
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports
Nanda Rani, Bikash Saha, Vikas Maurya, et al.
Digital Threats Research and Practice (2024)
Open Access | Times Cited: 2
Nanda Rani, Bikash Saha, Vikas Maurya, et al.
Digital Threats Research and Practice (2024)
Open Access | Times Cited: 2
Showing 2 citing articles:
Preparing for Unknown Cyber Threats: A Comprehensive Review of Framework for Speculative Threat Intelligence Using Cross-Domain Indicators
Adeyemi Afolayan Adesola
(2025), pp. 3939-3958
Closed Access
Adeyemi Afolayan Adesola
(2025), pp. 3939-3958
Closed Access
A comprehensive survey of automated Advanced Persistent Threat attribution: Taxonomy, methods, challenges and open research problems
Nanda Rani, Bikash Saha, Sandeep K. Shukla
Journal of Information Security and Applications (2025) Vol. 92, pp. 104076-104076
Closed Access
Nanda Rani, Bikash Saha, Sandeep K. Shukla
Journal of Information Security and Applications (2025) Vol. 92, pp. 104076-104076
Closed Access
APTChaser: Cyber Threat Attribution via Attack Technique Modeling
Yiming Zhang, Peian Yang, Zhengwei Jiang, et al.
(2025), pp. 168-185
Closed Access
Yiming Zhang, Peian Yang, Zhengwei Jiang, et al.
(2025), pp. 168-185
Closed Access
Genesis of Cyber Threats: Towards Malware-based Advanced Persistent Threat (APT) Attribution
Nanda Rani, Bikash Saha, Ravi Kumar, et al.
(2024), pp. 399-408
Closed Access
Nanda Rani, Bikash Saha, Ravi Kumar, et al.
(2024), pp. 399-408
Closed Access