
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Breaking Alert Fatigue: AI-Assisted SIEM Framework for Effective Incident Response
Tao Ban, Takeshi Takahashi, Samuel Ndichu, et al.
Applied Sciences (2023) Vol. 13, Iss. 11, pp. 6610-6610
Open Access | Times Cited: 21
Tao Ban, Takeshi Takahashi, Samuel Ndichu, et al.
Applied Sciences (2023) Vol. 13, Iss. 11, pp. 6610-6610
Open Access | Times Cited: 21
Showing 21 citing articles:
Artificial Intelligence Applications in Healthcare Security
Salvatore D’Antonio, Federica Uccello
(2025), pp. 143-156
Closed Access
Salvatore D’Antonio, Federica Uccello
(2025), pp. 143-156
Closed Access
FAF-BM: An Approach for False Alerts Filtering Using BERT Model with Semi-supervised Active Learning
Dan Du, Yunpeng Li, Yiyang Cao, et al.
Lecture notes in computer science (2025), pp. 295-312
Closed Access
Dan Du, Yunpeng Li, Yiyang Cao, et al.
Lecture notes in computer science (2025), pp. 295-312
Closed Access
A comprehensive investigation of clustering algorithms for User and Entity Behavior Analytics
Pierpaolo Artioli, Antonio Maci, Alessio Magrì
Frontiers in Big Data (2024) Vol. 7
Open Access | Times Cited: 2
Pierpaolo Artioli, Antonio Maci, Alessio Magrì
Frontiers in Big Data (2024) Vol. 7
Open Access | Times Cited: 2
Stream clustering guided supervised learning for classifying NIDS alerts
Risto Vaarandi, Alejandro Guerra-Manzanares
Future Generation Computer Systems (2024) Vol. 155, pp. 231-244
Closed Access | Times Cited: 1
Risto Vaarandi, Alejandro Guerra-Manzanares
Future Generation Computer Systems (2024) Vol. 155, pp. 231-244
Closed Access | Times Cited: 1
Requirements for Playbook-Assisted Cyber Incident Response, Reporting and Automation
Mehdi Akbari Gurabi, Lasse Nitz, Andrej Bregar, et al.
Digital Threats Research and Practice (2024) Vol. 5, Iss. 3, pp. 1-11
Open Access | Times Cited: 1
Mehdi Akbari Gurabi, Lasse Nitz, Andrej Bregar, et al.
Digital Threats Research and Practice (2024) Vol. 5, Iss. 3, pp. 1-11
Open Access | Times Cited: 1
Overview of Security Information and Event Management Systems
Cosmin MACANEATA
Informatica Economica (2024) Vol. 28, Iss. 1/2024, pp. 15-24
Open Access
Cosmin MACANEATA
Informatica Economica (2024) Vol. 28, Iss. 1/2024, pp. 15-24
Open Access
Planning and Preparation of Cybersecurity
Mohammed Mustafa Khan
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT (2024) Vol. 08, Iss. 10, pp. 1-3
Open Access
Mohammed Mustafa Khan
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT (2024) Vol. 08, Iss. 10, pp. 1-3
Open Access
GraphWeaver: Billion-Scale Cybersecurity Incident Correlation
Scott Freitas, Amir Gharib
(2024), pp. 4479-4486
Open Access
Scott Freitas, Amir Gharib
(2024), pp. 4479-4486
Open Access
Leveraging Tech Towards Keeping Ahead of Cyber Threats and Alleviating Security Analysts’ Alert Fatigue
S. A. Soman, Zoheir Ezziane
Lecture notes in networks and systems (2024), pp. 1-19
Closed Access
S. A. Soman, Zoheir Ezziane
Lecture notes in networks and systems (2024), pp. 1-19
Closed Access
Towards Hybrid NIDS: Combining Rule-Based SIEM with AI-Based Intrusion Detectors
Federica Uccello, Marek Pawlicki, Salvatore D’Antonio, et al.
Lecture notes in networks and systems (2024), pp. 244-255
Closed Access
Federica Uccello, Marek Pawlicki, Salvatore D’Antonio, et al.
Lecture notes in networks and systems (2024), pp. 244-255
Closed Access
The Role of Cognitive-Information Technologies in Cybersecurity: Threat Detection and Adaptive Defense Systems
Amadou Sara Camara
Вопросы безопасности (2024), Iss. 1, pp. 61-70
Open Access
Amadou Sara Camara
Вопросы безопасности (2024), Iss. 1, pp. 61-70
Open Access
Performance Improvement Scheme of NIDS Through Optimized Intrusion Pattern Database
Nouman Amjad, Anam Mumtaz, Sara Abbas, et al.
International Journal on Robotics Automation and Sciences (2024) Vol. 6, Iss. 1, pp. 64-69
Open Access
Nouman Amjad, Anam Mumtaz, Sara Abbas, et al.
International Journal on Robotics Automation and Sciences (2024) Vol. 6, Iss. 1, pp. 64-69
Open Access
Reinforcing Cyber Defense: Generative AI Powered Intelligent Agent Architecture for Enhanced Security Operations
Varadharaj Varadhan Krishnan
International Journal of Science and Research (IJSR) (2024) Vol. 13, Iss. 5, pp. 1129-1133
Open Access
Varadharaj Varadhan Krishnan
International Journal of Science and Research (IJSR) (2024) Vol. 13, Iss. 5, pp. 1129-1133
Open Access
Semantic Hierarchical Classification Applied to Anomaly Detection Using System Logs with a BERT Model
Clara Corbelle, Víctor Carneiro, Fidel Cacheda
Applied Sciences (2024) Vol. 14, Iss. 13, pp. 5388-5388
Open Access
Clara Corbelle, Víctor Carneiro, Fidel Cacheda
Applied Sciences (2024) Vol. 14, Iss. 13, pp. 5388-5388
Open Access
Comparative Analysis of AI-Based Methods for Enhancing Cybersecurity Monitoring Systems
Federica Uccello, Marek Pawlicki, Salvatore D’Antonio, et al.
Lecture notes in computer science (2024), pp. 100-112
Closed Access
Federica Uccello, Marek Pawlicki, Salvatore D’Antonio, et al.
Lecture notes in computer science (2024), pp. 100-112
Closed Access
Alert Prioritization Techniques in Security Monitoring: A Focus on Severity Averaging and Alert Entities
Christian Bassey, Samson Idowu, Courage Ojo
Saudi Journal of Engineering and Technology (2024) Vol. 9, Iss. 07, pp. 334-339
Open Access
Christian Bassey, Samson Idowu, Courage Ojo
Saudi Journal of Engineering and Technology (2024) Vol. 9, Iss. 07, pp. 334-339
Open Access
On Collaboration and Automation in the Context of Threat Detection and Response with Privacy-Preserving Features
Lasse Nitz, Mehdi Akbari Gurabi, Milan Čermák, et al.
Digital Threats Research and Practice (2024)
Open Access
Lasse Nitz, Mehdi Akbari Gurabi, Milan Čermák, et al.
Digital Threats Research and Practice (2024)
Open Access
CIA-EBE: Class Imbalance-Aware Event-Based Embedding for SOC Log Screening
Samuel Ndichu, Tao Ban, Takeshi Takahashi, et al.
2021 IEEE International Conference on Big Data (Big Data) (2024), pp. 2653-2662
Closed Access
Samuel Ndichu, Tao Ban, Takeshi Takahashi, et al.
2021 IEEE International Conference on Big Data (Big Data) (2024), pp. 2653-2662
Closed Access
Machine Learning for Analyzing and Modeling the Behavior of Computer System Users
И. В. Машечкин, Mikhail Petrovskiy, Maria Kazachuk
Moscow University Computational Mathematics and Cybernetics (2024) Vol. 48, Iss. 4, pp. 371-397
Closed Access
И. В. Машечкин, Mikhail Petrovskiy, Maria Kazachuk
Moscow University Computational Mathematics and Cybernetics (2024) Vol. 48, Iss. 4, pp. 371-397
Closed Access
Machine Learning–Based Security Alert Screening with Focal Loss
Samuel Ndichu, Tao Ban, Takeshi Takahashi, et al.
2021 IEEE International Conference on Big Data (Big Data) (2023), pp. 3043-3052
Closed Access | Times Cited: 1
Samuel Ndichu, Tao Ban, Takeshi Takahashi, et al.
2021 IEEE International Conference on Big Data (Big Data) (2023), pp. 3043-3052
Closed Access | Times Cited: 1
A Pilot Study to Assess the Effects of News Coverage Articles about Security Incidents on Stock Prices in Korea
Se‐Hyeon Han
Journal of risk and financial management (2023) Vol. 16, Iss. 10, pp. 425-425
Open Access
Se‐Hyeon Han
Journal of risk and financial management (2023) Vol. 16, Iss. 10, pp. 425-425
Open Access