
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Defining Second Generation Open Source Intelligence (OSINT) for the Defense Enterprise
Heather Williams, Ilana Blum
RAND Corporation eBooks (2018)
Closed Access | Times Cited: 84
Heather Williams, Ilana Blum
RAND Corporation eBooks (2018)
Closed Access | Times Cited: 84
Showing 1-25 of 84 citing articles:
The Not Yet Exploited Goldmine of OSINT: Opportunities, Open Challenges and Future Trends
Javier Pastor-Galindo, Pantaleone Nespoli, Félix Gómez Mármol, et al.
IEEE Access (2020) Vol. 8, pp. 10282-10304
Open Access | Times Cited: 126
Javier Pastor-Galindo, Pantaleone Nespoli, Félix Gómez Mármol, et al.
IEEE Access (2020) Vol. 8, pp. 10282-10304
Open Access | Times Cited: 126
Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security
Ashok Yadav, Atul Kumar, Vrijendra Singh
Artificial Intelligence Review (2023) Vol. 56, Iss. 11, pp. 12407-12438
Open Access | Times Cited: 20
Ashok Yadav, Atul Kumar, Vrijendra Singh
Artificial Intelligence Review (2023) Vol. 56, Iss. 11, pp. 12407-12438
Open Access | Times Cited: 20
A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications
Thomas Browne, Mohammad Z. Abedin, Mohammad Jabed Morshed Chowdhury
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2911-2938
Open Access | Times Cited: 7
Thomas Browne, Mohammad Z. Abedin, Mohammad Jabed Morshed Chowdhury
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2911-2938
Open Access | Times Cited: 7
The Yom Kippur intelligence failure after fifty years: what lessons can be learned?
Itai Shapira
Intelligence & National Security (2023) Vol. 38, Iss. 6, pp. 978-1002
Open Access | Times Cited: 16
Itai Shapira
Intelligence & National Security (2023) Vol. 38, Iss. 6, pp. 978-1002
Open Access | Times Cited: 16
Values and Value Conflicts in the Context of OSINT Technologies for Cybersecurity Incident Response: A Value Sensitive Design Perspective
Thea Riebe, Julian Bäumler, Marc‐André Kaufhold, et al.
Computer Supported Cooperative Work (CSCW) (2023) Vol. 33, Iss. 2, pp. 205-251
Open Access | Times Cited: 15
Thea Riebe, Julian Bäumler, Marc‐André Kaufhold, et al.
Computer Supported Cooperative Work (CSCW) (2023) Vol. 33, Iss. 2, pp. 205-251
Open Access | Times Cited: 15
Generative Artificial Intelligence Techniques for Modelling Open Source Threat Intelligence Verticals
Cong Hou, Yuyue Su, Qi Tian, et al.
Lecture notes in electrical engineering (2025), pp. 296-305
Closed Access
Cong Hou, Yuyue Su, Qi Tian, et al.
Lecture notes in electrical engineering (2025), pp. 296-305
Closed Access
Extracting Cyber Threat Intelligence from Social Media with Case Studies in Twitter/$$\mathbb {X}$$ and Reddit
Dainora Jakstaite, Ricardo M. Czekster
Lecture notes in computer science (2025), pp. 46-65
Closed Access
Dainora Jakstaite, Ricardo M. Czekster
Lecture notes in computer science (2025), pp. 46-65
Closed Access
The new power model and United States national defence agility
Kurt W. Jefferson, Stephen M. Willis
Security and Defence Quarterly (2025)
Open Access
Kurt W. Jefferson, Stephen M. Willis
Security and Defence Quarterly (2025)
Open Access
OSINT Clinic: Co-designing AI-Augmented Collaborative OSINT Investigations for Vulnerability Assessment
Anirban Mukhopadhyay, Kurt Luther
(2025), pp. 1-22
Closed Access
Anirban Mukhopadhyay, Kurt Luther
(2025), pp. 1-22
Closed Access
Open source intelligence and AI: a systematic review of the GELSI literature
Riccardo Ghioni, Mariarosaria Taddeo, Luciano Floridi
AI & Society (2023) Vol. 39, Iss. 4, pp. 1827-1842
Open Access | Times Cited: 9
Riccardo Ghioni, Mariarosaria Taddeo, Luciano Floridi
AI & Society (2023) Vol. 39, Iss. 4, pp. 1827-1842
Open Access | Times Cited: 9
El sistema de inteligencia criminal ante las nuevas amenazas y oportunidades del ciberespacio
Claudio Payá Santos, J Juarez
Revista Científica General José María Córdova (2021) Vol. 19, Iss. 36, pp. 1121-1136
Open Access | Times Cited: 13
Claudio Payá Santos, J Juarez
Revista Científica General José María Córdova (2021) Vol. 19, Iss. 36, pp. 1121-1136
Open Access | Times Cited: 13
Open-Source Intelligence Educational Resources: A Visual Perspective Analysis
Jhon Francined Herrera Cubides, Paulo Alonso Gaona-García, Salvador Sánchez‐Alonso
Applied Sciences (2020) Vol. 10, Iss. 21, pp. 7617-7617
Open Access | Times Cited: 14
Jhon Francined Herrera Cubides, Paulo Alonso Gaona-García, Salvador Sánchez‐Alonso
Applied Sciences (2020) Vol. 10, Iss. 21, pp. 7617-7617
Open Access | Times Cited: 14
IoTSE-based open database vulnerability inspection in three Baltic countries: ShoBEVODSDT sees you
Artjoms Daskevics, Anastasija Nikiforova
(2021), pp. 1-8
Closed Access | Times Cited: 12
Artjoms Daskevics, Anastasija Nikiforova
(2021), pp. 1-8
Closed Access | Times Cited: 12
The untamed and discreet role of data brokers in surveillance capitalism: a transnational and interdisciplinary overview
Urbano Reviglio
Internet Policy Review (2022) Vol. 11, Iss. 3
Open Access | Times Cited: 9
Urbano Reviglio
Internet Policy Review (2022) Vol. 11, Iss. 3
Open Access | Times Cited: 9
Open Source Intelligence (OSINT): issues and trends
Tomislav Dokman, Tomislav Ivanjko
Deleted Journal (2020)
Open Access | Times Cited: 12
Tomislav Dokman, Tomislav Ivanjko
Deleted Journal (2020)
Open Access | Times Cited: 12
ShoBeVODSDT: Shodan and Binary Edge based vulnerable open data sources detection tool or what Internet of Things Search Engines know about you
Artjoms Daskevics, Anastasija Nikiforova
(2021), pp. 38-45
Closed Access | Times Cited: 11
Artjoms Daskevics, Anastasija Nikiforova
(2021), pp. 38-45
Closed Access | Times Cited: 11
Open-source intelligence and research on online terrorist communication: Identifying ethical and security dilemmas
Miron Lakomy
Media War & Conflict (2023) Vol. 17, Iss. 1, pp. 23-40
Closed Access | Times Cited: 4
Miron Lakomy
Media War & Conflict (2023) Vol. 17, Iss. 1, pp. 23-40
Closed Access | Times Cited: 4
CoSINT: Designing a Collaborative Capture the Flag Competition to Investigate Misinformation
Sukrit Venkatagiri, Anirban Mukhopadhyay, David Hicks, et al.
(2023), pp. 2551-2572
Open Access | Times Cited: 4
Sukrit Venkatagiri, Anirban Mukhopadhyay, David Hicks, et al.
(2023), pp. 2551-2572
Open Access | Times Cited: 4
Identifying Large Young Hacker Concentration in Indonesia
Onno W. Purbo, Prasetyo Purnomo, Dimaz Arno Prasetio, et al.
Journal of Internet Services and Information Security (2024) Vol. 14, Iss. 1, pp. 52-63
Open Access | Times Cited: 1
Onno W. Purbo, Prasetyo Purnomo, Dimaz Arno Prasetio, et al.
Journal of Internet Services and Information Security (2024) Vol. 14, Iss. 1, pp. 52-63
Open Access | Times Cited: 1
An NLP‐Based Framework to Spot Extremist Networks in Social Media
Andrés Zapata Rozo, Daniel Díaz López, Javier Pastor-Galindo, et al.
Complexity (2024) Vol. 2024, Iss. 1
Open Access | Times Cited: 1
Andrés Zapata Rozo, Daniel Díaz López, Javier Pastor-Galindo, et al.
Complexity (2024) Vol. 2024, Iss. 1
Open Access | Times Cited: 1
In the digital trenches: Mapping the structure and evolution of the Islamic State’s information ecosystem (2023–2024)
Miron Lakomy
Media War & Conflict (2024)
Closed Access | Times Cited: 1
Miron Lakomy
Media War & Conflict (2024)
Closed Access | Times Cited: 1
SOD2G: A Study on a Social-Engineering Organizational Defensive Deception Game Framework through Optimization of Spatiotemporal MTD and Decoy Conflict
Sang Seo, Dohoon Kim
Electronics (2021) Vol. 10, Iss. 23, pp. 3012-3012
Open Access | Times Cited: 9
Sang Seo, Dohoon Kim
Electronics (2021) Vol. 10, Iss. 23, pp. 3012-3012
Open Access | Times Cited: 9
Study on application of open source intelligence from social media in the military
Young Ji Ju, Q Li, Haiyang Liu, et al.
Journal of Physics Conference Series (2020) Vol. 1507, Iss. 5, pp. 052017-052017
Open Access | Times Cited: 9
Young Ji Ju, Q Li, Haiyang Liu, et al.
Journal of Physics Conference Series (2020) Vol. 1507, Iss. 5, pp. 052017-052017
Open Access | Times Cited: 9
Adding value to the intelligence community: what role for expert external advice?
Robert Dover
Intelligence & National Security (2020) Vol. 35, Iss. 6, pp. 852-869
Open Access | Times Cited: 9
Robert Dover
Intelligence & National Security (2020) Vol. 35, Iss. 6, pp. 852-869
Open Access | Times Cited: 9