OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Gathering Cyber Threat Intelligence from Twitter Using Novelty Classification
Ba Dung Le, Guanhua Wang, Mehwish Nasim, et al.
(2019), pp. 316-323
Open Access | Times Cited: 32

Showing 1-25 of 32 citing articles:

A survey on cybersecurity knowledge graph construction
Xiaojuan Zhao, Rong Jiang, Yue Han, et al.
Computers & Security (2023) Vol. 136, pp. 103524-103524
Closed Access | Times Cited: 25

inTIME: A Machine Learning-Based Framework for Gathering and Leveraging Web Data to Cyber-Threat Intelligence
Paris Koloveas, Thanasis Chantzios, Sofia Alevizopoulou, et al.
Electronics (2021) Vol. 10, Iss. 7, pp. 818-818
Open Access | Times Cited: 53

Systematic Literature Review on Cyber Situational Awareness Visualizations
Liuyue Jiang, Asangi Jayatilaka, Mehwish Nasim, et al.
IEEE Access (2022) Vol. 10, pp. 57525-57554
Open Access | Times Cited: 28

Automated Emerging Cyber Threat Identification and Profiling Based on Natural Language Processing
Renato Marinho, Raimir Holanda Filho
IEEE Access (2023) Vol. 11, pp. 58915-58936
Open Access | Times Cited: 18

A survey on predictions of cyber-attacks utilizing real-time twitter tracing recognition
Sahar Altalhi, Adnan Gutub
Journal of Ambient Intelligence and Humanized Computing (2021) Vol. 12, Iss. 11, pp. 10209-10221
Closed Access | Times Cited: 37

A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications
Thomas Browne, Mohammad Z. Abedin, Mohammad Jabed Morshed Chowdhury
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2911-2938
Open Access | Times Cited: 5

Blockchain-Based Cyber Threat Intelligence System Architecture for Sustainable Computing
Jeonghun Cha, Sushil Kumar Singh, Yi Pan, et al.
Sustainability (2020) Vol. 12, Iss. 16, pp. 6401-6401
Open Access | Times Cited: 36

A New Text Classification Model Based on Contrastive Word Embedding for Detecting Cybersecurity Intelligence in Twitter
Hansub Shin, Hyuk-Yoon Kwon, Seung‐Jin Ryu
Electronics (2020) Vol. 9, Iss. 9, pp. 1527-1527
Open Access | Times Cited: 34

CybAttT: A Dataset of Cyberattack News Tweets for Enhanced Threat Intelligence
Huda Lughbi, Mourad Mars, Khaled H. Almotairi
Data (2024) Vol. 9, Iss. 3, pp. 39-39
Open Access | Times Cited: 4

From Tweets to Threats: A Survey of Cybersecurity Threat Detection Challenges, AI-Based Solutions and Potential Opportunities in X
Omar Alsodi, Xujuan Zhou, Raj Gururajan, et al.
Applied Sciences (2025) Vol. 15, Iss. 7, pp. 3898-3898
Open Access

A survey of social cybersecurity: Techniques for attack detection, evaluations, challenges, and future prospects
Aos Mulahuwaish, Basheer Qolomany, Kevin Gyorick, et al.
Computers in Human Behavior Reports (2025), pp. 100668-100668
Open Access

DNRTI: A Large-Scale Dataset for Named Entity Recognition in Threat Intelligence
Xuren Wang, Xinpei Liu, Shengqin Ao, et al.
2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (2020), pp. 1842-1848
Closed Access | Times Cited: 32

On the Automated Assessment of Open-Source Cyber Threat Intelligence Sources
Andrea Tundis, Samuel Ruppert, Max Mühlhäuser
Lecture notes in computer science (2020), pp. 453-467
Open Access | Times Cited: 20

PUMiner
Triet Huynh Minh Le, David Hin, Roland Croft, et al.
(2020), pp. 350-361
Open Access | Times Cited: 17

A Literature Review on Mining Cyberthreat Intelligence from Unstructured Texts
Md Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie Williams
2021 International Conference on Data Mining Workshops (ICDMW) (2020), pp. 516-525
Closed Access | Times Cited: 17

Exploring Open Source Information for Cyber Threat Intelligence
Victor Adewopo, Bilal Gonen, Festus Adewopo
2021 IEEE International Conference on Big Data (Big Data) (2020), pp. 2232-2241
Closed Access | Times Cited: 11

CTI-Twitter: Gathering Cyber Threat Intelligence from Twitter using Integrated Supervised and Unsupervised Learning
Linn-Mari Kristiansen, Vinti Agarwal, Katrin Franke, et al.
2021 IEEE International Conference on Big Data (Big Data) (2020), pp. 2299-2308
Closed Access | Times Cited: 7

Social Media Monitoring for IoT Cyber-Threats
Sofia Alevizopoulou, Paris Koloveas, Christos Tryfonopoulos, et al.
(2021)
Open Access | Times Cited: 5

What are the attackers doing now? Automating cyber threat intelligence extraction from text on pace with the changing threat landscape: A survey
Md Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie Williams
arXiv (Cornell University) (2021)
Open Access | Times Cited: 5

Towards Selecting Informative Content for Cyber Threat Intelligence
Panos Panagiotou, Christos Iliou, Konstantinos Apostolou, et al.
(2021), pp. 354-359
Closed Access | Times Cited: 4

Inductive-Deductive Reasoning in Qualitative Analysis using ATLAS.ti: Trending Cybersecurity Twitter Data Analytics
Ani Munirah Mohamad, Felicia Yong Yan Yan, Nurhazman Abdul Aziz, et al.
2022 3rd International Conference for Emerging Technology (INCET) (2022), pp. 1-5
Closed Access | Times Cited: 3

Exploring the Properties and Growth of Student Interaction Networks on Twitter: Insights on STEM Learning and Engagement
Md. Nizamul Hoque Mojumder, Arif Mohaimin Sadri
2020 ASEE Virtual Annual Conference Content Access Proceedings (2024)
Open Access

Can social media shape the security of next-generation connected vehicles?
Nicola Scarano, Luca Mannella, Alessandro Savino, et al.
(2024), pp. 1-4
Open Access

Implementation of Token Parsing Technique for Regex Based Classification of Unstructured Data for Cyber Threat Analysis
Muhammad Hazim Mohd Pakhari, Norziana Jamil, Mohd Ezanee Rusli, et al.
(2020), pp. 395-398
Closed Access | Times Cited: 3

Page 1 - Next Page

Scroll to top