
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Enhancing data quality in real-time threat intelligence systems using machine learning
Ariel RodrÃguez, Koji Okamura
Social Network Analysis and Mining (2020) Vol. 10, Iss. 1
Closed Access | Times Cited: 7
Ariel RodrÃguez, Koji Okamura
Social Network Analysis and Mining (2020) Vol. 10, Iss. 1
Closed Access | Times Cited: 7
Showing 7 citing articles:
A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications
Thomas Browne, Mohammad Z. Abedin, Mohammad Jabed Morshed Chowdhury
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2911-2938
Open Access | Times Cited: 5
Thomas Browne, Mohammad Z. Abedin, Mohammad Jabed Morshed Chowdhury
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2911-2938
Open Access | Times Cited: 5
From Tweets to Threats: A Survey of Cybersecurity Threat Detection Challenges, AI-Based Solutions and Potential Opportunities in X
Omar Alsodi, Xujuan Zhou, Raj Gururajan, et al.
Applied Sciences (2025) Vol. 15, Iss. 7, pp. 3898-3898
Open Access
Omar Alsodi, Xujuan Zhou, Raj Gururajan, et al.
Applied Sciences (2025) Vol. 15, Iss. 7, pp. 3898-3898
Open Access
Big data analytics of social network marketing and personalized recommendations
Shu-Hsien Liao, Ching-An Yang
Social Network Analysis and Mining (2021) Vol. 11, Iss. 1
Closed Access | Times Cited: 26
Shu-Hsien Liao, Ching-An Yang
Social Network Analysis and Mining (2021) Vol. 11, Iss. 1
Closed Access | Times Cited: 26
Machine Learning Applications in Cyber Threat Intelligence: A Comprehensive Review
Iqra Naseer
Deleted Journal (2024) Vol. 3, Iss. 2, pp. 190-200
Open Access | Times Cited: 1
Iqra Naseer
Deleted Journal (2024) Vol. 3, Iss. 2, pp. 190-200
Open Access | Times Cited: 1
CAVeCTIR: Matching Cyber Threat Intelligence Reports on Connected and Autonomous Vehicles Using Machine Learning
George E. Raptis, Christina Katsini, Christos Alexakos, et al.
Applied Sciences (2022) Vol. 12, Iss. 22, pp. 11631-11631
Open Access | Times Cited: 5
George E. Raptis, Christina Katsini, Christos Alexakos, et al.
Applied Sciences (2022) Vol. 12, Iss. 22, pp. 11631-11631
Open Access | Times Cited: 5
Data divide in digital trade, and its impacts on the digital economy: A literature review
Syed Iftikhar Hussain Shah, Alaa Hussein Abdulaal, Vassilios Peristeras
(2022), pp. 432-439
Closed Access | Times Cited: 3
Syed Iftikhar Hussain Shah, Alaa Hussein Abdulaal, Vassilios Peristeras
(2022), pp. 432-439
Closed Access | Times Cited: 3
A Survey on Detection of cybersecurity threats on Twitter using deep learning
Omar Alsodi, Xujuan Zhou, Raj Gururajan, et al.
(2021), pp. 1-5
Closed Access | Times Cited: 3
Omar Alsodi, Xujuan Zhou, Raj Gururajan, et al.
(2021), pp. 1-5
Closed Access | Times Cited: 3