
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Comparison and Evaluation on Static Application Security Testing (SAST) Tools for Java
Kaixuan Li, Sen Chen, Lingling Fan, et al.
(2023)
Closed Access | Times Cited: 8
Kaixuan Li, Sen Chen, Lingling Fan, et al.
(2023)
Closed Access | Times Cited: 8
Showing 8 citing articles:
Automatic Inspection of Static Application Security Testing (SAST) Reports via Large Language Model Reasoning
Kaixuan Li, Han Liu, Lyuye Zhang, et al.
Communications in computer and information science (2025), pp. 128-142
Closed Access
Kaixuan Li, Han Liu, Lyuye Zhang, et al.
Communications in computer and information science (2025), pp. 128-142
Closed Access
AndroCom: A Real-World Android Applications’ Vulnerability Dataset to Assist with Automatically Detecting Vulnerabilities
Kaya Emre CİBALIK, Ercan Nurcan Yılmaz
Applied Sciences (2025) Vol. 15, Iss. 5, pp. 2665-2665
Open Access
Kaya Emre CİBALIK, Ercan Nurcan Yılmaz
Applied Sciences (2025) Vol. 15, Iss. 5, pp. 2665-2665
Open Access
Just another copy and paste? Comparing the security vulnerabilities of ChatGPT generated code and StackOverflow answers
Sivana Hamer, Marcelo d’Amorim, Laurie Williams
(2024), pp. 87-94
Open Access | Times Cited: 3
Sivana Hamer, Marcelo d’Amorim, Laurie Williams
(2024), pp. 87-94
Open Access | Times Cited: 3
An Empirical Study of Static Analysis Tools for Secure Code Review
Wachiraphan Charoenwet, Patanamon Thongtanunam, Van-Thuan Pham, et al.
(2024), pp. 691-703
Closed Access | Times Cited: 2
Wachiraphan Charoenwet, Patanamon Thongtanunam, Van-Thuan Pham, et al.
(2024), pp. 691-703
Closed Access | Times Cited: 2
Security Evaluation of Companion Android Applications in IoT: The Case of Smart Security Devices
Ashley Allen, Alexios Mylonas, Stilianos Vidalis, et al.
Sensors (2024) Vol. 24, Iss. 17, pp. 5465-5465
Open Access
Ashley Allen, Alexios Mylonas, Stilianos Vidalis, et al.
Sensors (2024) Vol. 24, Iss. 17, pp. 5465-5465
Open Access
Silent Taint-Style Vulnerability Fixes Identification
Zhongzhen Wen, Jiayuan Zhou, Minxue Pan, et al.
(2024), pp. 428-439
Closed Access
Zhongzhen Wen, Jiayuan Zhou, Minxue Pan, et al.
(2024), pp. 428-439
Closed Access
Insights from Running 24 Static Analysis Tools on Open Source Software Repositories
Fabiha Hashmat, Zeyad Alwaleed Aljaali, Mingjie Shen, et al.
Lecture notes in computer science (2024), pp. 225-245
Closed Access
Fabiha Hashmat, Zeyad Alwaleed Aljaali, Mingjie Shen, et al.
Lecture notes in computer science (2024), pp. 225-245
Closed Access
Methods for Testing, Assessment and Analysis of the Security of University Information Systems
Research Papers (2023) Vol. 63, Iss. 5, pp. 137-151
Open Access
Research Papers (2023) Vol. 63, Iss. 5, pp. 137-151
Open Access