
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Malware Analysis Using Artificial Intelligence and Deep Learning
Mark Stamp, Mamoun Alazab, Andrii Shalaginov
Springer eBooks (2020)
Closed Access | Times Cited: 46
Mark Stamp, Mamoun Alazab, Andrii Shalaginov
Springer eBooks (2020)
Closed Access | Times Cited: 46
Showing 1-25 of 46 citing articles:
A novel deep learning-based approach for malware detection
Kamran Shaukat, Suhuai Luo, Vijay Varadharajan
Engineering Applications of Artificial Intelligence (2023) Vol. 122, pp. 106030-106030
Closed Access | Times Cited: 106
Kamran Shaukat, Suhuai Luo, Vijay Varadharajan
Engineering Applications of Artificial Intelligence (2023) Vol. 122, pp. 106030-106030
Closed Access | Times Cited: 106
Deep learning based cross architecture internet of things malware detection and classification
Rajasekhar Chaganti, Vinayakumar Ravi, Tuan D. Pham
Computers & Security (2022) Vol. 120, pp. 102779-102779
Closed Access | Times Cited: 59
Rajasekhar Chaganti, Vinayakumar Ravi, Tuan D. Pham
Computers & Security (2022) Vol. 120, pp. 102779-102779
Closed Access | Times Cited: 59
An Automated Vision-Based Deep Learning Model for Efficient Detection of Android Malware Attacks
Iman Almomani, Aala Alkhayer, Walid El‐Shafai
IEEE Access (2022) Vol. 10, pp. 2700-2720
Open Access | Times Cited: 47
Iman Almomani, Aala Alkhayer, Walid El‐Shafai
IEEE Access (2022) Vol. 10, pp. 2700-2720
Open Access | Times Cited: 47
Identification of malware families using stacking of textural features and machine learning
Sanjeev Kumar, B. Janet, Subramanian Neelakantan
Expert Systems with Applications (2022) Vol. 208, pp. 118073-118073
Closed Access | Times Cited: 40
Sanjeev Kumar, B. Janet, Subramanian Neelakantan
Expert Systems with Applications (2022) Vol. 208, pp. 118073-118073
Closed Access | Times Cited: 40
A comprehensive review on deep learning algorithms: Security and privacy issues
Muhammad Tayyab, Mohsen Marjani, N. Z. Jhanjhi, et al.
Computers & Security (2023) Vol. 131, pp. 103297-103297
Closed Access | Times Cited: 29
Muhammad Tayyab, Mohsen Marjani, N. Z. Jhanjhi, et al.
Computers & Security (2023) Vol. 131, pp. 103297-103297
Closed Access | Times Cited: 29
Automated machine learning for deep learning based malware detection
Austin L. Brown, Maanak Gupta, Mahmoud Abdelsalam
Computers & Security (2023) Vol. 137, pp. 103582-103582
Open Access | Times Cited: 29
Austin L. Brown, Maanak Gupta, Mahmoud Abdelsalam
Computers & Security (2023) Vol. 137, pp. 103582-103582
Open Access | Times Cited: 29
Malware Detection with Artificial Intelligence: A Systematic Literature Review
Matthew Gaber, Mohiuddin Ahmed, Helge Janicke
ACM Computing Surveys (2023) Vol. 56, Iss. 6, pp. 1-33
Open Access | Times Cited: 22
Matthew Gaber, Mohiuddin Ahmed, Helge Janicke
ACM Computing Surveys (2023) Vol. 56, Iss. 6, pp. 1-33
Open Access | Times Cited: 22
Research on 3D urban landscape design and evaluation based on geographic information system
Pengyu Shan, Wan Sun
Environmental Earth Sciences (2021) Vol. 80, Iss. 17
Closed Access | Times Cited: 49
Pengyu Shan, Wan Sun
Environmental Earth Sciences (2021) Vol. 80, Iss. 17
Closed Access | Times Cited: 49
Visualized Malware Multi-Classification Framework Using Fine-Tuned CNN-Based Transfer Learning Models
Walid El‐Shafai, Iman Almomani, Aala Alkhayer
Applied Sciences (2021) Vol. 11, Iss. 14, pp. 6446-6446
Open Access | Times Cited: 45
Walid El‐Shafai, Iman Almomani, Aala Alkhayer
Applied Sciences (2021) Vol. 11, Iss. 14, pp. 6446-6446
Open Access | Times Cited: 45
Phishing Webpage Classification via Deep Learning-Based Algorithms: An Empirical Study
Nguyet Quang, Ali Selamat, Ondřej Krejcar, et al.
Applied Sciences (2021) Vol. 11, Iss. 19, pp. 9210-9210
Open Access | Times Cited: 34
Nguyet Quang, Ali Selamat, Ondřej Krejcar, et al.
Applied Sciences (2021) Vol. 11, Iss. 19, pp. 9210-9210
Open Access | Times Cited: 34
The deceitful Connected and Autonomous Vehicle: Defining the concept, contextualising its dimensions and proposing mitigation policies
Alexandros Nikitas, Simon Parkinson, Mauro Vallati
Transport Policy (2022) Vol. 122, pp. 1-10
Open Access | Times Cited: 23
Alexandros Nikitas, Simon Parkinson, Mauro Vallati
Transport Policy (2022) Vol. 122, pp. 1-10
Open Access | Times Cited: 23
BenchMFC: A benchmark dataset for trustworthy malware family classification under concept drift
Yongkang Jiang, Gaolei Li, Shenghong Li, et al.
Computers & Security (2024) Vol. 139, pp. 103706-103706
Closed Access | Times Cited: 5
Yongkang Jiang, Gaolei Li, Shenghong Li, et al.
Computers & Security (2024) Vol. 139, pp. 103706-103706
Closed Access | Times Cited: 5
Investigation of sawdust microwave-assisted pyrolysis by machine learning, Part I: Optimization insights by large language models
Bin Chen, Haoyu Wang, Xihe Qiu, et al.
Fuel (2024) Vol. 374, pp. 132396-132396
Closed Access | Times Cited: 5
Bin Chen, Haoyu Wang, Xihe Qiu, et al.
Fuel (2024) Vol. 374, pp. 132396-132396
Closed Access | Times Cited: 5
PMANet: Malicious URL detection via post-trained language model guided multi-level feature attention network
Ruitong Liu, Yanbin Wang, Haitao Xu, et al.
Information Fusion (2024) Vol. 113, pp. 102638-102638
Closed Access | Times Cited: 5
Ruitong Liu, Yanbin Wang, Haitao Xu, et al.
Information Fusion (2024) Vol. 113, pp. 102638-102638
Closed Access | Times Cited: 5
Reliability-based design optimization for cyber survivability
Nikolaos Doukas
Elsevier eBooks (2025), pp. 363-411
Closed Access
Nikolaos Doukas
Elsevier eBooks (2025), pp. 363-411
Closed Access
Safeguarding connected autonomous vehicle communication: Protocols, intra- and inter-vehicular attacks and defenses
Mohammed Aledhari, Rehma Razzak, Mohamed Rahouti, et al.
Computers & Security (2025), pp. 104352-104352
Open Access
Mohammed Aledhari, Rehma Razzak, Mohamed Rahouti, et al.
Computers & Security (2025), pp. 104352-104352
Open Access
Android malware detection based on feature fusion and the improved stacking ensemble model
Jiahao Zhang, Z. Xu, Zhi Xiong, et al.
Journal of Computer Virology and Hacking Techniques (2025) Vol. 21, Iss. 1
Closed Access
Jiahao Zhang, Z. Xu, Zhi Xiong, et al.
Journal of Computer Virology and Hacking Techniques (2025) Vol. 21, Iss. 1
Closed Access
Android Malware prediction based on novel enhanced LSTM compared with random forest algorithms to predict accuracy
D. Lokesh, S. Parthiban
AIP conference proceedings (2025) Vol. 3252, pp. 020067-020067
Closed Access
D. Lokesh, S. Parthiban
AIP conference proceedings (2025) Vol. 3252, pp. 020067-020067
Closed Access
An Empirical Analysis of Image-Based Learning Techniques for Malware Classification
Pratikkumar Prajapati, Mark Stamp
Springer eBooks (2020), pp. 411-435
Closed Access | Times Cited: 33
Pratikkumar Prajapati, Mark Stamp
Springer eBooks (2020), pp. 411-435
Closed Access | Times Cited: 33
Radon transform based malware classification in cyber-physical system using deep learning
Rasim Alguliyev, Ramiz M. Aliguliyev, Lyudmila Sukhostat
Results in Control and Optimization (2024) Vol. 14, pp. 100382-100382
Open Access | Times Cited: 4
Rasim Alguliyev, Ramiz M. Aliguliyev, Lyudmila Sukhostat
Results in Control and Optimization (2024) Vol. 14, pp. 100382-100382
Open Access | Times Cited: 4
A Proposed New Endpoint Detection and Response With Image-Based Malware Detection System
Tran Hoang Hai, Vu Van Thieu, Tran Thai Duong, et al.
IEEE Access (2023) Vol. 11, pp. 122859-122875
Open Access | Times Cited: 10
Tran Hoang Hai, Vu Van Thieu, Tran Thai Duong, et al.
IEEE Access (2023) Vol. 11, pp. 122859-122875
Open Access | Times Cited: 10
IMCLNet: A lightweight deep neural network for Image-based Malware Classification
Binghui Zou, Chunjie Cao, Fangjian Tao, et al.
Journal of Information Security and Applications (2022) Vol. 70, pp. 103313-103313
Closed Access | Times Cited: 13
Binghui Zou, Chunjie Cao, Fangjian Tao, et al.
Journal of Information Security and Applications (2022) Vol. 70, pp. 103313-103313
Closed Access | Times Cited: 13
Disarming visualization-based approaches in malware detection systems
Lara Saidia Fascí, Marco Fisichella, Gianluca Lax, et al.
Computers & Security (2022) Vol. 126, pp. 103062-103062
Open Access | Times Cited: 13
Lara Saidia Fascí, Marco Fisichella, Gianluca Lax, et al.
Computers & Security (2022) Vol. 126, pp. 103062-103062
Open Access | Times Cited: 13
Motion capture and evaluation system of football special teaching in colleges and universities based on deep learning
Xiaohui Yin, C. Chandru Vignesh, Thanjai Vadivel
International Journal of Systems Assurance Engineering and Management (2022) Vol. 13, Iss. 6, pp. 3092-3107
Closed Access | Times Cited: 9
Xiaohui Yin, C. Chandru Vignesh, Thanjai Vadivel
International Journal of Systems Assurance Engineering and Management (2022) Vol. 13, Iss. 6, pp. 3092-3107
Closed Access | Times Cited: 9
Automatic assignment of moral foundations to movies by word embedding
Carlos González-Santos, Miguel A. Vega‐Rodríguez, Carlos J. Pérez, et al.
Knowledge-Based Systems (2023) Vol. 270, pp. 110539-110539
Open Access | Times Cited: 5
Carlos González-Santos, Miguel A. Vega‐Rodríguez, Carlos J. Pérez, et al.
Knowledge-Based Systems (2023) Vol. 270, pp. 110539-110539
Open Access | Times Cited: 5