OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Systematic review of SIEM technology: SIEM-SC birth
Juan Miguel López Velásquez, Sergio Mauricio Martínez Monterrubio, Luis Sánchez, et al.
International Journal of Information Security (2023) Vol. 22, Iss. 3, pp. 691-711
Closed Access | Times Cited: 12

Showing 12 citing articles:

Security Information Event Management data acquisition and analysis methods with machine learning principles
Noyan Tendikov, Leila Rzayeva, Bilal Saoud, et al.
Results in Engineering (2024) Vol. 22, pp. 102254-102254
Open Access | Times Cited: 8

A Framework for Applying Digital Twins to Support Incident Response
Sabah Suhail, Mubashar Iqbal, Kieran McLaughlin, et al.
Lecture notes in computer science (2025), pp. 474-493
Closed Access

Enhancing Cloud Security—Proactive Threat Monitoring and Detection Using a SIEM-Based Approach
Emmanuel Tuyishime, Titus Bălan, Petru Adrian Cotfas, et al.
Applied Sciences (2023) Vol. 13, Iss. 22, pp. 12359-12359
Open Access | Times Cited: 9

A Proposed Approach to Integrate Application Security Vulnerability Data with Incidence Response Systems
Santanam Kasturi, Xiaolong Li, Peng Li, et al.
American Journal of Networks and Communications (2024) Vol. 13, Iss. 1, pp. 19-29
Open Access | Times Cited: 1

On the Benefits of Vulnerability Data Consolidation in Application Security
Santanam Kasturi, Xiaolong Li, Peng Li, et al.
International Conference on Cyber Warfare and Security (2024) Vol. 19, Iss. 1, pp. 455-462
Open Access | Times Cited: 1

How to assess measurement capabilities of a security monitoring infrastructure and plan investment through a graph-based approach
A. Palma, Andrea Sorrentino, Silvia Bonomi
Expert Systems with Applications (2024), pp. 125623-125623
Open Access | Times Cited: 1

Системы для анализа информационной инфраструктуры и информационных объектов предприятия
Владислав Денисенко, А. М. Гончаров, В. В. Окорокова
Современные инновации системы и технологии - Modern Innovations Systems and Technologies (2024) Vol. 4, Iss. 4, pp. 0227-0237
Open Access | Times Cited: 1

A Testbed for a Nearby-Context Aware: Threat Detection and Mitigation System for Connected Vehicles
Miguel Martı́n-Pérez, Jordi Marias i Parella, Javier Fernández, et al.
(2023), pp. 1-8
Closed Access | Times Cited: 2

Architecture of intelligent SIEM for detecting cyber incidents in databases of military information and communication systems.
Ihor Subach, O. Vlasenko
Communication informatization and cybersecurity systems and technologies (2023), Iss. 4, pp. 82-92
Open Access | Times Cited: 2

A Novel EDGE SIEM for Industrial IoT Flows Within 5G Private Networks
Kevin Yaker, Boussad Ait Salem, Baptiste Pierard, et al.
(2024), pp. 1-6
Closed Access

An Approach Toward Enhancing OT and IoT Security
Gustavo Henrique de Almeida, Patrick Taraborelli, Hebert Silva
(2024), pp. 28-29
Closed Access

An Exploratory Analysis of Cloud Security Models in Social Networks
Narasimha Rao Vajjhala
(2023)
Closed Access | Times Cited: 1

Page 1

Scroll to top