OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Defining Second Generation Open Source Intelligence (OSINT) for the Defense Enterprise
Heather Williams, Ilana Blum
RAND Corporation eBooks (2018)
Closed Access | Times Cited: 84

Showing 1-25 of 84 citing articles:

The Not Yet Exploited Goldmine of OSINT: Opportunities, Open Challenges and Future Trends
Javier Pastor-Galindo, Pantaleone Nespoli, Félix Gómez Mármol, et al.
IEEE Access (2020) Vol. 8, pp. 10282-10304
Open Access | Times Cited: 126

Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security
Ashok Yadav, Atul Kumar, Vrijendra Singh
Artificial Intelligence Review (2023) Vol. 56, Iss. 11, pp. 12407-12438
Open Access | Times Cited: 20

A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications
Thomas Browne, Mohammad Z. Abedin, Mohammad Jabed Morshed Chowdhury
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2911-2938
Open Access | Times Cited: 7

The Yom Kippur intelligence failure after fifty years: what lessons can be learned?
Itai Shapira
Intelligence & National Security (2023) Vol. 38, Iss. 6, pp. 978-1002
Open Access | Times Cited: 16

Values and Value Conflicts in the Context of OSINT Technologies for Cybersecurity Incident Response: A Value Sensitive Design Perspective
Thea Riebe, Julian Bäumler, Marc‐André Kaufhold, et al.
Computer Supported Cooperative Work (CSCW) (2023) Vol. 33, Iss. 2, pp. 205-251
Open Access | Times Cited: 15

Generative Artificial Intelligence Techniques for Modelling Open Source Threat Intelligence Verticals
Cong Hou, Yuyue Su, Qi Tian, et al.
Lecture notes in electrical engineering (2025), pp. 296-305
Closed Access

Extracting Cyber Threat Intelligence from Social Media with Case Studies in Twitter/$$\mathbb {X}$$ and Reddit
Dainora Jakstaite, Ricardo M. Czekster
Lecture notes in computer science (2025), pp. 46-65
Closed Access

Develop Data Collection Strategies
Adrian Wolfberg
(2025), pp. 265-283
Closed Access

The new power model and United States national defence agility
Kurt W. Jefferson, Stephen M. Willis
Security and Defence Quarterly (2025)
Open Access

Open source intelligence and AI: a systematic review of the GELSI literature
Riccardo Ghioni, Mariarosaria Taddeo, Luciano Floridi
AI & Society (2023) Vol. 39, Iss. 4, pp. 1827-1842
Open Access | Times Cited: 9

El sistema de inteligencia criminal ante las nuevas amenazas y oportunidades del ciberespacio
Claudio Payá Santos, J Juarez
Revista Científica General José María Córdova (2021) Vol. 19, Iss. 36, pp. 1121-1136
Open Access | Times Cited: 13

Open-Source Intelligence Educational Resources: A Visual Perspective Analysis
Jhon Francined Herrera Cubides, Paulo Alonso Gaona-García, Salvador Sánchez‐Alonso
Applied Sciences (2020) Vol. 10, Iss. 21, pp. 7617-7617
Open Access | Times Cited: 14

IoTSE-based open database vulnerability inspection in three Baltic countries: ShoBEVODSDT sees you
Artjoms Daskevics, Anastasija Nikiforova
(2021), pp. 1-8
Closed Access | Times Cited: 12

Open Source Intelligence (OSINT): issues and trends
Tomislav Dokman, Tomislav Ivanjko
Deleted Journal (2020)
Open Access | Times Cited: 12

Open-source intelligence and research on online terrorist communication: Identifying ethical and security dilemmas
Miron Lakomy
Media War & Conflict (2023) Vol. 17, Iss. 1, pp. 23-40
Closed Access | Times Cited: 4

CoSINT: Designing a Collaborative Capture the Flag Competition to Investigate Misinformation
Sukrit Venkatagiri, Anirban Mukhopadhyay, David Hicks, et al.
(2023), pp. 2551-2572
Open Access | Times Cited: 4

Identifying Large Young Hacker Concentration in Indonesia
Onno W. Purbo, Prasetyo Purnomo, Dimaz Arno Prasetio, et al.
Journal of Internet Services and Information Security (2024) Vol. 14, Iss. 1, pp. 52-63
Open Access | Times Cited: 1

An NLP‐Based Framework to Spot Extremist Networks in Social Media
Andrés Zapata Rozo, Daniel Díaz López, Javier Pastor-Galindo, et al.
Complexity (2024) Vol. 2024, Iss. 1
Open Access | Times Cited: 1

Study on application of open source intelligence from social media in the military
Young Ji Ju, Q Li, Haiyang Liu, et al.
Journal of Physics Conference Series (2020) Vol. 1507, Iss. 5, pp. 052017-052017
Open Access | Times Cited: 9

Adding value to the intelligence community: what role for expert external advice?
Robert Dover
Intelligence & National Security (2020) Vol. 35, Iss. 6, pp. 852-869
Open Access | Times Cited: 9

Page 1 - Next Page

Scroll to top