OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Mind Your Own Business: A Longitudinal Study of Threats and Vulnerabilities in Enterprises
Platon Kotzias, Leyla Bilge, Pierre‐Antoine Vervier, et al.
(2019)
Open Access | Times Cited: 37

Showing 1-25 of 37 citing articles:

How Did That Get In My Phone? Unwanted App Distribution on Android Devices
Platon Kotzias, Juan Caballero, Leyla Bilge
2022 IEEE Symposium on Security and Privacy (SP) (2021), pp. 53-69
Open Access | Times Cited: 37

SoK: Quantifying Cyber Risk
Daniel Woods, Rainer Böhme
2022 IEEE Symposium on Security and Privacy (SP) (2021), pp. 211-228
Open Access | Times Cited: 36

Infection Risk Prediction and Management
Leyla Bilge, Savino Dambra
(2025), pp. 1200-1204
Closed Access

The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle.
Omar Alrawi, Charles Lever, Kevin Valakuzhy, et al.
(2021), pp. 3505-3522
Closed Access | Times Cited: 18

Shallow or Deep? An Empirical Study on Detecting Vulnerabilities using Deep Learning
Alejandro Mazuera-Rozo, Anamaria Mojica-Hanke, Mario Linares‐Vásquez, et al.
(2021), pp. 276-287
Open Access | Times Cited: 16

The Work‐Averse Cyberattacker Model: Theory and Evidence from Two Million Attack Signatures
Luca Allodi, Fabio Massacci, Julian Williams
Risk Analysis (2021) Vol. 42, Iss. 8, pp. 1623-1642
Open Access | Times Cited: 15

Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships
Iskander Sánchez-Rola, Matteo Dell’Amico, Davide Balzarotti, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2021), pp. 1990-2004
Open Access | Times Cited: 15

An Analysis of Malware Trends in Enterprise Networks
Abbas Acar, Long Lu, A. Selcuk Uluagac, et al.
Lecture notes in computer science (2019), pp. 360-380
Closed Access | Times Cited: 17

Network Intrusion Detection in Encrypted Traffic
Eva Papadogiannaki, Giorgos Tsirantonakis, Sotiris Ioannidis
(2022), pp. 1-8
Closed Access | Times Cited: 9

KShot: Live Kernel Patching with SMM and SGX
Lei Zhou, Fengwei Zhang, Jinghui Liao, et al.
(2020), pp. 1-13
Closed Access | Times Cited: 13

Software Updates Strategies: A Quantitative Evaluation Against Advanced Persistent Threats
Giorgio Di Tizio, Michele Armellini, Fabio Massacci
IEEE Transactions on Software Engineering (2022) Vol. 49, Iss. 3, pp. 1359-1373
Open Access | Times Cited: 8

Trends in Ransomware Attacks: Analysis and Future Predictions
Vaibhav Malik, Anirudh Khanna, Nandan Sharma, et al.
(2024)
Open Access | Times Cited: 1

Work Experience as a Factor in Cyber-Security Risk Awareness: A Survey Study with University Students
Tibor Pósa, Jens Großklags
Journal of Cybersecurity and Privacy (2022) Vol. 2, Iss. 3, pp. 490-515
Open Access | Times Cited: 7

Vestige: Identifying Binary Code Provenance for Vulnerability Detection
Yuede Ji, Lei Cui, H. Howie Huang
Lecture notes in computer science (2021), pp. 287-310
Closed Access | Times Cited: 8

No One Drinks From the Firehose: How Organizations Filter and Prioritize Vulnerability Information
Stephanie de Smale, Rik van Dijk, Xander Bouwman, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2023)
Open Access | Times Cited: 3

View from Above: Exploring the Malware Ecosystem from the Upper DNS Hierarchy
Aaron Faulkenberry, Athanasios Avgetidis, Zane Ma, et al.
(2022), pp. 240-250
Open Access | Times Cited: 4

MORTON: Detection of Malicious Routines in Large-Scale DNS Traffic
Yael Daihes, Hen Tzaban, Asaf Nadler, et al.
Lecture notes in computer science (2021), pp. 736-756
Closed Access | Times Cited: 4

FASHION: Functional and Attack Graph Secured HybrId Optimization of Virtualized Networks
Devon Callahan, Timothy Curry, Hazel Davidson, et al.
IEEE Transactions on Dependable and Secure Computing (2022) Vol. 20, Iss. 4, pp. 3093-3109
Open Access | Times Cited: 3

Crowdsourcing Malware Family Annotation: Joint Class-Determined Tag Extraction and Weakly-Tagged Sample Inference
Yongkang Jiang, Gaolei Li, Shenghong Li, et al.
IEEE Transactions on Network and Service Management (2024) Vol. 21, Iss. 4, pp. 4763-4776
Closed Access

Web of shadows: Investigating malware abuse of internet services
Mauro Allegretta, Giuseppe Siracusano, Roberto González, et al.
Computers & Security (2024) Vol. 149, pp. 104182-104182
Open Access

TagClass: A Tool for Extracting Class-Determined Tags from Massive Malware Labels via Incremental Parsing
Yongkang Jiang, Gaolei Li, Shenghong Li
(2023), pp. 193-200
Closed Access | Times Cited: 1

MORTON: Detection of Malicious Routines in Large-Scale DNS Traffic
Hen Tzaban, Asaf Nadler, Yael Daihes, et al.
arXiv (Cornell University) (2020)
Closed Access | Times Cited: 2

On-premises Analysis of Advanced Threat Prevention Appliances
Akira Fujita, Tao Ban, Takeshi Takahashi, et al.
(2021), pp. 1-8
Closed Access | Times Cited: 2

Page 1 - Next Page

Scroll to top