
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
When LLMs meet cybersecurity: a systematic literature review
Jie Zhang, H. Bu, Hui Wen, et al.
Cybersecurity (2025) Vol. 8, Iss. 1
Open Access | Times Cited: 5
Jie Zhang, H. Bu, Hui Wen, et al.
Cybersecurity (2025) Vol. 8, Iss. 1
Open Access | Times Cited: 5
Showing 5 citing articles:
Large language models for software vulnerability detection: a guide for researchers on models, methods, techniques, datasets, and metrics
Seyed Mohammad Taghavi Far, Farid Feyzi
International Journal of Information Security (2025) Vol. 24, Iss. 2
Closed Access
Seyed Mohammad Taghavi Far, Farid Feyzi
International Journal of Information Security (2025) Vol. 24, Iss. 2
Closed Access
A RAG-Based Question-Answering Solution for Cyber-Attack Investigation and Attribution
Sampath Rajapaksha, Ruby Rani, Erisa Karafili
Lecture notes in computer science (2025), pp. 238-256
Closed Access
Sampath Rajapaksha, Ruby Rani, Erisa Karafili
Lecture notes in computer science (2025), pp. 238-256
Closed Access
A comparative analysis on using GPT and BERT for automated vulnerability scoring
Seyedeh Leili Mirtaheri, Andrea Pugliese, Narges Movahed, et al.
Intelligent Systems with Applications (2025), pp. 200515-200515
Open Access
Seyedeh Leili Mirtaheri, Andrea Pugliese, Narges Movahed, et al.
Intelligent Systems with Applications (2025), pp. 200515-200515
Open Access
Enhancing Cybersecurity Situation Awareness Through Knowledge Graphs: An Integrated Survey Including Threats, Vulnerabilities, and Assets
Yong‐Song Guan, Yongheng Zhang, Jiahui Yue, et al.
(2025)
Closed Access
Yong‐Song Guan, Yongheng Zhang, Jiahui Yue, et al.
(2025)
Closed Access
Large Language Models for Cyber Resilience: A Comprehensive Review, Challenges, and Future Perspectives
Weiping Ding, Mohamed Abdel‐Basset, Ahmed Abdel-Monem, et al.
Applied Soft Computing (2024) Vol. 170, pp. 112663-112663
Closed Access
Weiping Ding, Mohamed Abdel‐Basset, Ahmed Abdel-Monem, et al.
Applied Soft Computing (2024) Vol. 170, pp. 112663-112663
Closed Access