
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Image-Based Malware Classification Using VGG19 Network and Spatial Convolutional Attention
Mazhar Javed Awan, Osama Ahmed Masood, Mazin Abed Mohammed, et al.
Electronics (2021) Vol. 10, Iss. 19, pp. 2444-2444
Open Access | Times Cited: 102
Mazhar Javed Awan, Osama Ahmed Masood, Mazin Abed Mohammed, et al.
Electronics (2021) Vol. 10, Iss. 19, pp. 2444-2444
Open Access | Times Cited: 102
Showing 26-50 of 102 citing articles:
Detection of Android Malware in the Internet of Things through the K-Nearest Neighbor Algorithm
Himanshi Babbar, Shalli Rani, Dipak Kumar Sah, et al.
Sensors (2023) Vol. 23, Iss. 16, pp. 7256-7256
Open Access | Times Cited: 9
Himanshi Babbar, Shalli Rani, Dipak Kumar Sah, et al.
Sensors (2023) Vol. 23, Iss. 16, pp. 7256-7256
Open Access | Times Cited: 9
A Proposed New Endpoint Detection and Response With Image-Based Malware Detection System
Tran Hoang Hai, Vu Van Thieu, Tran Thai Duong, et al.
IEEE Access (2023) Vol. 11, pp. 122859-122875
Open Access | Times Cited: 9
Tran Hoang Hai, Vu Van Thieu, Tran Thai Duong, et al.
IEEE Access (2023) Vol. 11, pp. 122859-122875
Open Access | Times Cited: 9
An Attention Mechanism for Combination of CNN and VAE for Image-Based Malware Classification
Tuan Van Dao, Hiroshi Satō, Masao Kubo
IEEE Access (2022) Vol. 10, pp. 85127-85136
Open Access | Times Cited: 14
Tuan Van Dao, Hiroshi Satō, Masao Kubo
IEEE Access (2022) Vol. 10, pp. 85127-85136
Open Access | Times Cited: 14
E2E-RDS: Efficient End-to-End Ransomware Detection System Based on Static-Based ML and Vision-Based DL Approaches
Iman Almomani, Aala Alkhayer, Walid El‐Shafai
Sensors (2023) Vol. 23, Iss. 9, pp. 4467-4467
Open Access | Times Cited: 8
Iman Almomani, Aala Alkhayer, Walid El‐Shafai
Sensors (2023) Vol. 23, Iss. 9, pp. 4467-4467
Open Access | Times Cited: 8
Mitigating the Risks of Malware Attacks with Deep Learning Techniques
Abdullah Alnajim, Shabana Habib, Muhammad Islam, et al.
Electronics (2023) Vol. 12, Iss. 14, pp. 3166-3166
Open Access | Times Cited: 8
Abdullah Alnajim, Shabana Habib, Muhammad Islam, et al.
Electronics (2023) Vol. 12, Iss. 14, pp. 3166-3166
Open Access | Times Cited: 8
SAGMAD—A Signature Agnostic Malware Detection System Based on Binary Visualisation and Fuzzy Sets
Betty Saridou, Joseph Rose, Stavros Shiaeles, et al.
Electronics (2022) Vol. 11, Iss. 7, pp. 1044-1044
Open Access | Times Cited: 13
Betty Saridou, Joseph Rose, Stavros Shiaeles, et al.
Electronics (2022) Vol. 11, Iss. 7, pp. 1044-1044
Open Access | Times Cited: 13
Framing Network Flow for Anomaly Detection Using Image Recognition and Federated Learning
Jevgenijus Toldinas, Algimantas Venčkauskas, Agnius Liutkevičius, et al.
Electronics (2022) Vol. 11, Iss. 19, pp. 3138-3138
Open Access | Times Cited: 13
Jevgenijus Toldinas, Algimantas Venčkauskas, Agnius Liutkevičius, et al.
Electronics (2022) Vol. 11, Iss. 19, pp. 3138-3138
Open Access | Times Cited: 13
IoT threat mitigation engine empowered by artificial intelligence multi-objective optimization
Asterios Mpatziakas, Anastasios Drosou, Stavros Papadopoulos, et al.
Journal of Network and Computer Applications (2022) Vol. 203, pp. 103398-103398
Closed Access | Times Cited: 12
Asterios Mpatziakas, Anastasios Drosou, Stavros Papadopoulos, et al.
Journal of Network and Computer Applications (2022) Vol. 203, pp. 103398-103398
Closed Access | Times Cited: 12
Self-Attentive Models for Real-Time Malware Classification
Qikai Lu, Hongwen Zhang, Husam Kinawi, et al.
IEEE Access (2022) Vol. 10, pp. 95970-95985
Open Access | Times Cited: 12
Qikai Lu, Hongwen Zhang, Husam Kinawi, et al.
IEEE Access (2022) Vol. 10, pp. 95970-95985
Open Access | Times Cited: 12
FACILE: A capsule network with fewer capsules and richer hierarchical information for malware image classification
Binghui Zou, Chunjie Cao, Longjuan Wang, et al.
Computers & Security (2023) Vol. 137, pp. 103606-103606
Closed Access | Times Cited: 7
Binghui Zou, Chunjie Cao, Longjuan Wang, et al.
Computers & Security (2023) Vol. 137, pp. 103606-103606
Closed Access | Times Cited: 7
Securing Edge Devices: Malware Classification with Dual-Attention Deep Network
Gasim Alandjani
Applied Sciences (2024) Vol. 14, Iss. 11, pp. 4645-4645
Open Access | Times Cited: 2
Gasim Alandjani
Applied Sciences (2024) Vol. 14, Iss. 11, pp. 4645-4645
Open Access | Times Cited: 2
Pose Estimation of Driver’s Head Panning Based on Interpolation and Motion Vectors under a Boosting Framework
Syed Farooq Ali, Ahmed Sohail Aslam, Mazhar Javed Awan, et al.
Applied Sciences (2021) Vol. 11, Iss. 24, pp. 11600-11600
Open Access | Times Cited: 15
Syed Farooq Ali, Ahmed Sohail Aslam, Mazhar Javed Awan, et al.
Applied Sciences (2021) Vol. 11, Iss. 24, pp. 11600-11600
Open Access | Times Cited: 15
Deep learning enabled class imbalance with sand piper optimization based intrusion detection for secure cyber physical systems
Anwer Mustafa Hilal, Shaha Al‐Otaibi, Hany Mahgoub, et al.
Cluster Computing (2022) Vol. 26, Iss. 3, pp. 2085-2098
Closed Access | Times Cited: 10
Anwer Mustafa Hilal, Shaha Al‐Otaibi, Hany Mahgoub, et al.
Cluster Computing (2022) Vol. 26, Iss. 3, pp. 2085-2098
Closed Access | Times Cited: 10
Gaussian Mutation–Spider Monkey Optimization (GM-SMO) Model for Remote Sensing Scene Classification
Abdul Lateef Haroon P S, M. Manoharan, Alok Kumar Pani, et al.
Remote Sensing (2022) Vol. 14, Iss. 24, pp. 6279-6279
Open Access | Times Cited: 10
Abdul Lateef Haroon P S, M. Manoharan, Alok Kumar Pani, et al.
Remote Sensing (2022) Vol. 14, Iss. 24, pp. 6279-6279
Open Access | Times Cited: 10
Retracted: Visualisation‐based binary classification of android malware using vgg16
Aryan Marwaha, R. Q. Malik, Shehab Mohamed Beram, et al.
IET Software (2023) Vol. 17, Iss. 4, pp. 717-728
Open Access | Times Cited: 5
Aryan Marwaha, R. Q. Malik, Shehab Mohamed Beram, et al.
IET Software (2023) Vol. 17, Iss. 4, pp. 717-728
Open Access | Times Cited: 5
Separating Malicious from Benign Software Using Deep Learning Algorithm
Ömer Aslan
Electronics (2023) Vol. 12, Iss. 8, pp. 1861-1861
Open Access | Times Cited: 5
Ömer Aslan
Electronics (2023) Vol. 12, Iss. 8, pp. 1861-1861
Open Access | Times Cited: 5
Secure Content Based Image Retrieval System Using Deep Learning
Meqdam A. Mohammed, Mohammed Abdulridha Hussain, Zakariya A. Oraibi, et al.
Basrah Researches Sciences (2023) Vol. 49.2, Iss. 2, pp. 94-111
Open Access | Times Cited: 5
Meqdam A. Mohammed, Mohammed Abdulridha Hussain, Zakariya A. Oraibi, et al.
Basrah Researches Sciences (2023) Vol. 49.2, Iss. 2, pp. 94-111
Open Access | Times Cited: 5
VAE-GAN for Robust IoT Malware Detection and Classification in Intelligent Urban Environments: An Image Analysis Approach
Huiyao Dong, Igor Kotenko
Lecture notes in computer science (2024), pp. 200-215
Closed Access | Times Cited: 1
Huiyao Dong, Igor Kotenko
Lecture notes in computer science (2024), pp. 200-215
Closed Access | Times Cited: 1
Enhanced Image-Based Malware Classification Using Snake Optimization Algorithm With Deep Convolutional Neural Network
Salahaldeen Duraibi
IEEE Access (2024) Vol. 12, pp. 95047-95057
Open Access | Times Cited: 1
Salahaldeen Duraibi
IEEE Access (2024) Vol. 12, pp. 95047-95057
Open Access | Times Cited: 1
An efficient remote user authentication with key agreement procedure based on convolution-Chebyshev chaotic maps using biometric
Chandrashekhar Meshram, Rabha W. Ibrahim, Sarita Gajbhiye Meshram, et al.
The Journal of Supercomputing (2022) Vol. 78, Iss. 10, pp. 12792-12814
Closed Access | Times Cited: 8
Chandrashekhar Meshram, Rabha W. Ibrahim, Sarita Gajbhiye Meshram, et al.
The Journal of Supercomputing (2022) Vol. 78, Iss. 10, pp. 12792-12814
Closed Access | Times Cited: 8
MLP-Mixer-Autoencoder: A Lightweight Ensemble Architecture for Malware Classification
Tuan Van Dao, Hiroshi Satō, Masao Kubo
Information (2023) Vol. 14, Iss. 3, pp. 167-167
Open Access | Times Cited: 4
Tuan Van Dao, Hiroshi Satō, Masao Kubo
Information (2023) Vol. 14, Iss. 3, pp. 167-167
Open Access | Times Cited: 4
GSB: GNGS and SAG-BiGRU network for malware dynamic detection
Zhanhui Hu, Guangzhong Liu, Xinyu Xiang, et al.
PLoS ONE (2024) Vol. 19, Iss. 4, pp. e0298809-e0298809
Open Access | Times Cited: 1
Zhanhui Hu, Guangzhong Liu, Xinyu Xiang, et al.
PLoS ONE (2024) Vol. 19, Iss. 4, pp. e0298809-e0298809
Open Access | Times Cited: 1
CyberSentinel: A Transparent Defense Framework for Malware Detection in High-Stakes Operational Environments
Mainak Basak, Myung-Mook Han
Sensors (2024) Vol. 24, Iss. 11, pp. 3406-3406
Open Access | Times Cited: 1
Mainak Basak, Myung-Mook Han
Sensors (2024) Vol. 24, Iss. 11, pp. 3406-3406
Open Access | Times Cited: 1
Enhanced Image-Based Malware Multiclass Classification Method with the Ensemble Model and SVM
Melaku Bitew Haile, Yelkal Mulualem Walle, Abebech Jenber Belay
Open Information Science (2024) Vol. 8, Iss. 1
Open Access | Times Cited: 1
Melaku Bitew Haile, Yelkal Mulualem Walle, Abebech Jenber Belay
Open Information Science (2024) Vol. 8, Iss. 1
Open Access | Times Cited: 1
Enhanced Image-Based Malware Classification Using Transformer-Based Convolutional Neural Networks (CNNs)
Moses Ashawa, Nsikak Owoh, Salaheddin Hosseinzadeh, et al.
Electronics (2024) Vol. 13, Iss. 20, pp. 4081-4081
Open Access | Times Cited: 1
Moses Ashawa, Nsikak Owoh, Salaheddin Hosseinzadeh, et al.
Electronics (2024) Vol. 13, Iss. 20, pp. 4081-4081
Open Access | Times Cited: 1