OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Survey of the Recent Trends in Deep Learning Based Malware Detection
Umm-e-Hani Tayyab, Faiza Babar Khan, Muhammad Hanif Durad, et al.
Journal of Cybersecurity and Privacy (2022) Vol. 2, Iss. 4, pp. 800-829
Open Access | Times Cited: 55

Showing 26-50 of 55 citing articles:

Machine Learning in Malware Analysis: Current Trends and Future Directions
Safa Altaha, Khaled Riad
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 1
Open Access | Times Cited: 1

Comprehensive Review of Advanced Machine Learning Techniques for Detecting and Mitigating Zero-Day Exploits
Nachaat Mohamed, Hamed Taherdoost, Mitra Madanchian
ICST Transactions on Scalable Information Systems (2024) Vol. 11
Open Access | Times Cited: 1

Fine-Tuning Cyber Security Defenses: Evaluating Supervised Machine Learning Classifiers for Windows Malware Detection
Islam Zada, Mohammed Naif Alatawi, Syed Muhammad Saqlain, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 80, Iss. 2, pp. 2917-2939
Open Access | Times Cited: 1

An Investigation to Detect Banking Malware Network Communication Traffic Using Machine Learning Techniques
Mohamed Ali Kazi, Steve Woodhead, Diane Gan
Journal of Cybersecurity and Privacy (2022) Vol. 3, Iss. 1, pp. 1-23
Open Access | Times Cited: 7

Malware Image Classification Using Deep Learning InceptionResNet-V2 and VGG-16 Method
Didih Rizki Chandranegara, Jafar Shodiq Djawas, Faiq Azmi Nurfaizi, et al.
Jurnal Online Informatika (2023) Vol. 8, Iss. 1, pp. 61-71
Open Access | Times Cited: 2

Algebraic Structures Induced by the Insertion and Detection of Malware
Agustín Moreno Cañadas, Odette M. Mendez, Juan David Camacho Vega
Computation (2023) Vol. 11, Iss. 7, pp. 140-140
Open Access | Times Cited: 2

An ensemble approach for imbalanced multiclass malware classification using 1D-CNN
Binayak Panda, Sudhanshu Shekhar Bisoyi, Sidhanta Panigrahy
PeerJ Computer Science (2023) Vol. 9, pp. e1677-e1677
Open Access | Times Cited: 2

Analyzing the Impact of Deep Learning Approaches on Real-Time Data Analysis in Machine Learning
Deepti, Mounika Nalluri, Chinna babu Mupparaju, et al.
(2023), pp. 1594-1599
Closed Access | Times Cited: 2

Employing Incremental Learning for the Detection of Multiclass New Malware Variants
Mohammad Eid Alzahrani
Indian Journal of Science and Technology (2024) Vol. 17, Iss. 10, pp. 941-948
Open Access

Memory Integrity Techniques for Memory-Unsafe Languages: A Survey
Vahid Eftekhari Moghadam, Gabriele Serra, Federico Aromolo, et al.
IEEE Access (2024) Vol. 12, pp. 43201-43221
Open Access

Interpretable Detection of Malicious Behavior in Windows Portable Executables Using Multi-Head 2D Transformers
Sohail Khan, Mohammad Nauman
Big Data Mining and Analytics (2024) Vol. 7, Iss. 2, pp. 485-499
Open Access

Malware Classification Using Deep Learning Approaches
Riya Goyal, Devendra K. Tayal, B. Indra Thannaya
Lecture notes in networks and systems (2024), pp. 533-549
Closed Access

Enhanced IoT Security for DDOS Attack Detection: Split Attention-Based ResNeXt-GRU Ensembler Approach
Abdulrahman A. Alshdadi, Abdulwahab Ali Almazroi, Eesa Alsolami, et al.
IEEE Access (2024) Vol. 12, pp. 112368-112380
Open Access

Avaliação de algoritmos de machine learning para detecção de malware IoT no dataset IoT-23
Cristian H. M. Souza, Carlos Hideo Arima
(2024), pp. 767-772
Closed Access

Review on Machine Learning for Zero-Day Exploit Detection and Response
Nachaat Mohamed, Hamed Taherdoost, Mitra Madanchian
EAI/Springer Innovations in Communication and Computing (2024), pp. 163-176
Closed Access

Exploring malware complexities: a behavior and characteristic analysis approach for robust and accurate cybersecurity
Weiye Wang, Qing Li, H. Mu
Cluster Computing (2024) Vol. 28, Iss. 2
Closed Access

Evolving AI-Based Malware Detection
Krishna V. Subbarao, Reshma Togaru, Manas Kumar Yogi
Advances in computational intelligence and robotics book series (2024), pp. 135-158
Closed Access

Enhancing ransomware defense: deep learning-based detection and family-wise classification of evolving threats
Amjad Hussain, Ayesha Saadia, Musaed Alhussein, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2546-e2546
Open Access

ISAnWin: inductive generalized zero-shot learning using deep CNN for malware detection across windows and android platforms
Umm-e-Hani Tayyab, Faiza Babar Khan, Asifullah Khan, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2604-e2604
Open Access

Automated Malware Detection Based on a Machine Learning Algorithm
Almaha Almuqren, Mounir Frikha, Abdullah Albuali
(2023), pp. 1-12
Closed Access | Times Cited: 1

Malware and Average Individual
Reem Alrawili, Michael G. Oliva, Amber Honnef, et al.
(2022), pp. 1-6
Closed Access | Times Cited: 2

Conversion of 1D Data Used in Detection of Malware Types to 2D Barcode Types and Analysis with Deep Networks
Mesut Toğaçar
Mühendislik Bilimleri ve Araştırmaları Dergisi (2023) Vol. 5, Iss. 1, pp. 169-177
Open Access

Deit-Mi: Advancing Malware Detection and Classification with Data-Efficient Image Transformers
Boadu Nkrumah, Michael Asante, Gaddafi Adbdul-Salaam, et al.
(2023)
Closed Access

IoT Malware Detection Technique Based on Deep Learning and Natural Language Processing
Marwa Abd Al Abbas, Ban Mohammed Khammas
(2023), pp. 25-30
Closed Access

Scroll to top