
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Malware Detection Using Memory Analysis Data in Big Data Environment
Murat Dener, Gökçe Ok, Abdullah Orman
Applied Sciences (2022) Vol. 12, Iss. 17, pp. 8604-8604
Open Access | Times Cited: 47
Murat Dener, Gökçe Ok, Abdullah Orman
Applied Sciences (2022) Vol. 12, Iss. 17, pp. 8604-8604
Open Access | Times Cited: 47
Showing 26-50 of 47 citing articles:
Feature Selection-Based Machine Learning Model for Malware Detection
Lubna Javaid Haji, Sudesh Kumar
Signals and communication technology (2024), pp. 509-520
Closed Access
Lubna Javaid Haji, Sudesh Kumar
Signals and communication technology (2024), pp. 509-520
Closed Access
Reinterpreting usability of semantic segmentation approach for darknet traffic analysis
Anzhelika Mezina, Radim Bürget, Aleksandr Ometov
Computer Networks (2024) Vol. 249, pp. 110493-110493
Open Access
Anzhelika Mezina, Radim Bürget, Aleksandr Ometov
Computer Networks (2024) Vol. 249, pp. 110493-110493
Open Access
Effective Machine Leaning Based Malware detection and Classification Using Improved Voting Method based Decision Tree
Potu Narayana, Hassan M. Al–Jawahry, Arvind Kumar G, et al.
(2024), pp. 1-4
Closed Access
Potu Narayana, Hassan M. Al–Jawahry, Arvind Kumar G, et al.
(2024), pp. 1-4
Closed Access
Victimization (V) of Big Data: A Solution Using Federated Learning
S. Shivkumar, M. H. Supriya
Lecture notes in networks and systems (2024), pp. 171-182
Closed Access
S. Shivkumar, M. H. Supriya
Lecture notes in networks and systems (2024), pp. 171-182
Closed Access
Explainable Obfuscated Memory Malware Detector Using Sparse Projections with Isolated Family Distinction Paradigm
S P Sharmila, Shubham Gupta, Aruna Tiwari, et al.
(2024)
Closed Access
S P Sharmila, Shubham Gupta, Aruna Tiwari, et al.
(2024)
Closed Access
A Lightweight Obfuscated Malware Multi-class Classifier for IoT Using Machine Learning
William Cassel, Nahid Ebrahimi Majd
2016 International Conference on Computing, Networking and Communications (ICNC) (2024), pp. 239-243
Closed Access
William Cassel, Nahid Ebrahimi Majd
2016 International Conference on Computing, Networking and Communications (ICNC) (2024), pp. 239-243
Closed Access
Imperceptible Trojan Attacks to the Graph-based Big Data Processing in Smart Society
Jun Zhou, Masaaki Kondo
IEICE Transactions on Information and Systems (2024)
Open Access
Jun Zhou, Masaaki Kondo
IEICE Transactions on Information and Systems (2024)
Open Access
Detection and Analysis of Malicious Software Using Machine Learning Models
A. Ozturk, Selman Hızal
Sakarya University Journal of Computer and Information Sciences (2024) Vol. 7, Iss. 2, pp. 264-276
Open Access
A. Ozturk, Selman Hızal
Sakarya University Journal of Computer and Information Sciences (2024) Vol. 7, Iss. 2, pp. 264-276
Open Access
An intrusion detection model to detect zero-day attacks in unseen data using machine learning
Zhen Dai, Lip Yee Por, Yen‐Lin Chen, et al.
PLoS ONE (2024) Vol. 19, Iss. 9, pp. e0308469-e0308469
Open Access
Zhen Dai, Lip Yee Por, Yen‐Lin Chen, et al.
PLoS ONE (2024) Vol. 19, Iss. 9, pp. e0308469-e0308469
Open Access
Applications of Fuzzy Logic and Probabilistic Neural Networks in E-Service for Malware Detection
Kristijan Kuk, Aleksandar Stanojević, Petar Čisar, et al.
Axioms (2024) Vol. 13, Iss. 9, pp. 624-624
Open Access
Kristijan Kuk, Aleksandar Stanojević, Petar Čisar, et al.
Axioms (2024) Vol. 13, Iss. 9, pp. 624-624
Open Access
Comprehensive Ransomware Detection: Optimization of Feature Selection through Machine Learning Algorithms and Explainable AI on Memory Analysis
Lucas Leonel, Diego Nunes Molinos, Rodrigo Sanches Miani
(2024), pp. 123-138
Closed Access
Lucas Leonel, Diego Nunes Molinos, Rodrigo Sanches Miani
(2024), pp. 123-138
Closed Access
Advancing Malware Detection Using Memory Analysis and Explainable AI Approach
C.P. Ravikumar, J. Manoranjini, Smita Pallavi, et al.
(2024), pp. 518-523
Closed Access
C.P. Ravikumar, J. Manoranjini, Smita Pallavi, et al.
(2024), pp. 518-523
Closed Access
Model Proposal for Malware Detection Using Deep Learning on Cell Phones with Android Operating System
David H. Silvera, Pedro I. Molina, Wilfredo Ticona
Lecture notes in networks and systems (2024), pp. 251-268
Closed Access
David H. Silvera, Pedro I. Molina, Wilfredo Ticona
Lecture notes in networks and systems (2024), pp. 251-268
Closed Access
Enhancing ransomware defense: deep learning-based detection and family-wise classification of evolving threats
Amjad Hussain, Ayesha Saadia, Musaed Alhussein, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2546-e2546
Open Access
Amjad Hussain, Ayesha Saadia, Musaed Alhussein, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2546-e2546
Open Access
Artificial Intelligence Integration For Extension Of Big Data For Decision-Making
Khaoula Fatnassi, Sahbi Zahaf, Faı̈ez Gargouri
Future Generation Computer Systems (2024), pp. 107635-107635
Closed Access
Khaoula Fatnassi, Sahbi Zahaf, Faı̈ez Gargouri
Future Generation Computer Systems (2024), pp. 107635-107635
Closed Access
Makine Öğrenmesi Yöntemleri Kullanılarak Kötü Amaçlı Yazılım Sınıflandırması: CIC-MamMem-2022 Veri Kümesi Üzerinde Bir Performans Karşılaştırması
Oğuzhan Kırlar, Gamze Peksöz Akın, Meltem Kurt Pehli̇vanoğlu
Bilgisayar bilimleri ve mühendisliği dergisi. (2024) Vol. 17, Iss. 2, pp. 165-173
Closed Access
Oğuzhan Kırlar, Gamze Peksöz Akın, Meltem Kurt Pehli̇vanoğlu
Bilgisayar bilimleri ve mühendisliği dergisi. (2024) Vol. 17, Iss. 2, pp. 165-173
Closed Access
Detecting new obfuscated malware variants: A lightweight and interpretable machine learning approach
Oladipo A. Madamidola, Felix Ngobigha, Adnane Ez‐zizi
Intelligent Systems with Applications (2024), pp. 200472-200472
Open Access
Oladipo A. Madamidola, Felix Ngobigha, Adnane Ez‐zizi
Intelligent Systems with Applications (2024), pp. 200472-200472
Open Access
Malware Detection in Forensic Memory Dumps: The Use of Deep Meta-Learning Models
Yalçın Özkan
Acta Infologica (2023) Vol. 7, Iss. 1, pp. 165-172
Open Access | Times Cited: 1
Yalçın Özkan
Acta Infologica (2023) Vol. 7, Iss. 1, pp. 165-172
Open Access | Times Cited: 1
Intensive Malware Detection Approach based on Data Mining
Israa Ezzat Salem, Karim Hashim Al-Saedi
Journal of Applied Engineering and Technological Science (JAETS) (2023) Vol. 5, Iss. 1, pp. 414-424
Open Access | Times Cited: 1
Israa Ezzat Salem, Karim Hashim Al-Saedi
Journal of Applied Engineering and Technological Science (JAETS) (2023) Vol. 5, Iss. 1, pp. 414-424
Open Access | Times Cited: 1
From Pixels to Insights: Image Datasets for AI/ML in Software-Defined Networking
Pranav Pant, Rishikant Mallick, Santosh Kumar Sahu, et al.
(2023), pp. 903-908
Closed Access | Times Cited: 1
Pranav Pant, Rishikant Mallick, Santosh Kumar Sahu, et al.
(2023), pp. 903-908
Closed Access | Times Cited: 1
Conversion of 1D Data Used in Detection of Malware Types to 2D Barcode Types and Analysis with Deep Networks
Mesut Toğaçar
Mühendislik Bilimleri ve Araştırmaları Dergisi (2023) Vol. 5, Iss. 1, pp. 169-177
Open Access
Mesut Toğaçar
Mühendislik Bilimleri ve Araştırmaları Dergisi (2023) Vol. 5, Iss. 1, pp. 169-177
Open Access
Prevention of Kernel Rootkit in Cloud Computing
S Suresh Kumar, A Ponni Valavan, V Prathiksha
2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS) (2023), pp. 732-739
Closed Access
S Suresh Kumar, A Ponni Valavan, V Prathiksha
2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS) (2023), pp. 732-739
Closed Access
AI for Cybersecurity: Robust models for Authentication, Threat and Anomaly Detection
Francesco Bergadano, Giorgio Giacinto, Olga Tushkanova, et al.
MDPI eBooks (2023)
Open Access
Francesco Bergadano, Giorgio Giacinto, Olga Tushkanova, et al.
MDPI eBooks (2023)
Open Access
Enhancing Efficiency and Privacy in Memory-Based Malware Classification Through Feature Selection
Salim Sazzed, Sharif Ullah
(2023), pp. 550-557
Open Access
Salim Sazzed, Sharif Ullah
(2023), pp. 550-557
Open Access