OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Blacklist Ecosystem Analysis
Leigh Metcalf, Jonathan Spring
(2015), pp. 13-22
Closed Access | Times Cited: 24

Showing 24 citing articles:

A Lustrum of Malware Network Communication: Evolution and Insights
Chaz Lever, Platon Kotzias, Davide Balzarotti, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2017)
Closed Access | Times Cited: 77

Reading the tea leaves: A comparative analysis of threat intelligence
Vector Guo Li, Matthew Dunn, Paul Pearce, et al.
USENIX Security Symposium (2019), pp. 851-867
Closed Access | Times Cited: 54

Cyberfraud and the implications for effective risk-based responses: themes from UK research
Michael Levi, Alan Doig, R. V. Gundur, et al.
Crime Law and Social Change (2016) Vol. 67, Iss. 1, pp. 77-96
Open Access | Times Cited: 49

Mind Your Own Business: A Longitudinal Study of Threats and Vulnerabilities in Enterprises
Platon Kotzias, Leyla Bilge, Pierre‐Antoine Vervier, et al.
(2019)
Open Access | Times Cited: 37

Strategic Aspects of Cyber Risk Information Sharing
Stefan Laube, Rainer Böhme
ACM Computing Surveys (2017) Vol. 50, Iss. 5, pp. 1-36
Closed Access | Times Cited: 38

FeedRank: A tamper- resistant method for the ranking of cyber threat intelligence feeds
Roland Meier, Cornelia Scherrer, David Gugelmann, et al.
(2018)
Closed Access | Times Cited: 25

Vertex Entropy As a Critical Node Measure in Network Monitoring
Philip Tee, George Parisis, Ian Wakeman
IEEE Transactions on Network and Service Management (2017) Vol. 14, Iss. 3, pp. 646-660
Open Access | Times Cited: 21

Towards Robust Experimental Design for User Studies in Security and Privacy
Kat Krol, JM Spring, Simon Parkin, et al.
(2016), pp. 21-31
Closed Access | Times Cited: 19

Analysis of malware download sites by focusing on time series variation of malware
Yasuyuki Tanaka, Mitsuaki Akiyama, Atsuhiro Goto
Journal of Computational Science (2017) Vol. 22, pp. 301-313
Closed Access | Times Cited: 19

CyNER: Information Extraction from Unstructured Text of CTI Sources with Noncontextual IOCs
Shota Fujii, Nobutaka Kawaguchi, Tomohiro Shigemoto, et al.
Lecture notes in computer science (2022), pp. 85-104
Closed Access | Times Cited: 10

Thinking about intrusion kill chains as mechanisms
Jonathan Spring, Eric Hatleback
Journal of Cybersecurity (2017), pp. tyw012-tyw012
Open Access | Times Cited: 16

Blocklist Babel: On the Transparency and Dynamics of Open Source Blocklisting
Álvaro Feal, Pelayo Vallina, Julien Gamba, et al.
IEEE Transactions on Network and Service Management (2021) Vol. 18, Iss. 2, pp. 1334-1349
Closed Access | Times Cited: 12

Building General Knowledge of Mechanisms in Information Security
Jonathan Spring, Phyllis Illari
Philosophy & Technology (2018) Vol. 32, Iss. 4, pp. 627-659
Open Access | Times Cited: 10

Assessing the Effectiveness of Domain Blacklisting Against Malicious DNS Registrations
Thomas Vissers, Peter H. Janssen, Wouter Joosen, et al.
(2019), pp. 199-204
Open Access | Times Cited: 4

SIRAJ: A Unified Framework for Aggregation of Malicious Entity Detectors
Saravanan Thirumuruganathan, Mohamed Nabeel, Euijin Choo, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2022), pp. 507-521
Closed Access | Times Cited: 3

TIPCE: A Longitudinal Threat Intelligence Platform Comprehensiveness Analysis
Kiavash Satvat, Rigel Gjomemo, V. N. Venkatakrishnan
(2024)
Closed Access

Web of shadows: Investigating malware abuse of internet services
Mauro Allegretta, Giuseppe Siracusano, Roberto González, et al.
Computers & Security (2024) Vol. 149, pp. 104182-104182
Open Access

A Large-scale Analysis of Cloud Service Abuse
Naoki Fukushi, Daiki Chiba, Mitsuaki Akiyama, et al.
(2020), pp. 1-9
Closed Access | Times Cited: 3

Extracting and Analyzing Cybersecurity Named Entity and its Relationship with Noncontextual IOCs from Unstructured Text of CTI Sources
Shota Fujii, Nobutaka Kawaguchi, Tomohiro Shigemoto, et al.
Journal of Information Processing (2023) Vol. 31, pp. 578-590
Open Access | Times Cited: 1

The application of Neural Networks to predicting the root cause of service failures
Robert Harper, Philip Tee
(2017), pp. 953-958
Closed Access | Times Cited: 2

A Comprehensive Measurement of Cloud Service Abuse
Naoki Fukushi, Daiki Chiba, Mitsuaki Akiyama, et al.
Journal of Information Processing (2021) Vol. 29, pp. 93-102
Open Access | Times Cited: 1

Rotten Apples or Bad Harvest? What We Are Measuring When We Are Measuring Abuse
Samaneh Tajalizadehkhoob, Rainer Böhme, Carlos Gañán, et al.
arXiv (Cornell University) (2017)
Closed Access

Cuckoo Prefix: A Hash Set for Compressed IP Blocklists
Donovan Allen, Navid Shaghaghi
(2020), pp. 1-8
Closed Access

The Ecosystem of Detection and Blocklisting of Domain Generation
Leigh Metcalf, Jonathan Spring
Digital Threats Research and Practice (2021) Vol. 2, Iss. 3, pp. 1-22
Open Access

Page 1

Scroll to top