
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
CVE2ATT&CK: BERT-Based Mapping of CVEs to MITRE ATT&CK Techniques
Octavian Grigorescu, Andreea Nica, Mihai Dascălu, et al.
Algorithms (2022) Vol. 15, Iss. 9, pp. 314-314
Open Access | Times Cited: 31
Octavian Grigorescu, Andreea Nica, Mihai Dascălu, et al.
Algorithms (2022) Vol. 15, Iss. 9, pp. 314-314
Open Access | Times Cited: 31
Showing 1-25 of 31 citing articles:
Improving Threat Mitigation Through a Cybersecurity Risk Management Framework: A Computational Design Science Approach
Benjamin Ampel, Sagar Samtani, Hongyi Zhu, et al.
Journal of Management Information Systems (2024) Vol. 41, Iss. 1, pp. 236-265
Closed Access | Times Cited: 10
Benjamin Ampel, Sagar Samtani, Hongyi Zhu, et al.
Journal of Management Information Systems (2024) Vol. 41, Iss. 1, pp. 236-265
Closed Access | Times Cited: 10
Analysis of Autonomous Penetration Testing Through Reinforcement Learning and Recommender Systems
Ariadna Claudia Moreno Román, Aldo Hernandez-Suarez, Gabriel Sanchez-Perez, et al.
Sensors (2025) Vol. 25, Iss. 1, pp. 211-211
Open Access
Ariadna Claudia Moreno Román, Aldo Hernandez-Suarez, Gabriel Sanchez-Perez, et al.
Sensors (2025) Vol. 25, Iss. 1, pp. 211-211
Open Access
Design and evaluation of an Autonomous Cyber Defence agent using DRL and an augmented LLM
Johannes F. Loevenich, Erik Adler, Tobias Hürten, et al.
Computer Networks (2025), pp. 111162-111162
Closed Access
Johannes F. Loevenich, Erik Adler, Tobias Hürten, et al.
Computer Networks (2025), pp. 111162-111162
Closed Access
Threat Hunting for Adversary Impact Inhibiting System Recovery
Naif Alsharabi, Akashdeep Bhardwaj, Abdulaziz Ayaba, et al.
Computers & Security (2025), pp. 104464-104464
Closed Access
Naif Alsharabi, Akashdeep Bhardwaj, Abdulaziz Ayaba, et al.
Computers & Security (2025), pp. 104464-104464
Closed Access
Automated Mapping of Common Vulnerabilities and Exposures to MITRE ATT&CK Tactics
Ioana Brănescu, Octavian Grigorescu, Mihai Dascălu
Information (2024) Vol. 15, Iss. 4, pp. 214-214
Open Access | Times Cited: 3
Ioana Brănescu, Octavian Grigorescu, Mihai Dascălu
Information (2024) Vol. 15, Iss. 4, pp. 214-214
Open Access | Times Cited: 3
A Review of Advancements and Applications of Pre-Trained Language Models in Cybersecurity
Zefang Liu
(2024), pp. 1-10
Closed Access | Times Cited: 3
Zefang Liu
(2024), pp. 1-10
Closed Access | Times Cited: 3
Towards Evaluation and Understanding of Large Language Models for Cyber Operation Automation
Madeena Sultana, Adrian Taylor, Li Li, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 10
Madeena Sultana, Adrian Taylor, Li Li, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 10
Automated discovery and mapping ATT&CK tactics and techniques for unstructured cyber threat intelligence
Lingzi Li, Cheng Huang, Junren Chen
Computers & Security (2024) Vol. 140, pp. 103815-103815
Closed Access | Times Cited: 3
Lingzi Li, Cheng Huang, Junren Chen
Computers & Security (2024) Vol. 140, pp. 103815-103815
Closed Access | Times Cited: 3
Adversarial Technique Validation & Defense Selection Using Attack Graph & ATT&CK Matrix
Md Ariful Haque, Sachin Shetty, Charles Kamhoua, et al.
2016 International Conference on Computing, Networking and Communications (ICNC) (2023), pp. 181-187
Closed Access | Times Cited: 7
Md Ariful Haque, Sachin Shetty, Charles Kamhoua, et al.
2016 International Conference on Computing, Networking and Communications (ICNC) (2023), pp. 181-187
Closed Access | Times Cited: 7
SMET: Semantic Mapping of CVE to ATT&CK and Its Application to Cybersecurity
Basel Abdeen, Ehab Al‐Shaer, Anoop Singhal, et al.
Lecture notes in computer science (2023), pp. 243-260
Closed Access | Times Cited: 7
Basel Abdeen, Ehab Al‐Shaer, Anoop Singhal, et al.
Lecture notes in computer science (2023), pp. 243-260
Closed Access | Times Cited: 7
SQL injection attack: Detection, prioritization & prevention
Alan Paul, Vishal Sharma, Oluwafemi Olukoya
Journal of Information Security and Applications (2024) Vol. 85, pp. 103871-103871
Open Access | Times Cited: 2
Alan Paul, Vishal Sharma, Oluwafemi Olukoya
Journal of Information Security and Applications (2024) Vol. 85, pp. 103871-103871
Open Access | Times Cited: 2
VTT-LLM: Advancing Vulnerability-to-Tactic-and-Technique Mapping through Fine-Tuning of Large Language Model
Chenhui Zhang, Le Wang, Dunqiu Fan, et al.
Mathematics (2024) Vol. 12, Iss. 9, pp. 1286-1286
Open Access | Times Cited: 1
Chenhui Zhang, Le Wang, Dunqiu Fan, et al.
Mathematics (2024) Vol. 12, Iss. 9, pp. 1286-1286
Open Access | Times Cited: 1
Design of an Autonomous Cyber Defence Agent using Hybrid AI models
Johannes F. Loevenich, Erik Adler, Rémi Mercier, et al.
(2024) Vol. 33, pp. 1-10
Closed Access | Times Cited: 1
Johannes F. Loevenich, Erik Adler, Rémi Mercier, et al.
(2024) Vol. 33, pp. 1-10
Closed Access | Times Cited: 1
Automated Conversion of CVE Records into an Expert System, Dedicated to Information Security Risk Analysis, Knowledge-Base Rules
Dovydas Benetis, Donatas Vitkus, Justinas Janulevičius, et al.
Electronics (2024) Vol. 13, Iss. 13, pp. 2642-2642
Open Access | Times Cited: 1
Dovydas Benetis, Donatas Vitkus, Justinas Janulevičius, et al.
Electronics (2024) Vol. 13, Iss. 13, pp. 2642-2642
Open Access | Times Cited: 1
Improving ML-based Solutions for Linking of CVE to MITRE ATT &CK Techniques
Saad El Jaouhari, Nouredine Tamani, Rohan Isaac Jacob
2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) (2024), pp. 2442-2447
Closed Access | Times Cited: 1
Saad El Jaouhari, Nouredine Tamani, Rohan Isaac Jacob
2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) (2024), pp. 2442-2447
Closed Access | Times Cited: 1
Detection and Hardening Strategies to Secure an Enterprise Network
Preetam Mukherjee, Sabu M. Thampi, N Raga Rohith, et al.
Lecture notes in computer science (2023), pp. 91-108
Closed Access | Times Cited: 2
Preetam Mukherjee, Sabu M. Thampi, N Raga Rohith, et al.
Lecture notes in computer science (2023), pp. 91-108
Closed Access | Times Cited: 2
Automated Mapping Method for Sysmon Logs to ATT&CK Techniques by Leveraging Atomic Red Team
Momoka Okuma, Koki Watarai, Satoshi Okada, et al.
(2023), pp. 104-109
Closed Access | Times Cited: 2
Momoka Okuma, Koki Watarai, Satoshi Okada, et al.
(2023), pp. 104-109
Closed Access | Times Cited: 2
Strengthening Cloud Applications: A Deep Dive into Kill Chain Identification, Scoring, and Automatic Penetration Testing
Stefano Simonetto
Lecture notes in business information processing (2024), pp. 111-120
Closed Access
Stefano Simonetto
Lecture notes in business information processing (2024), pp. 111-120
Closed Access
Mapping Vulnerability Description to MITRE ATT&CK Framework by LLM
Pasha Rafiey, Amin Namadchian
Research Square (Research Square) (2024)
Open Access
Pasha Rafiey, Amin Namadchian
Research Square (Research Square) (2024)
Open Access
Vulnerability Detection for software-intensive system
Refat Tahseen Othman
(2024), pp. 510-515
Closed Access
Refat Tahseen Othman
(2024), pp. 510-515
Closed Access
SMET: Semantic mapping of CTI reports and CVE to ATT&CK for advanced threat intelligence
Basel Abdeen, Ehab Al‐Shaer, Anoop Singhal, et al.
Journal of Computer Security (2024), pp. 1-20
Closed Access
Basel Abdeen, Ehab Al‐Shaer, Anoop Singhal, et al.
Journal of Computer Security (2024), pp. 1-20
Closed Access
A Survey of Cybersecurity Knowledge Base and Its Automatic Labeling
Zongzhe Li, Jiawei Zhang, Weihong Han
Communications in computer and information science (2024), pp. 53-70
Closed Access
Zongzhe Li, Jiawei Zhang, Weihong Han
Communications in computer and information science (2024), pp. 53-70
Closed Access
Enhancing Cybersecurity Defenses: A Multicriteria Decision-Making Approach to Mitre ATT&CK Mitigation Strategy
Ihab Mohamed, Hesham A. Hefny, Nagy Ramadan
International journal of Computer Networks & Communications (2024) Vol. 16, Iss. 4, pp. 19-35
Open Access
Ihab Mohamed, Hesham A. Hefny, Nagy Ramadan
International journal of Computer Networks & Communications (2024) Vol. 16, Iss. 4, pp. 19-35
Open Access
Enhancing Cybersecurity Defenses: A Multicriteria Decision-Making Approach to Mitre Att&ck Mitigation Strategye
Ihab Abdelwahab, Hesham A. Hefny, Nagy Ramdan Darwish
SSRN Electronic Journal (2024)
Closed Access
Ihab Abdelwahab, Hesham A. Hefny, Nagy Ramdan Darwish
SSRN Electronic Journal (2024)
Closed Access
TIMFuser: A Multi-granular fusion framework for cyber threat intelligence
Chunyan Ma, Zhengwei Jiang, Kai Zhang, et al.
Computers & Security (2024) Vol. 148, pp. 104141-104141
Closed Access
Chunyan Ma, Zhengwei Jiang, Kai Zhang, et al.
Computers & Security (2024) Vol. 148, pp. 104141-104141
Closed Access