
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Technical Threat Intelligence Analytics: What and How to Visualize for Analytic Process
Robertas Damaševičius, Jevgenijus Toldinas, Algimantas Venčkauskas, et al.
(2020), pp. 1-4
Closed Access | Times Cited: 7
Robertas Damaševičius, Jevgenijus Toldinas, Algimantas Venčkauskas, et al.
(2020), pp. 1-4
Closed Access | Times Cited: 7
Showing 7 citing articles:
A Modified Grey Wolf Optimization Algorithm for an Intrusion Detection System
Abdullah Alzaqebah, Ibrahim Aljarah, Omar S. Al-Kadi, et al.
Mathematics (2022) Vol. 10, Iss. 6, pp. 999-999
Open Access | Times Cited: 87
Abdullah Alzaqebah, Ibrahim Aljarah, Omar S. Al-Kadi, et al.
Mathematics (2022) Vol. 10, Iss. 6, pp. 999-999
Open Access | Times Cited: 87
Predictive Analytics-Based Cybersecurity Framework for Cloud Infrastructure
Akashdeep Bhardwaj, Keshav Kaushik
International Journal of Cloud Applications and Computing (2022) Vol. 12, Iss. 1, pp. 1-20
Closed Access | Times Cited: 24
Akashdeep Bhardwaj, Keshav Kaushik
International Journal of Cloud Applications and Computing (2022) Vol. 12, Iss. 1, pp. 1-20
Closed Access | Times Cited: 24
Enhanced threat intelligence framework for advanced cybersecurity resilience
Moutaz Alazab, Ruba Abu Khurma, M. G. Arenas, et al.
Egyptian Informatics Journal (2024) Vol. 27, pp. 100521-100521
Open Access | Times Cited: 1
Moutaz Alazab, Ruba Abu Khurma, M. G. Arenas, et al.
Egyptian Informatics Journal (2024) Vol. 27, pp. 100521-100521
Open Access | Times Cited: 1
Usability and Security Testing of Online Links: A Framework for Click-Through Rate Prediction Using Deep Learning
Robertas Damaševičius, Ligita Zailskaitė‐Jakštė
Electronics (2022) Vol. 11, Iss. 3, pp. 400-400
Open Access | Times Cited: 7
Robertas Damaševičius, Ligita Zailskaitė‐Jakštė
Electronics (2022) Vol. 11, Iss. 3, pp. 400-400
Open Access | Times Cited: 7
Formal Model of Trustworthy Artificial Intelligence Based on Standardization.
Eduard Manziuk, Olexander Barmak, Юрий Крак, et al.
(2021), pp. 190-197
Closed Access | Times Cited: 5
Eduard Manziuk, Olexander Barmak, Юрий Крак, et al.
(2021), pp. 190-197
Closed Access | Times Cited: 5
Metrics for Evaluating Cyber Security Data Visualizations in Virtual Reality
Anne Harris, Marius Miknis, Connor Smith, et al.
PRESENCE Virtual and Augmented Reality (2020) Vol. 29, pp. 223-240
Closed Access | Times Cited: 2
Anne Harris, Marius Miknis, Connor Smith, et al.
PRESENCE Virtual and Augmented Reality (2020) Vol. 29, pp. 223-240
Closed Access | Times Cited: 2
Exploring the Representation of Cyber-Risk Data Through Sketching
Thomas P. Miller, Miriam Sturdee, Daniel Prince
IEEE Symposium on Visualization for Cyber Security (VIZSEC) (2023), pp. 22-32
Open Access
Thomas P. Miller, Miriam Sturdee, Daniel Prince
IEEE Symposium on Visualization for Cyber Security (VIZSEC) (2023), pp. 22-32
Open Access