OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Key Requirements for the Detection and Sharing of Behavioral Indicators of Compromise
Antonio Villalón-Huerta, Ismael Ripoll, Héctor Marco-Gisbert
Electronics (2022) Vol. 11, Iss. 3, pp. 416-416
Open Access | Times Cited: 10

Showing 10 citing articles:

Understanding Indicators of Compromise against Cyber-attacks in Industrial Control Systems: A Security Perspective
Mohammed Asiri, Neetesh Saxena, Rigel Gjomemo, et al.
ACM Transactions on Cyber-Physical Systems (2023) Vol. 7, Iss. 2, pp. 1-33
Open Access | Times Cited: 28

Cyber Threat Intelligence Sharing: Challenges and Opportunities
Carlos Roberto Viana, Milton Sérgio Fernandes de Lima, Byron Loureiro Lanverly de Melo, et al.
(2025)
Closed Access

A Distributed System for Early Intrusion Detection and Assessment of Cybersecurity
A. M. Kudin, Volodymyr Tkach, Oleksii Baranovskyi, et al.
IntechOpen eBooks (2025)
Closed Access

Cyberpsychology: A Longitudinal Analysis of Cyber Adversarial Tactics and Techniques
Marshall S. Rich
Analytics (2023) Vol. 2, Iss. 3, pp. 618-655
Open Access | Times Cited: 5

Intelligence cycle as the basis of analytical activity in combating drug-related crime
Dmytro Ovsіanіuk
Ûridičnij časopis Nacìonalʹnoï akademìï vnutrìšnìh sprav (2024) Vol. 14, Iss. 2, pp. 95-104
Open Access | Times Cited: 1



Ûridičnij časopis Nacìonalʹnoï akademìï vnutrìšnìh sprav (2024) Vol. 14, Iss. 2
Open Access

Blockchain-Based Model for Incentivized Cyber Threat Intelligence Sharing
Algimantas Venčkauskas, Vacius Jusas, Dominykas Barisas, et al.
Applied Sciences (2024) Vol. 14, Iss. 16, pp. 6872-6872
Open Access

Forensic Analysis of Cyber Attacks Using the Cyber Kill Chain Model to Enhance Antivirus Protection in an IT Solutions Company
Eduardo Vilchez, Jorge Lligüizaca-Dávila, Wilfredo Ticona
Lecture notes in networks and systems (2024), pp. 241-255
Closed Access

Role of AI in Combating Cyber Terrorism
Anushka Jha, Rajesh Bahuguna, Samta Kathuria, et al.
(2023), pp. 1156-1160
Closed Access | Times Cited: 1

Page 1

Scroll to top