OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Don't Bury your Head in Warnings: A Game-Theoretic Approach for Intelligent Allocation of Cyber-security Alerts
Aaron Schlenker, Haifeng Xu, Mina Guirguis, et al.
(2017), pp. 381-387
Open Access | Times Cited: 47

Showing 1-25 of 47 citing articles:

Stackelberg Security Games: Looking Beyond a Decade of Success
Arunesh Sinha, Fei Fang, Bo An, et al.
(2018), pp. 5494-5501
Open Access | Times Cited: 149

Deceiving Cyber Adversaries: A Game Theoretic Approach
Aaron Schlenker, Omkar Thakoor, Haifeng Xu, et al.
Adaptive Agents and Multi-Agents Systems (2018), pp. 892-900
Closed Access | Times Cited: 67

Alert Fatigue in Security Operations Centres: Research Challenges and Opportunities
Shahroz Tariq, Mohan Baruwal Chhetri, ‪Surya Nepal‬, et al.
ACM Computing Surveys (2025)
Closed Access

Introduction to Game Theory
Fei Fang, Shutian Liu, Anjon Basak, et al.
(2021), pp. 21-46
Closed Access | Times Cited: 28

Game Theoretical Modelling of Network/Cybersecurity
Azhar Iqbal, Lachlan J. Gunn, Mingyu Guo, et al.
IEEE Access (2019) Vol. 7, pp. 154167-154179
Open Access | Times Cited: 17

Cyber Camouflage Games for Strategic Deception
Omkar Thakoor, Milind Tambe, Phebe Vayanos, et al.
Lecture notes in computer science (2019), pp. 525-541
Open Access | Times Cited: 17

Solving Online Threat Screening Games using Constrained Action Space Reinforcement Learning
Sanket Shah, Arunesh Sinha, Pradeep Varakantham, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2020) Vol. 34, Iss. 02, pp. 2226-2235
Open Access | Times Cited: 10

Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing
Chao Yan, Bo Li, Yevgeniy Vorobeychik, et al.
2022 IEEE 38th International Conference on Data Engineering (ICDE) (2018), pp. 1304-1307
Open Access | Times Cited: 11

Database Audit Workload Prioritization via Game Theory
Chao Yan, Bo Li, Yevgeniy Vorobeychik, et al.
ACM Transactions on Privacy and Security (2019) Vol. 22, Iss. 3, pp. 1-21
Open Access | Times Cited: 10

Concealing Cyber-Decoys using Two-Sided Feature Deception Games
Mohammad Sujan Miah, Marcus Gutierrez, Oscar Veliz, et al.
Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences (2020)
Open Access | Times Cited: 9

Allocating Security Analysts to Cyber Alerts Using Markov Games
Noah Dunstatter, Mina Guirguis, Alireza Tahsini
(2018) Vol. 1, pp. 16-23
Closed Access | Times Cited: 7

Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance
Aaron Schlenker, Omkar Thakoor, Haifeng Xu, et al.
Springer eBooks (2020), pp. 183-204
Closed Access | Times Cited: 7

To Warn or Not to Warn: Online Signaling in Audit Games
Chao Yan, Haifeng Xu, Yevgeniy Vorobeychik, et al.
2022 IEEE 38th International Conference on Data Engineering (ICDE) (2020), pp. 481-492
Open Access | Times Cited: 7

Exploiting Bounded Rationality in Risk-Based Cyber Camouflage Games
Omkar Thakoor, Shahin Jabbari, Palvi Aggarwal, et al.
Lecture notes in computer science (2020), pp. 103-124
Closed Access | Times Cited: 7

Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning
Liang Tong, Áron Lászka, Chao Yan, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2020) Vol. 34, Iss. 01, pp. 946-953
Open Access | Times Cited: 6

The Price of Usability: Designing Operationalizable Strategies for Security Games
Sara Marie Mc Carthy, Corine M. Laan, Kai Wang, et al.
(2018), pp. 454-460
Open Access | Times Cited: 5

Allocating Limited Resources to Protect a Massive Number of Targets Using a Game Theoretic Model
Xu Liu, Xiaoqiang Di, Jinqing Li, et al.
Mathematical Problems in Engineering (2019) Vol. 2019, Iss. 1
Open Access | Times Cited: 5

Solving Cyber Alert Allocation Markov Games with Deep Reinforcement Learning
Noah Dunstatter, Alireza Tahsini, Mina Guirguis, et al.
Lecture notes in computer science (2019), pp. 164-183
Closed Access | Times Cited: 5

Artificial Intelligence for Social Impact: Learning and Planning in the Data‐to‐Deployment Pipeline
Andrew Perrault, Fei Fang, Arunesh Sinha, et al.
AI Magazine (2020) Vol. 41, Iss. 4, pp. 3-16
Open Access | Times Cited: 5

On Development of a Game‐Theoretic Model for Deception‐Based Security
Satyaki Nan, Swastik Brahma, Charles Kamhoua, et al.
(2020), pp. 123-140
Closed Access | Times Cited: 4

Optimization of Cyber Tactics in Sports Strategies Using Hybrid AI Decision-Making Technologies
Meiling Duan
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-9
Open Access | Times Cited: 3

Human-in-the-loop Cyber Intrusion Detection Using Active Learning
Yeongwoo Kim, György Dán, Quanyan Zhu
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 8658-8672
Open Access

Alert Prioritisation in Security Operations Centres: A Systematic Survey on Criteria and Methods
Fatemeh Jalalvand, Mohan Baruwal Chhetri, ‪Surya Nepal‬, et al.
ACM Computing Surveys (2024)
Closed Access

Page 1 - Next Page

Scroll to top