
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A New Proposal on the Advanced Persistent Threat: A Survey
Santiago Quintero-Bonilla, A. Martı́n del Rey
Applied Sciences (2020) Vol. 10, Iss. 11, pp. 3874-3874
Open Access | Times Cited: 62
Santiago Quintero-Bonilla, A. Martı́n del Rey
Applied Sciences (2020) Vol. 10, Iss. 11, pp. 3874-3874
Open Access | Times Cited: 62
Showing 1-25 of 62 citing articles:
Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats
Zhiyan Chen, Jinxin Liu, Yu Shen, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 5, pp. 1-37
Open Access | Times Cited: 73
Zhiyan Chen, Jinxin Liu, Yu Shen, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 5, pp. 1-37
Open Access | Times Cited: 73
Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection
Luca Caviglione, Michał Choraś, Igino Corona, et al.
IEEE Access (2020) Vol. 9, pp. 5371-5396
Open Access | Times Cited: 105
Luca Caviglione, Michał Choraś, Igino Corona, et al.
IEEE Access (2020) Vol. 9, pp. 5371-5396
Open Access | Times Cited: 105
A Review on Security of Smart Farming and Precision Agriculture: Security Aspects, Attacks, Threats and Countermeasures
Abbas Yazdinejad, Behrouz Zolfaghari, Amin Azmoodeh, et al.
Applied Sciences (2021) Vol. 11, Iss. 16, pp. 7518-7518
Open Access | Times Cited: 88
Abbas Yazdinejad, Behrouz Zolfaghari, Amin Azmoodeh, et al.
Applied Sciences (2021) Vol. 11, Iss. 16, pp. 7518-7518
Open Access | Times Cited: 88
Digital Healthcare - Cyberattacks in Asian Organizations: An Analysis of Vulnerabilities, Risks, NIST Perspectives, and Recommendations
Kamalanathan Kandasamy, Sethuraman Srinivas, Krishnashree Achuthan, et al.
IEEE Access (2022) Vol. 10, pp. 12345-12364
Open Access | Times Cited: 38
Kamalanathan Kandasamy, Sethuraman Srinivas, Krishnashree Achuthan, et al.
IEEE Access (2022) Vol. 10, pp. 12345-12364
Open Access | Times Cited: 38
A systematic literature review on advanced persistent threat behaviors and its detection strategy
Nur Ilzam Che Mat, Norziana Jamil, Yunus Yusoff, et al.
Journal of Cybersecurity (2024) Vol. 10, Iss. 1
Open Access | Times Cited: 13
Nur Ilzam Che Mat, Norziana Jamil, Yunus Yusoff, et al.
Journal of Cybersecurity (2024) Vol. 10, Iss. 1
Open Access | Times Cited: 13
A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities
Diana Levshun, Igor Kotenko
Artificial Intelligence Review (2023) Vol. 56, Iss. 8, pp. 8547-8590
Closed Access | Times Cited: 20
Diana Levshun, Igor Kotenko
Artificial Intelligence Review (2023) Vol. 56, Iss. 8, pp. 8547-8590
Closed Access | Times Cited: 20
Unraveled — A semi-synthetic dataset for Advanced Persistent Threats
Sowmya Myneni, Kritshekhar Jha, Abdulhakim Sabur, et al.
Computer Networks (2023) Vol. 227, pp. 109688-109688
Open Access | Times Cited: 18
Sowmya Myneni, Kritshekhar Jha, Abdulhakim Sabur, et al.
Computer Networks (2023) Vol. 227, pp. 109688-109688
Open Access | Times Cited: 18
A hybrid ensemble machine learning model for detecting APT attacks based on network behavior anomaly detection
Neeraj Saini, Vivekananda Bhat Kasaragod, Krishna Prakash, et al.
Concurrency and Computation Practice and Experience (2023) Vol. 35, Iss. 28
Open Access | Times Cited: 18
Neeraj Saini, Vivekananda Bhat Kasaragod, Krishna Prakash, et al.
Concurrency and Computation Practice and Experience (2023) Vol. 35, Iss. 28
Open Access | Times Cited: 18
Advanced Persistent Threats and Their Defense Methods in Industrial Internet of Things: A Survey
Chenquan Gan, Jiabin Lin, Da-Wen Huang, et al.
Mathematics (2023) Vol. 11, Iss. 14, pp. 3115-3115
Open Access | Times Cited: 16
Chenquan Gan, Jiabin Lin, Da-Wen Huang, et al.
Mathematics (2023) Vol. 11, Iss. 14, pp. 3115-3115
Open Access | Times Cited: 16
Text Mining in Cybersecurity
Luciano Ignaczak, Guilherme Goldschmidt, Cristiano André da Costa, et al.
ACM Computing Surveys (2021) Vol. 54, Iss. 7, pp. 1-36
Closed Access | Times Cited: 34
Luciano Ignaczak, Guilherme Goldschmidt, Cristiano André da Costa, et al.
ACM Computing Surveys (2021) Vol. 54, Iss. 7, pp. 1-36
Closed Access | Times Cited: 34
Exploration of Mobile Device Behavior for Mitigating Advanced Persistent Threats (APT): A Systematic Literature Review and Conceptual Framework
Thulfiqar Jabar, Manmeet Mahinderjit Singh
Sensors (2022) Vol. 22, Iss. 13, pp. 4662-4662
Open Access | Times Cited: 25
Thulfiqar Jabar, Manmeet Mahinderjit Singh
Sensors (2022) Vol. 22, Iss. 13, pp. 4662-4662
Open Access | Times Cited: 25
A new approach for APT malware detection based on deep graph network for endpoint systems
Cho Do Xuan, DT Huong
Applied Intelligence (2022) Vol. 52, Iss. 12, pp. 14005-14024
Closed Access | Times Cited: 24
Cho Do Xuan, DT Huong
Applied Intelligence (2022) Vol. 52, Iss. 12, pp. 14005-14024
Closed Access | Times Cited: 24
APT beaconing detection: A systematic review
Manar Abu Talib, Qassim Nasir, Ali Bou Nassif, et al.
Computers & Security (2022) Vol. 122, pp. 102875-102875
Closed Access | Times Cited: 24
Manar Abu Talib, Qassim Nasir, Ali Bou Nassif, et al.
Computers & Security (2022) Vol. 122, pp. 102875-102875
Closed Access | Times Cited: 24
APT-Attack Detection Based on Multi-Stage Autoencoders
Helmut Neuschmied, Martin Winter, Branka Stojanović, et al.
Applied Sciences (2022) Vol. 12, Iss. 13, pp. 6816-6816
Open Access | Times Cited: 22
Helmut Neuschmied, Martin Winter, Branka Stojanović, et al.
Applied Sciences (2022) Vol. 12, Iss. 13, pp. 6816-6816
Open Access | Times Cited: 22
A Game-Theoretic Method for Defending Against Advanced Persistent Threats in Cyber Systems
Lefeng Zhang, Tianqing Zhu, Farookh Khadeer Hussain, et al.
IEEE Transactions on Information Forensics and Security (2022) Vol. 18, pp. 1349-1364
Closed Access | Times Cited: 22
Lefeng Zhang, Tianqing Zhu, Farookh Khadeer Hussain, et al.
IEEE Transactions on Information Forensics and Security (2022) Vol. 18, pp. 1349-1364
Closed Access | Times Cited: 22
A Novel Approach for APT Detection Based on Ensemble Learning Model
Nguyen Hoa Cuong, Cho Do Xuan, Vanessa Long, et al.
Statistical Analysis and Data Mining The ASA Data Science Journal (2025) Vol. 18, Iss. 1
Closed Access
Nguyen Hoa Cuong, Cho Do Xuan, Vanessa Long, et al.
Statistical Analysis and Data Mining The ASA Data Science Journal (2025) Vol. 18, Iss. 1
Closed Access
Towards security automation in Software Defined Networks
Noe M. Yungaicela-Naula, Cesar Vargas‐Rosales, Jesús Arturo Pérez-Díaz, et al.
Computer Communications (2021) Vol. 183, pp. 64-82
Closed Access | Times Cited: 30
Noe M. Yungaicela-Naula, Cesar Vargas‐Rosales, Jesús Arturo Pérez-Díaz, et al.
Computer Communications (2021) Vol. 183, pp. 64-82
Closed Access | Times Cited: 30
Detecting APT Attacks Based on Network Traffic Using Machine Learning
Cho Do Xuan
Journal of Web Engineering (2021)
Open Access | Times Cited: 29
Cho Do Xuan
Journal of Web Engineering (2021)
Open Access | Times Cited: 29
A multi-layer approach for advanced persistent threat detection using machine learning based on network traffic
Cho Do Xuan, Duc Duong, Hoang Xuan Dau
Journal of Intelligent & Fuzzy Systems (2021) Vol. 40, Iss. 6, pp. 11311-11329
Closed Access | Times Cited: 27
Cho Do Xuan, Duc Duong, Hoang Xuan Dau
Journal of Intelligent & Fuzzy Systems (2021) Vol. 40, Iss. 6, pp. 11311-11329
Closed Access | Times Cited: 27
Precision time protocol attack strategies and their resistance to existing security extensions
Waleed Alghamdi, Michael Schukat
Cybersecurity (2021) Vol. 4, Iss. 1
Open Access | Times Cited: 25
Waleed Alghamdi, Michael Schukat
Cybersecurity (2021) Vol. 4, Iss. 1
Open Access | Times Cited: 25
Advanced Persistent Threat intelligent profiling technique: A survey
Binhui Tang, Junfeng Wang, Zhongkun Yu, et al.
Computers & Electrical Engineering (2022) Vol. 103, pp. 108261-108261
Closed Access | Times Cited: 17
Binhui Tang, Junfeng Wang, Zhongkun Yu, et al.
Computers & Electrical Engineering (2022) Vol. 103, pp. 108261-108261
Closed Access | Times Cited: 17
HGHAN: Hacker group identification based on heterogeneous graph attention network
Yijia Xu, Yong Fang, Cheng Zhi Huang, et al.
Information Sciences (2022) Vol. 612, pp. 848-863
Closed Access | Times Cited: 16
Yijia Xu, Yong Fang, Cheng Zhi Huang, et al.
Information Sciences (2022) Vol. 612, pp. 848-863
Closed Access | Times Cited: 16
Advanced Persistent Threat Detection: A Survey
Adam Khalid, Anazida Zainal, Mohd Aizaini Maarof, et al.
(2021), pp. 1-6
Closed Access | Times Cited: 18
Adam Khalid, Anazida Zainal, Mohd Aizaini Maarof, et al.
(2021), pp. 1-6
Closed Access | Times Cited: 18
A Systematic Literature Review and a Conceptual Framework Proposition for Advanced Persistent Threats (APT) Detection for Mobile Devices Using Artificial Intelligence Techniques
Amjed Ahmed Al-Kadhimi, Manmeet Mahinderjit Singh, Mohd Nor Akmal Khalid
Applied Sciences (2023) Vol. 13, Iss. 14, pp. 8056-8056
Open Access | Times Cited: 7
Amjed Ahmed Al-Kadhimi, Manmeet Mahinderjit Singh, Mohd Nor Akmal Khalid
Applied Sciences (2023) Vol. 13, Iss. 14, pp. 8056-8056
Open Access | Times Cited: 7
Organizational information security threats: Status and challenges
B. Akello
World Journal of Advanced Engineering Technology and Sciences (2024) Vol. 11, Iss. 1, pp. 148-162
Open Access | Times Cited: 2
B. Akello
World Journal of Advanced Engineering Technology and Sciences (2024) Vol. 11, Iss. 1, pp. 148-162
Open Access | Times Cited: 2