen, Wanze Xie, Yutong He
arXiv (Cornell University) (2021)
Open Access | Times Cited: 1

Cross-site Scripting Threat Intelligence Detection Based on Deep Learning
Zhonglin Liu, Yong Fang, Yijia Xu
Communications in computer and information science (2022), pp. 89-104
Closed Access

Page 1

Scroll to top