
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Blacklist Ecosystem Analysis
Leigh Metcalf, Jonathan Spring
(2015), pp. 13-22
Closed Access | Times Cited: 24
Leigh Metcalf, Jonathan Spring
(2015), pp. 13-22
Closed Access | Times Cited: 24
Showing 24 citing articles:
A Lustrum of Malware Network Communication: Evolution and Insights
Chaz Lever, Platon Kotzias, Davide Balzarotti, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2017)
Closed Access | Times Cited: 77
Chaz Lever, Platon Kotzias, Davide Balzarotti, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2017)
Closed Access | Times Cited: 77
Reading the tea leaves: A comparative analysis of threat intelligence
Vector Guo Li, Matthew Dunn, Paul Pearce, et al.
USENIX Security Symposium (2019), pp. 851-867
Closed Access | Times Cited: 54
Vector Guo Li, Matthew Dunn, Paul Pearce, et al.
USENIX Security Symposium (2019), pp. 851-867
Closed Access | Times Cited: 54
Cyberfraud and the implications for effective risk-based responses: themes from UK research
Michael Levi, Alan Doig, R. V. Gundur, et al.
Crime Law and Social Change (2016) Vol. 67, Iss. 1, pp. 77-96
Open Access | Times Cited: 49
Michael Levi, Alan Doig, R. V. Gundur, et al.
Crime Law and Social Change (2016) Vol. 67, Iss. 1, pp. 77-96
Open Access | Times Cited: 49
Mind Your Own Business: A Longitudinal Study of Threats and Vulnerabilities in Enterprises
Platon Kotzias, Leyla Bilge, Pierre‐Antoine Vervier, et al.
(2019)
Open Access | Times Cited: 37
Platon Kotzias, Leyla Bilge, Pierre‐Antoine Vervier, et al.
(2019)
Open Access | Times Cited: 37
Strategic Aspects of Cyber Risk Information Sharing
Stefan Laube, Rainer Böhme
ACM Computing Surveys (2017) Vol. 50, Iss. 5, pp. 1-36
Closed Access | Times Cited: 38
Stefan Laube, Rainer Böhme
ACM Computing Surveys (2017) Vol. 50, Iss. 5, pp. 1-36
Closed Access | Times Cited: 38
FeedRank: A tamper- resistant method for the ranking of cyber threat intelligence feeds
Roland Meier, Cornelia Scherrer, David Gugelmann, et al.
(2018)
Closed Access | Times Cited: 25
Roland Meier, Cornelia Scherrer, David Gugelmann, et al.
(2018)
Closed Access | Times Cited: 25
Vertex Entropy As a Critical Node Measure in Network Monitoring
Philip Tee, George Parisis, Ian Wakeman
IEEE Transactions on Network and Service Management (2017) Vol. 14, Iss. 3, pp. 646-660
Open Access | Times Cited: 21
Philip Tee, George Parisis, Ian Wakeman
IEEE Transactions on Network and Service Management (2017) Vol. 14, Iss. 3, pp. 646-660
Open Access | Times Cited: 21
Towards Robust Experimental Design for User Studies in Security and Privacy
Kat Krol, JM Spring, Simon Parkin, et al.
(2016), pp. 21-31
Closed Access | Times Cited: 19
Kat Krol, JM Spring, Simon Parkin, et al.
(2016), pp. 21-31
Closed Access | Times Cited: 19
Analysis of malware download sites by focusing on time series variation of malware
Yasuyuki Tanaka, Mitsuaki Akiyama, Atsuhiro Goto
Journal of Computational Science (2017) Vol. 22, pp. 301-313
Closed Access | Times Cited: 19
Yasuyuki Tanaka, Mitsuaki Akiyama, Atsuhiro Goto
Journal of Computational Science (2017) Vol. 22, pp. 301-313
Closed Access | Times Cited: 19
CyNER: Information Extraction from Unstructured Text of CTI Sources with Noncontextual IOCs
Shota Fujii, Nobutaka Kawaguchi, Tomohiro Shigemoto, et al.
Lecture notes in computer science (2022), pp. 85-104
Closed Access | Times Cited: 10
Shota Fujii, Nobutaka Kawaguchi, Tomohiro Shigemoto, et al.
Lecture notes in computer science (2022), pp. 85-104
Closed Access | Times Cited: 10
Thinking about intrusion kill chains as mechanisms
Jonathan Spring, Eric Hatleback
Journal of Cybersecurity (2017), pp. tyw012-tyw012
Open Access | Times Cited: 16
Jonathan Spring, Eric Hatleback
Journal of Cybersecurity (2017), pp. tyw012-tyw012
Open Access | Times Cited: 16
Blocklist Babel: On the Transparency and Dynamics of Open Source Blocklisting
Álvaro Feal, Pelayo Vallina, Julien Gamba, et al.
IEEE Transactions on Network and Service Management (2021) Vol. 18, Iss. 2, pp. 1334-1349
Closed Access | Times Cited: 12
Álvaro Feal, Pelayo Vallina, Julien Gamba, et al.
IEEE Transactions on Network and Service Management (2021) Vol. 18, Iss. 2, pp. 1334-1349
Closed Access | Times Cited: 12
Building General Knowledge of Mechanisms in Information Security
Jonathan Spring, Phyllis Illari
Philosophy & Technology (2018) Vol. 32, Iss. 4, pp. 627-659
Open Access | Times Cited: 10
Jonathan Spring, Phyllis Illari
Philosophy & Technology (2018) Vol. 32, Iss. 4, pp. 627-659
Open Access | Times Cited: 10
Assessing the Effectiveness of Domain Blacklisting Against Malicious DNS Registrations
Thomas Vissers, Peter H. Janssen, Wouter Joosen, et al.
(2019), pp. 199-204
Open Access | Times Cited: 4
Thomas Vissers, Peter H. Janssen, Wouter Joosen, et al.
(2019), pp. 199-204
Open Access | Times Cited: 4
SIRAJ: A Unified Framework for Aggregation of Malicious Entity Detectors
Saravanan Thirumuruganathan, Mohamed Nabeel, Euijin Choo, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2022), pp. 507-521
Closed Access | Times Cited: 3
Saravanan Thirumuruganathan, Mohamed Nabeel, Euijin Choo, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2022), pp. 507-521
Closed Access | Times Cited: 3
TIPCE: A Longitudinal Threat Intelligence Platform Comprehensiveness Analysis
Kiavash Satvat, Rigel Gjomemo, V. N. Venkatakrishnan
(2024)
Closed Access
Kiavash Satvat, Rigel Gjomemo, V. N. Venkatakrishnan
(2024)
Closed Access
Web of shadows: Investigating malware abuse of internet services
Mauro Allegretta, Giuseppe Siracusano, Roberto González, et al.
Computers & Security (2024) Vol. 149, pp. 104182-104182
Open Access
Mauro Allegretta, Giuseppe Siracusano, Roberto González, et al.
Computers & Security (2024) Vol. 149, pp. 104182-104182
Open Access
A Large-scale Analysis of Cloud Service Abuse
Naoki Fukushi, Daiki Chiba, Mitsuaki Akiyama, et al.
(2020), pp. 1-9
Closed Access | Times Cited: 3
Naoki Fukushi, Daiki Chiba, Mitsuaki Akiyama, et al.
(2020), pp. 1-9
Closed Access | Times Cited: 3
Extracting and Analyzing Cybersecurity Named Entity and its Relationship with Noncontextual IOCs from Unstructured Text of CTI Sources
Shota Fujii, Nobutaka Kawaguchi, Tomohiro Shigemoto, et al.
Journal of Information Processing (2023) Vol. 31, pp. 578-590
Open Access | Times Cited: 1
Shota Fujii, Nobutaka Kawaguchi, Tomohiro Shigemoto, et al.
Journal of Information Processing (2023) Vol. 31, pp. 578-590
Open Access | Times Cited: 1
The application of Neural Networks to predicting the root cause of service failures
Robert Harper, Philip Tee
(2017), pp. 953-958
Closed Access | Times Cited: 2
Robert Harper, Philip Tee
(2017), pp. 953-958
Closed Access | Times Cited: 2
A Comprehensive Measurement of Cloud Service Abuse
Naoki Fukushi, Daiki Chiba, Mitsuaki Akiyama, et al.
Journal of Information Processing (2021) Vol. 29, pp. 93-102
Open Access | Times Cited: 1
Naoki Fukushi, Daiki Chiba, Mitsuaki Akiyama, et al.
Journal of Information Processing (2021) Vol. 29, pp. 93-102
Open Access | Times Cited: 1
Rotten Apples or Bad Harvest? What We Are Measuring When We Are Measuring Abuse
Samaneh Tajalizadehkhoob, Rainer Böhme, Carlos Gañán, et al.
arXiv (Cornell University) (2017)
Closed Access
Samaneh Tajalizadehkhoob, Rainer Böhme, Carlos Gañán, et al.
arXiv (Cornell University) (2017)
Closed Access
Cuckoo Prefix: A Hash Set for Compressed IP Blocklists
Donovan Allen, Navid Shaghaghi
(2020), pp. 1-8
Closed Access
Donovan Allen, Navid Shaghaghi
(2020), pp. 1-8
Closed Access
The Ecosystem of Detection and Blocklisting of Domain Generation
Leigh Metcalf, Jonathan Spring
Digital Threats Research and Practice (2021) Vol. 2, Iss. 3, pp. 1-22
Open Access
Leigh Metcalf, Jonathan Spring
Digital Threats Research and Practice (2021) Vol. 2, Iss. 3, pp. 1-22
Open Access