
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
FeedRank: A tamper- resistant method for the ranking of cyber threat intelligence feeds
Roland Meier, Cornelia Scherrer, David Gugelmann, et al.
(2018)
Closed Access | Times Cited: 25
Roland Meier, Cornelia Scherrer, David Gugelmann, et al.
(2018)
Closed Access | Times Cited: 25
Showing 25 citing articles:
A Quantitative Evaluation of Trust in the Quality of Cyber Threat Intelligence Sources
Thomas Schaberreiter, Veronika Kupfersberger, Konstantinos Rantos, et al.
Proceedings of the 17th International Conference on Availability, Reliability and Security (2019), pp. 1-10
Closed Access | Times Cited: 43
Thomas Schaberreiter, Veronika Kupfersberger, Konstantinos Rantos, et al.
Proceedings of the 17th International Conference on Availability, Reliability and Security (2019), pp. 1-10
Closed Access | Times Cited: 43
Blockchain-Based Cyber Threat Intelligence System Architecture for Sustainable Computing
Jeonghun Cha, Sushil Kumar Singh, Yi Pan, et al.
Sustainability (2020) Vol. 12, Iss. 16, pp. 6401-6401
Open Access | Times Cited: 36
Jeonghun Cha, Sushil Kumar Singh, Yi Pan, et al.
Sustainability (2020) Vol. 12, Iss. 16, pp. 6401-6401
Open Access | Times Cited: 36
SoK: The Impact of Unlabelled Data in Cyberthreat Detection
Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova
(2022), pp. 20-42
Open Access | Times Cited: 22
Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova
(2022), pp. 20-42
Open Access | Times Cited: 22
CARIOCA: prioritizing the use of IoC by threats assessment shared on the MISP platform
Piero Delvecchio, Stefano Galantucci, Andrea Iannacone, et al.
International Journal of Information Security (2025) Vol. 24, Iss. 2
Open Access
Piero Delvecchio, Stefano Galantucci, Andrea Iannacone, et al.
International Journal of Information Security (2025) Vol. 24, Iss. 2
Open Access
Cybersecurity Techniques, Emerging Threats, and Industry Responses
Momo A. Tulay, Samuel Olatunbosun
Communications in computer and information science (2025), pp. 336-353
Closed Access
Momo A. Tulay, Samuel Olatunbosun
Communications in computer and information science (2025), pp. 336-353
Closed Access
A different cup of {TI}? The added value of commercial threat intelligence
Xander Bouwman, Harm Griffioen, Jelle Egbers, et al.
USENIX Security Symposium (2020), pp. 433-450
Closed Access | Times Cited: 28
Xander Bouwman, Harm Griffioen, Jelle Egbers, et al.
USENIX Security Symposium (2020), pp. 433-450
Closed Access | Times Cited: 28
Blockchain-Based Cyber Threat Intelligence Sharing Using Proof-of-Quality Consensus
Dimitrios Chatziamanetoglou, Konstantinos Rantos
Security and Communication Networks (2023) Vol. 2023, pp. 1-20
Open Access | Times Cited: 10
Dimitrios Chatziamanetoglou, Konstantinos Rantos
Security and Communication Networks (2023) Vol. 2023, pp. 1-20
Open Access | Times Cited: 10
Customer-oriented ranking of cyber threat intelligence service providers
Umara Noor, Zahid Anwar, Jörn Altmann, et al.
Electronic Commerce Research and Applications (2020) Vol. 41, pp. 100976-100976
Closed Access | Times Cited: 16
Umara Noor, Zahid Anwar, Jörn Altmann, et al.
Electronic Commerce Research and Applications (2020) Vol. 41, pp. 100976-100976
Closed Access | Times Cited: 16
Sharing Is Caring: Hurdles and Prospects of Open, Crowd-Sourced Cyber Threat Intelligence
Vítor Jesus, Balraj Bains, Victor Chang
IEEE Transactions on Engineering Management (2023) Vol. 71, pp. 6854-6873
Open Access | Times Cited: 6
Vítor Jesus, Balraj Bains, Victor Chang
IEEE Transactions on Engineering Management (2023) Vol. 71, pp. 6854-6873
Open Access | Times Cited: 6
Cuckoo’s Malware Threat Scoring and Classification: Friend or Foe?
Aaron Walker, Muhammad Faisal Amjad, Shamik Sengupta
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) (2019), pp. 0678-0684
Closed Access | Times Cited: 16
Aaron Walker, Muhammad Faisal Amjad, Shamik Sengupta
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) (2019), pp. 0678-0684
Closed Access | Times Cited: 16
SCERM—A novel framework for automated management of cyber threat response activities
Zafar Iqbal, Zahid Anwar
Future Generation Computer Systems (2020) Vol. 108, pp. 687-708
Closed Access | Times Cited: 14
Zafar Iqbal, Zahid Anwar
Future Generation Computer Systems (2020) Vol. 108, pp. 687-708
Closed Access | Times Cited: 14
A Methodology for Developing & Assessing CTI Quality Metrics
Georgios Sakellariou, Panagiotis Fouliras, Ioannis Mavridis
IEEE Access (2024) Vol. 12, pp. 6225-6238
Open Access | Times Cited: 1
Georgios Sakellariou, Panagiotis Fouliras, Ioannis Mavridis
IEEE Access (2024) Vol. 12, pp. 6225-6238
Open Access | Times Cited: 1
Threat Intelligence Quality Dimensions for Research and Practice
Adam Zibak, Clemens Sauerwein, Andrew Simpson
Digital Threats Research and Practice (2021) Vol. 3, Iss. 4, pp. 1-22
Open Access | Times Cited: 10
Adam Zibak, Clemens Sauerwein, Andrew Simpson
Digital Threats Research and Practice (2021) Vol. 3, Iss. 4, pp. 1-22
Open Access | Times Cited: 10
A Comprehensive Dynamic Quality Assessment Method for Cyber Threat Intelligence
Menghan Wang, Libin Yang, Wei Lou
(2022), pp. 178-181
Closed Access | Times Cited: 3
Menghan Wang, Libin Yang, Wei Lou
(2022), pp. 178-181
Closed Access | Times Cited: 3
Agriculture 4.0 and Beyond: Evaluating Cyber Threat Intelligence Sources and Techniques in Smart Farming Ecosystems
Hang Thanh Bui, Dr Hamed Aboutorab, Dr Arash Mahboubi, et al.
(2024)
Closed Access
Hang Thanh Bui, Dr Hamed Aboutorab, Dr Arash Mahboubi, et al.
(2024)
Closed Access
Improving Quality of Indicators of Compromise Using Stix Graphs
Sheng-Shan Chen, Ren‐Hung Hwang, Asad Ali, et al.
(2024)
Closed Access
Sheng-Shan Chen, Ren‐Hung Hwang, Asad Ali, et al.
(2024)
Closed Access
TIPCE: A Longitudinal Threat Intelligence Platform Comprehensiveness Analysis
Kiavash Satvat, Rigel Gjomemo, V. N. Venkatakrishnan
(2024)
Closed Access
Kiavash Satvat, Rigel Gjomemo, V. N. Venkatakrishnan
(2024)
Closed Access
Building Collaborative Cybersecurity for Critical Infrastructure Protection: Empirical Evidence of Collective Intelligence Information Sharing Dynamics on ThreatFox
Eric Jollès, Sébastien Gillard, Dimitri Percia David, et al.
Lecture notes in computer science (2023), pp. 140-157
Open Access | Times Cited: 1
Eric Jollès, Sébastien Gillard, Dimitri Percia David, et al.
Lecture notes in computer science (2023), pp. 140-157
Open Access | Times Cited: 1
Ten AI Stepping Stones for Cybersecurity
Ricardo Morla
arXiv (Cornell University) (2019)
Open Access | Times Cited: 2
Ricardo Morla
arXiv (Cornell University) (2019)
Open Access | Times Cited: 2
Efficient Data Noise-Reduction for Cyber Threat Intelligence System
Seonghyeon Gong, Changhoon Lee
Lecture notes in electrical engineering (2021), pp. 591-597
Closed Access | Times Cited: 2
Seonghyeon Gong, Changhoon Lee
Lecture notes in electrical engineering (2021), pp. 591-597
Closed Access | Times Cited: 2
A multi-dimensional spam filtering framework based on threat intelligence
Xiaopeng Tian, Di Tang
(2019) Vol. 12, pp. 158-162
Closed Access | Times Cited: 1
Xiaopeng Tian, Di Tang
(2019) Vol. 12, pp. 158-162
Closed Access | Times Cited: 1
Reducing Time to Response in Cyber Defense: An Agent-based Model
Sébastien Gillard, Thomas Maillart, Marcus Matthias Keupp
International series in management science/operations research/International series in operations research & management science (2023), pp. 11-25
Closed Access
Sébastien Gillard, Thomas Maillart, Marcus Matthias Keupp
International series in management science/operations research/International series in operations research & management science (2023), pp. 11-25
Closed Access
Defining Metrics for Comparing Threat Intelligence Solutions Through the Lens of the Analyst
Alexander Plaza, Thaier Hayajneh
2022 IEEE 13th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) (2023), pp. 0192-0199
Closed Access
Alexander Plaza, Thaier Hayajneh
2022 IEEE 13th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) (2023), pp. 0192-0199
Closed Access
PROPOSTA DE MODELO DE REFERÊNCIA DE INTELIGÊNCIA DE AMEAÇAS
Bruce William Percílio Azevedo, William Ferreira Giozza, Fábio Lúcio Lópes de Mendonça, et al.
(2019), pp. 46-54
Open Access
Bruce William Percílio Azevedo, William Ferreira Giozza, Fábio Lúcio Lópes de Mendonça, et al.
(2019), pp. 46-54
Open Access
Revealing and Sharing Malware Profile Using Malware Threat Intelligence Platform
Faiz Iman Djufri, Charles Lim
ACMIT Proceedings (2021) Vol. 6, Iss. 1, pp. 72-82
Open Access
Faiz Iman Djufri, Charles Lim
ACMIT Proceedings (2021) Vol. 6, Iss. 1, pp. 72-82
Open Access