OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Current Status and Security Trend of OSINT
Yong-Woon Hwang, Im-Yeong Lee, Hwankuk Kim, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-14
Open Access | Times Cited: 25

Showing 25 citing articles:

Situating Power in Cyber Threat Knowledge
Shashank Yadav, Sundeep Oberoi
Deleted Journal (2025) Vol. 4, Iss. 1
Closed Access

The Organized Activities of Ransomware Groups: A Social Network Approach
Ekaterina V. Botchkovar, Kexin Cui, Olena Antonaccio, et al.
Technology in Society (2025), pp. 102873-102873
Open Access

Mapping Tools for Open Source Intelligence with Cyber Kill Chain for Adversarial Aware Security
Muhammad Mudassar Yamin, Mohib Ullah, Habib Ullah, et al.
Mathematics (2022) Vol. 10, Iss. 12, pp. 2054-2054
Open Access | Times Cited: 11

Key Challenges and Limitations of the OSINT Framework in the Context of Cybersecurity
Devu Govardhan, Grandhi Guna Sai Hari Krishna, V. Charan, et al.
(2023), pp. 236-243
Closed Access | Times Cited: 5

Unmasking the oligarchs – Using open source data to detect sanctions violations
Jonas Montenarh, Simon Marsden
Journal of Economic Criminology (2024) Vol. 3, pp. 100055-100055
Open Access | Times Cited: 1

Enhancing Cyber Threat Intelligence with Named Entity Recognition Using BERT-CRF
Sheng-Shan Chen, Ren‐Hung Hwang, Chin‐Yu Sun, et al.
GLOBECOM 2022 - 2022 IEEE Global Communications Conference (2023), pp. 7532-7537
Closed Access | Times Cited: 4

Application Analysis of Generative Artificial Intelligence in The field of Open Source Intelligence
Lijie Zhou, Yiran Qin, Shoujun Yan, et al.
2022 37th Youth Academic Annual Conference of Chinese Association of Automation (YAC) (2024), pp. 1603-1608
Closed Access | Times Cited: 1

Anonymity in decentralized apps: Study of implications for cybercrime investigations
Arjun Chetry, Uzzal Sharma
International Journal of experimental research and review (2023) Vol. 32, pp. 195-205
Open Access | Times Cited: 3

A Framework for Infusing Cybersecurity Programs With Real-World Artificial Intelligence Education
Joan E. DeBello, Erald Troja, Laura M. Truong
2022 IEEE Global Engineering Education Conference (EDUCON) (2023)
Closed Access | Times Cited: 2

OSINT-Based Tool for Social Media User Impersonation Detection Through Machine Learning
Rajaa Alqudah, Mohammed Al-Qaisi, Rakan Ammari, et al.
(2023), pp. 752-757
Closed Access | Times Cited: 2

Leveraging OSINT and Artificial Intelligence, Machine Learning to Identify and Protect Vulnerable Sections of Society
Smriti Panda, Oorja Rungta
Signals and communication technology (2023), pp. 53-61
Closed Access | Times Cited: 2

Ecommerce Fraud Incident Response: A Grounded Theory Study
Joshua Dwight
Interdisciplinary Journal of Information Knowledge and Management (2023) Vol. 18, pp. 173-202
Open Access | Times Cited: 2

A Comparative Study of OSINT Automation Tools
Sangmin Shin, Ki‐Hyun Jung
Asia-pacific Journal of Convergent Research Interchange (2024) Vol. 10, Iss. 5, pp. 1-13
Open Access

Research by the method of an extended systematical literature review E-SLR the problem of ensuring the security of personal data when using OSINT
Natalia Romanova, Vitaly Gryzunov
Herald of Dagestan State Technical University Technical Sciences (2024) Vol. 51, Iss. 3, pp. 130-144
Open Access

For Remote Sensing in Political Geography: Scalar Flexibility, the Ethics of Exposure, and Critiques of the State
Mia M. Bennett, Hilary Oliva Faxon, Luis F. Alvarez León, et al.
Springer eBooks (2024), pp. 135-158
Closed Access

Design a hybrid Optimization and Homomorphic Encryption for Securing Data in a Cloud Environment
Mercy Joseph, Gobi Mohan
International Journal of Computer Networks And Applications (2022) Vol. 9, Iss. 4, pp. 385-385
Open Access | Times Cited: 3

Improving Quality of Indicators of Compromise Using Stix Graphs
Sheng-Shan Chen, Ren‐Hung Hwang, Asad Ali, et al.
(2024)
Closed Access

Improving quality of indicators of compromise using STIX graphs
Sheng-Shan Chen, Ren‐Hung Hwang, Asad Ali, et al.
Computers & Security (2024) Vol. 144, pp. 103972-103972
Closed Access

A Comprehensive Review of Open Source Intelligence in Intelligent Transportation Systems
Bilal Emir Uçar, Mert İlhan Ecevit, Hasan Dağ, et al.
(2024), pp. 109-116
Closed Access

Can social media shape the security of next-generation connected vehicles?
Nicola Scarano, Luca Mannella, Alessandro Savino, et al.
(2024), pp. 1-4
Open Access

Evaluating Cloud Security Performance for Medical Data Based on Spider Monkey Paillier Homomorphic Cryptosystem
Dr.Y. Kalpana, K. Ram Mohan Rao
Lecture notes in networks and systems (2024), pp. 303-314
Closed Access

Osint Automation Application
Vinay Kumar Kureel, Manav Arya, Aditya Kini, et al.
International Journal of Scientific Research in Computer Science Engineering and Information Technology (2023), pp. 377-381
Open Access | Times Cited: 1

Review OSINT tool for social engineering
Martina Nobili
Frontiers in Big Data (2023) Vol. 6
Open Access | Times Cited: 1

Preparation of a Social Engineering Attack, from Scratch to Compromise: A USB Dropper and Impersonation Approach
Jorge Sánchez Freire, Benjamín Garcés
Communications in computer and information science (2022), pp. 281-293
Closed Access

Page 1

Scroll to top