
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Mapping Tools for Open Source Intelligence with Cyber Kill Chain for Adversarial Aware Security
Muhammad Mudassar Yamin, Mohib Ullah, Habib Ullah, et al.
Mathematics (2022) Vol. 10, Iss. 12, pp. 2054-2054
Open Access | Times Cited: 11
Muhammad Mudassar Yamin, Mohib Ullah, Habib Ullah, et al.
Mathematics (2022) Vol. 10, Iss. 12, pp. 2054-2054
Open Access | Times Cited: 11
Showing 11 citing articles:
ATT&CK-based Advanced Persistent Threat attacks risk propagation assessment model for zero trust networks
Jingci Zhang, Jun Zheng, Qikun Zhang, et al.
Computer Networks (2024) Vol. 245, pp. 110376-110376
Closed Access | Times Cited: 5
Jingci Zhang, Jun Zheng, Qikun Zhang, et al.
Computer Networks (2024) Vol. 245, pp. 110376-110376
Closed Access | Times Cited: 5
Evading Antivirus Detection Using Fountain Code-Based Techniques for Executing Shellcodes
G. Steve Huang, Ko-Chin Chang, Tai-Hung Lai
Sensors (2025) Vol. 25, Iss. 2, pp. 460-460
Open Access
G. Steve Huang, Ko-Chin Chang, Tai-Hung Lai
Sensors (2025) Vol. 25, Iss. 2, pp. 460-460
Open Access
Open Source Intelligence Opportunities and Challenges: a Review
Sabina Szymoniak, Kacper Foks
Advances in Science and Technology – Research Journal (2024) Vol. 18, Iss. 3, pp. 123-139
Open Access | Times Cited: 1
Sabina Szymoniak, Kacper Foks
Advances in Science and Technology – Research Journal (2024) Vol. 18, Iss. 3, pp. 123-139
Open Access | Times Cited: 1
Evaluating the stealth of reinforcement learning-based cyber attacks against unknown scenarios using knowledge transfer techniques
Antonio Horta, Anderson Fernandes Pereira dos Santos, Ronaldo Ribeiro Goldschmidt
Journal of Computer Security (2024), pp. 1-19
Closed Access | Times Cited: 1
Antonio Horta, Anderson Fernandes Pereira dos Santos, Ronaldo Ribeiro Goldschmidt
Journal of Computer Security (2024), pp. 1-19
Closed Access | Times Cited: 1
Implications of Large Language Models for OSINT: Assessing the Impact on Information Acquisition and Analyst Expertise in Prompt Engineering
Ján Černý
European Conference on Cyber Warfare and Security (2024) Vol. 23, Iss. 1, pp. 116-124
Open Access
Ján Černý
European Conference on Cyber Warfare and Security (2024) Vol. 23, Iss. 1, pp. 116-124
Open Access
A Comparative Study of OSINT Automation Tools
Sangmin Shin, Ki‐Hyun Jung
Asia-pacific Journal of Convergent Research Interchange (2024) Vol. 10, Iss. 5, pp. 1-13
Open Access
Sangmin Shin, Ki‐Hyun Jung
Asia-pacific Journal of Convergent Research Interchange (2024) Vol. 10, Iss. 5, pp. 1-13
Open Access
Framework of OSINT Automation Tool
Sang Min Shin, Ki Hyun Jung
Asia-pacific Journal of Convergent Research Interchange (2024) Vol. 10, Iss. 7, pp. 19-30
Open Access
Sang Min Shin, Ki Hyun Jung
Asia-pacific Journal of Convergent Research Interchange (2024) Vol. 10, Iss. 7, pp. 19-30
Open Access
THE THREATS OF OSINT TOOLS AND WAYS TO MITIGATE THE CONSEQUENCES OF THEIR APPLICATION FOR THE ORGANIZATION
Svitlana Lehominova, Yurii Shchavinsky, Dmytro Rabchun, et al.
Cybersecurity Education Science Technique (2024) Vol. 1, Iss. 25, pp. 294-303
Open Access
Svitlana Lehominova, Yurii Shchavinsky, Dmytro Rabchun, et al.
Cybersecurity Education Science Technique (2024) Vol. 1, Iss. 25, pp. 294-303
Open Access
Att&Ck Based Advanced Persistent Threat Attacks Risk Propagation Assessment Model for Zero Trust Networks
Jingci Zhang, Jun Zheng, Zheng Zhang, et al.
(2023)
Closed Access
Jingci Zhang, Jun Zheng, Zheng Zhang, et al.
(2023)
Closed Access
Data Driven Skill Assessment for Cybersecurity Exercises
Saif Hassan, Sarang Shaikh, Muhammad Mudassar Yamin, et al.
(2023) Vol. 1, pp. 359-366
Closed Access
Saif Hassan, Sarang Shaikh, Muhammad Mudassar Yamin, et al.
(2023) Vol. 1, pp. 359-366
Closed Access
CYBERSECURITY AUTOMATION USING CYBER KILL CHAIN
International Research Journal of Modernization in Engineering Technology and Science (2022)
Open Access
International Research Journal of Modernization in Engineering Technology and Science (2022)
Open Access