OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Data and knowledge-driven named entity recognition for cyber security
Chen Gao, Xuan Zhang, Hui Liu
Cybersecurity (2021) Vol. 4, Iss. 1
Open Access | Times Cited: 35

Showing 1-25 of 35 citing articles:

SecureBERT: A Domain-Specific Language Model for Cybersecurity
Ehsan Aghaei, Xi Niu, Waseem Shadid, et al.
Security and Privacy in Communication Networks (2023), pp. 39-56
Closed Access | Times Cited: 50

A Machine Learning Approach for the NLP-Based Analysis of Cyber Threats and Vulnerabilities of the Healthcare Ecosystem
Stefano Silvestri, Shareeful Islam, Spyridon Papastergiou, et al.
Sensors (2023) Vol. 23, Iss. 2, pp. 651-651
Open Access | Times Cited: 36

CyBERT: Cybersecurity Claim Classification by Fine-Tuning the BERT Language Model
Kimia Ameri, Michael Hempel, Hamid Sharif, et al.
Journal of Cybersecurity and Privacy (2021) Vol. 1, Iss. 4, pp. 615-637
Open Access | Times Cited: 42

Study of Word Embeddings for Enhanced Cyber Security Named Entity Recognition
Smita Srivastava, Biswajit Paul, Deepa Gupta
Procedia Computer Science (2023) Vol. 218, pp. 449-460
Open Access | Times Cited: 18

A novel feature integration and entity boundary detection for named entity recognition in cybersecurity
Xiaodi Wang, Jiayong Liu
Knowledge-Based Systems (2022) Vol. 260, pp. 110114-110114
Closed Access | Times Cited: 23

Transformer-Based Named Entity Recognition on Drone Flight Logs to Support Forensic Investigation
Swardiantara Silalahi, Tohari Ahmad, Hudan Studiawan
IEEE Access (2023) Vol. 11, pp. 3257-3274
Open Access | Times Cited: 14

Optimising AI models for intelligence extraction in the life cycle of Cybersecurity Threat Landscape generation
Alexandros Zacharis, Razvan Gavrila, Constantinos Patsakis, et al.
Journal of Information Security and Applications (2025) Vol. 90, pp. 104037-104037
Open Access

Cyber threat assessment and management for securing healthcare ecosystems using natural language processing
Stefano Silvestri, Shareful Islam, D.V. Amelin, et al.
International Journal of Information Security (2023) Vol. 23, Iss. 1, pp. 31-50
Open Access | Times Cited: 12

Python source code vulnerability detection with named entity recognition
M. Ehrenberg, Shahram Sarkani, Thomas A. Mazzuchi
Computers & Security (2024) Vol. 140, pp. 103802-103802
Closed Access | Times Cited: 3

Joint contrastive learning and belief rule base for named entity recognition in cybersecurity
Chenxi Hu, Tao Wu, Chunsheng Liu, et al.
Cybersecurity (2024) Vol. 7, Iss. 1
Open Access | Times Cited: 3

Design of a Novel Information System for Semi-automated Management of Cybersecurity in Industrial Control Systems
Kimia Ameri, Michael Hempel, Hamid Sharif, et al.
ACM Transactions on Management Information Systems (2022) Vol. 14, Iss. 1, pp. 1-35
Open Access | Times Cited: 12

Named Entity Recognition for Drone Forensic Using BERT and DistilBERT
Swardiantara Silalahi, Tohari Ahmad, Hudan Studiawan
(2022), pp. 53-58
Closed Access | Times Cited: 9

Aspect-level Information Discrepancies across Heterogeneous Vulnerability Reports: Severity, Types and Detection Methods
Jiamou Sun, Zhenchang Xing, Xin Xia, et al.
ACM Transactions on Software Engineering and Methodology (2023) Vol. 33, Iss. 2, pp. 1-38
Closed Access | Times Cited: 5

Advanced Persistent Threats based on Supply Chain Vulnerabilities: Challenges, Solutions and Future Directions
Zhuoran Tan, Angelos K. Marnerides, Christos Anagnostopoulos, et al.
(2024)
Open Access | Times Cited: 1

A Cybersecurity Named Entity Recognition Model Based on Active Learning and Self-learning
Zhaoli Liu, Kun Jiang, Zheng Liu, et al.
2022 34th Chinese Control and Decision Conference (CCDC) (2024), pp. 4505-4510
Closed Access | Times Cited: 1

Zero-shot Learning for Named Entity Recognition in Software Specification Documents
Souvick Das, Novarun Deb, Agostino Cortesi, et al.
(2023), pp. 100-110
Closed Access | Times Cited: 2

Darknet Public Hazard Entity Recognition Based on Deep Learning
Panpan Zhang, Xuebin Wang, Jing Ya, et al.
(2021), pp. 94-100
Open Access | Times Cited: 5

Context-Aware Attended-over Distributed Specificity for Information Extraction in Cybersecurity
Nicholas Prayogo, Ehsan Amjadian, Serena McDonnell, et al.
2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) (2022), pp. 0359-0367
Closed Access | Times Cited: 3

Automated Labeling of Entities in CVE Vulnerability Descriptions with Natural Language Processing
Kensuke Sumoto, Kenta Kanakogi, Hironori Washizaki, et al.
IEICE Transactions on Information and Systems (2024) Vol. E107.D, Iss. 5, pp. 674-682
Open Access

CyTIE: Cyber Threat Intelligence Extraction with Named Entity Recognition
Priyadharshini Aravind, Dincy R. Arikkat, Anupama S. Krishnan, et al.
Communications in computer and information science (2024), pp. 163-178
Closed Access

Joint relational triple extraction with enhanced representation and binary tagging framework in cybersecurity
Xiaodi Wang, Zhonglin Liu, Jiayong Liu
Computers & Security (2024) Vol. 144, pp. 104001-104001
Closed Access

Xabcd: A Better Model for Named Entity Recognition in Cyber Threat Intelligence
Ruiqi Wang, Zhiqiang Zheng, Shengqin Ao, et al.
2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP) (2024), pp. 966-971
Closed Access

Analysis on dendritic deep learning model for AMR task
Peng Yin, Shahong Zhu, Yang Yu, et al.
Cybersecurity (2024) Vol. 7, Iss. 1
Open Access

Factors Influencing Frameworks for Social Cybersecurity Management. A Systematic Literature Review
Edgar Rodriguez, José Santisteban, Vicente Morales, et al.
Lecture notes in networks and systems (2024), pp. 162-179
Closed Access

A Named Entity Recognition Model for Threat Intelligence Based on Similar Semantic Space Construction
Long Chen, Chong Zhao, Ziqi Liu, et al.
(2024), pp. 323-327
Closed Access

Page 1 - Next Page

Scroll to top