
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Multiple social platforms reveal actionable signals for software vulnerability awareness: A study of GitHub, Twitter and Reddit
Prasha Shrestha, Arun V. Sathanur, Suraj Maharjan, et al.
PLoS ONE (2020) Vol. 15, Iss. 3, pp. e0230250-e0230250
Open Access | Times Cited: 30
Prasha Shrestha, Arun V. Sathanur, Suraj Maharjan, et al.
PLoS ONE (2020) Vol. 15, Iss. 3, pp. e0230250-e0230250
Open Access | Times Cited: 30
Showing 1-25 of 30 citing articles:
A Survey on Data-driven Software Vulnerability Assessment and Prioritization
Triet Huynh Minh Le, Huaming Chen, Muhammad Ali Babar
ACM Computing Surveys (2022) Vol. 55, Iss. 5, pp. 1-39
Open Access | Times Cited: 57
Triet Huynh Minh Le, Huaming Chen, Muhammad Ali Babar
ACM Computing Surveys (2022) Vol. 55, Iss. 5, pp. 1-39
Open Access | Times Cited: 57
Mapping automatic social media information disorder. The role of bots and AI in spreading misleading information in society
Andrea Tomassi, Andrea Falegnami, Elpidio Romano
PLoS ONE (2024) Vol. 19, Iss. 5, pp. e0303183-e0303183
Open Access | Times Cited: 13
Andrea Tomassi, Andrea Falegnami, Elpidio Romano
PLoS ONE (2024) Vol. 19, Iss. 5, pp. e0303183-e0303183
Open Access | Times Cited: 13
Comparing the #StopTheSteal Movement across Multiple Platforms: Differentiating Discourse on Facebook, Twitter, and Parler
Bin Chen, Josephine Lukito, Gyo Hyun Koo
Social Media + Society (2023) Vol. 9, Iss. 3
Open Access | Times Cited: 11
Bin Chen, Josephine Lukito, Gyo Hyun Koo
Social Media + Society (2023) Vol. 9, Iss. 3
Open Access | Times Cited: 11
The unfolding of geopolitical tensions on social networks: a social network analysis of Twitter and Reddit conversations
Pramukh Nanjundaswamy Vasist, Satish Krishnan, Prafulla Agnihotri
Internet Research (2025)
Closed Access
Pramukh Nanjundaswamy Vasist, Satish Krishnan, Prafulla Agnihotri
Internet Research (2025)
Closed Access
Exposure of software vulnerabilities on Twitter: Analyzing vendors’ behavior of releasing software patches
Romilla Syed, Joti Kaur, Leiser Silva
Computers & Security (2025), pp. 104354-104354
Closed Access
Romilla Syed, Joti Kaur, Leiser Silva
Computers & Security (2025), pp. 104354-104354
Closed Access
Open source oriented cross-platform survey
Side Yao, Xunhui Zhang, Yang Zhang, et al.
Information and Software Technology (2025), pp. 107704-107704
Closed Access
Side Yao, Xunhui Zhang, Yang Zhang, et al.
Information and Software Technology (2025), pp. 107704-107704
Closed Access
A survey of social cybersecurity: Techniques for attack detection, evaluations, challenges, and future prospects
Aos Mulahuwaish, Basheer Qolomany, Kevin Gyorick, et al.
Computers in Human Behavior Reports (2025), pp. 100668-100668
Open Access
Aos Mulahuwaish, Basheer Qolomany, Kevin Gyorick, et al.
Computers in Human Behavior Reports (2025), pp. 100668-100668
Open Access
Impact of Open-Source Community on Cryptocurrency Market Price: An Empirical Investigation
Mariia Petryk, Liangfei Qiu, Praveen Pathak
Journal of Management Information Systems (2023) Vol. 40, Iss. 4, pp. 1237-1270
Closed Access | Times Cited: 9
Mariia Petryk, Liangfei Qiu, Praveen Pathak
Journal of Management Information Systems (2023) Vol. 40, Iss. 4, pp. 1237-1270
Closed Access | Times Cited: 9
Internet-Based Mental Health Survey Research: Navigating Internet Bots on Reddit
Annabelle M. Mournet, Evan M. Kleiman
Cyberpsychology Behavior and Social Networking (2023) Vol. 26, Iss. 2, pp. 73-79
Closed Access | Times Cited: 8
Annabelle M. Mournet, Evan M. Kleiman
Cyberpsychology Behavior and Social Networking (2023) Vol. 26, Iss. 2, pp. 73-79
Closed Access | Times Cited: 8
Understanding EdTech's Privacy and Security Issues: Understanding the Perception and Awareness of Education Technologies' Privacy and Security Issues
Rakibul Hasan
Proceedings on Privacy Enhancing Technologies (2023) Vol. 2023, Iss. 4, pp. 269-286
Open Access | Times Cited: 8
Rakibul Hasan
Proceedings on Privacy Enhancing Technologies (2023) Vol. 2023, Iss. 4, pp. 269-286
Open Access | Times Cited: 8
Exploring topic models to discern cyber threats on Twitter: A case study on Log4Shell
Yue Wang, Md Abul Bashar, Mahinthan Chandramohan, et al.
Intelligent Systems with Applications (2023) Vol. 20, pp. 200280-200280
Open Access | Times Cited: 7
Yue Wang, Md Abul Bashar, Mahinthan Chandramohan, et al.
Intelligent Systems with Applications (2023) Vol. 20, pp. 200280-200280
Open Access | Times Cited: 7
Patients Satisfaction with Pharmaceutical Care and Associated Factors in the Southwestern Ethiopia
Gemmechu Hasen, Bedaso Negeso
Patient Preference and Adherence (2021) Vol. Volume 15, pp. 2155-2163
Open Access | Times Cited: 12
Gemmechu Hasen, Bedaso Negeso
Patient Preference and Adherence (2021) Vol. Volume 15, pp. 2155-2163
Open Access | Times Cited: 12
Bitcoin Price Prediction
Mareena Fernandes, Saloni Khanna, Leandra Monteiro, et al.
(2021), pp. 1-4
Closed Access | Times Cited: 12
Mareena Fernandes, Saloni Khanna, Leandra Monteiro, et al.
(2021), pp. 1-4
Closed Access | Times Cited: 12
A temporal graph framework for intelligence extraction in social media networks
Wingyan Chung, Vincent S. Lai
Information & Management (2023) Vol. 60, Iss. 4, pp. 103773-103773
Closed Access | Times Cited: 4
Wingyan Chung, Vincent S. Lai
Information & Management (2023) Vol. 60, Iss. 4, pp. 103773-103773
Closed Access | Times Cited: 4
The diffusion of malicious content on Twitter and its impact on security
Yaman Roumani
Information & Management (2024) Vol. 61, Iss. 5, pp. 103971-103971
Closed Access | Times Cited: 1
Yaman Roumani
Information & Management (2024) Vol. 61, Iss. 5, pp. 103971-103971
Closed Access | Times Cited: 1
Vulnerability disclosure and cybersecurity awareness campaigns on twitter during COVID ‐19
Aditya Bahl, Aastha Sharma, Muhammad Rizwan Asghar
Security and Privacy (2021) Vol. 4, Iss. 6
Open Access | Times Cited: 9
Aditya Bahl, Aastha Sharma, Muhammad Rizwan Asghar
Security and Privacy (2021) Vol. 4, Iss. 6
Open Access | Times Cited: 9
Does the first response matter for future contributions? A study of first contributions
Noppadol Assavakamhaenghan, Supatsara Wattanakriengkrai, Naomichi Shimada, et al.
Empirical Software Engineering (2023) Vol. 28, Iss. 3
Open Access | Times Cited: 3
Noppadol Assavakamhaenghan, Supatsara Wattanakriengkrai, Naomichi Shimada, et al.
Empirical Software Engineering (2023) Vol. 28, Iss. 3
Open Access | Times Cited: 3
Attention-grabbing news coverage: Violent images of the Black Lives Matter movement and how they attract user attention on Reddit
Theresa Henn, Oliver Posegga
PLoS ONE (2023) Vol. 18, Iss. 8, pp. e0288962-e0288962
Open Access | Times Cited: 3
Theresa Henn, Oliver Posegga
PLoS ONE (2023) Vol. 18, Iss. 8, pp. e0288962-e0288962
Open Access | Times Cited: 3
Comparing the #StopTheSteal Movement across Multiple Platforms: Differentiating Discourse on Facebook, Twitter, and Parler
Bin Chen, Gyo Hyun Koo
(2023)
Open Access | Times Cited: 3
Bin Chen, Gyo Hyun Koo
(2023)
Open Access | Times Cited: 3
ExpSeeker: extract public exploit code information from social media
Yutong Du, Cheng Huang, Genpei Liang, et al.
Applied Intelligence (2022) Vol. 53, Iss. 12, pp. 15772-15786
Closed Access | Times Cited: 4
Yutong Du, Cheng Huang, Genpei Liang, et al.
Applied Intelligence (2022) Vol. 53, Iss. 12, pp. 15772-15786
Closed Access | Times Cited: 4
A Framework for Unsupervised Classificiation and Data Mining of Tweets about Cyber Vulnerabilities
Kenneth Alperin, Emily Joback, Leslie Shing, et al.
arXiv (Cornell University) (2021)
Open Access | Times Cited: 5
Kenneth Alperin, Emily Joback, Leslie Shing, et al.
arXiv (Cornell University) (2021)
Open Access | Times Cited: 5
An Analysis of Network Protocol Vulnerability Mining Using Fuzz Testing Combined with Deep Learning Models
MA Ya
Deleted Journal (2024) Vol. 20, Iss. 3, pp. 1111-1125
Open Access
MA Ya
Deleted Journal (2024) Vol. 20, Iss. 3, pp. 1111-1125
Open Access
Evaluating the Performance of Twitter-based Exploit Detectors
Daniel Alves de Sousa, Elaine R. Faria, Rodrigo Sanches Miani
(2020), pp. 464-477
Open Access | Times Cited: 3
Daniel Alves de Sousa, Elaine R. Faria, Rodrigo Sanches Miani
(2020), pp. 464-477
Open Access | Times Cited: 3
DeepVuler: A Vulnerability Intelligence Mining System for Open-Source Communities
Susheng Wu, Bin Chen, MingXu Sun, et al.
2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (2021), pp. 598-605
Closed Access | Times Cited: 1
Susheng Wu, Bin Chen, MingXu Sun, et al.
2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (2021), pp. 598-605
Closed Access | Times Cited: 1
A multilayered graph-based framework to explore behavioural phenomena in social media conversations
Guillermo Blanco, Anália Lourenço
International Journal of Medical Informatics (2023) Vol. 179, pp. 105236-105236
Open Access
Guillermo Blanco, Anália Lourenço
International Journal of Medical Informatics (2023) Vol. 179, pp. 105236-105236
Open Access