
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A new approach for APT malware detection based on deep graph network for endpoint systems
Cho Do Xuan, DT Huong
Applied Intelligence (2022) Vol. 52, Iss. 12, pp. 14005-14024
Closed Access | Times Cited: 24
Cho Do Xuan, DT Huong
Applied Intelligence (2022) Vol. 52, Iss. 12, pp. 14005-14024
Closed Access | Times Cited: 24
Showing 24 citing articles:
A comprehensive survey on deep learning based malware detection techniques
M. A. Gopinath, Sibi Chakkaravarthy Sethuraman
Computer Science Review (2022) Vol. 47, pp. 100529-100529
Open Access | Times Cited: 141
M. A. Gopinath, Sibi Chakkaravarthy Sethuraman
Computer Science Review (2022) Vol. 47, pp. 100529-100529
Open Access | Times Cited: 141
A Review of State-of-the-Art Malware Attack Trends and Defense Mechanisms
Jannatul Ferdous, Rafiqul Islam, Arash Mahboubi, et al.
IEEE Access (2023) Vol. 11, pp. 121118-121141
Open Access | Times Cited: 19
Jannatul Ferdous, Rafiqul Islam, Arash Mahboubi, et al.
IEEE Access (2023) Vol. 11, pp. 121118-121141
Open Access | Times Cited: 19
APT beaconing detection: A systematic review
Manar Abu Talib, Qassim Nasir, Ali Bou Nassif, et al.
Computers & Security (2022) Vol. 122, pp. 102875-102875
Closed Access | Times Cited: 24
Manar Abu Talib, Qassim Nasir, Ali Bou Nassif, et al.
Computers & Security (2022) Vol. 122, pp. 102875-102875
Closed Access | Times Cited: 24
Amalgamation of Divergent Logs for Detection of Advanced Persistent Threats in Cyber Threat Analysis
Sandhya Addetla, P. Rajalakshmi
Lecture notes in electrical engineering (2025), pp. 473-488
Closed Access
Sandhya Addetla, P. Rajalakshmi
Lecture notes in electrical engineering (2025), pp. 473-488
Closed Access
A novel approach for APT attack detection based on feature intelligent extraction and representation learning
Cho Do Xuan, Nguyen Hoa Cuong
PLoS ONE (2024) Vol. 19, Iss. 6, pp. e0305618-e0305618
Open Access | Times Cited: 4
Cho Do Xuan, Nguyen Hoa Cuong
PLoS ONE (2024) Vol. 19, Iss. 6, pp. e0305618-e0305618
Open Access | Times Cited: 4
AMD‐CNN: Android malware detection via feature graph and convolutional neural networks
Recep Sinan Arslan, Murat Taşyürek
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 23
Closed Access | Times Cited: 16
Recep Sinan Arslan, Murat Taşyürek
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 23
Closed Access | Times Cited: 16
A systematic literature review on Windows malware detection: Techniques, research issues, and future directions
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
Journal of Systems and Software (2023) Vol. 209, pp. 111921-111921
Open Access | Times Cited: 10
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
Journal of Systems and Software (2023) Vol. 209, pp. 111921-111921
Open Access | Times Cited: 10
A systematic literature review for APT detection and Effective Cyber Situational Awareness (ECSA) conceptual model
Duraid T. Salim, Manmeet Mahinderjit Singh, Pantea Keikhosrokiani
Heliyon (2023) Vol. 9, Iss. 7, pp. e17156-e17156
Open Access | Times Cited: 9
Duraid T. Salim, Manmeet Mahinderjit Singh, Pantea Keikhosrokiani
Heliyon (2023) Vol. 9, Iss. 7, pp. e17156-e17156
Open Access | Times Cited: 9
A novel approach for APT attack detection based on an advanced computing
Cho Do Xuan, Tung Thanh Nguyen
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 3
Cho Do Xuan, Tung Thanh Nguyen
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 3
Offensive Security: Cyber Threat Intelligence Enrichment With Counterintelligence and Counterattack
Muhammad Usman Rana, Osama Ellahi, Masoom Alam, et al.
IEEE Access (2022) Vol. 10, pp. 108760-108774
Open Access | Times Cited: 14
Muhammad Usman Rana, Osama Ellahi, Masoom Alam, et al.
IEEE Access (2022) Vol. 10, pp. 108760-108774
Open Access | Times Cited: 14
A Systematic Literature Review and a Conceptual Framework Proposition for Advanced Persistent Threats (APT) Detection for Mobile Devices Using Artificial Intelligence Techniques
Amjed Ahmed Al-Kadhimi, Manmeet Mahinderjit Singh, Mohd Nor Akmal Khalid
Applied Sciences (2023) Vol. 13, Iss. 14, pp. 8056-8056
Open Access | Times Cited: 7
Amjed Ahmed Al-Kadhimi, Manmeet Mahinderjit Singh, Mohd Nor Akmal Khalid
Applied Sciences (2023) Vol. 13, Iss. 14, pp. 8056-8056
Open Access | Times Cited: 7
A novel intelligent cognitive computing-based APT malware detection for Endpoint systems
Cho Do Xuan, DT Huong, Toan-Van Nguyen
Journal of Intelligent & Fuzzy Systems (2022) Vol. 43, Iss. 3, pp. 3527-3547
Closed Access | Times Cited: 10
Cho Do Xuan, DT Huong, Toan-Van Nguyen
Journal of Intelligent & Fuzzy Systems (2022) Vol. 43, Iss. 3, pp. 3527-3547
Closed Access | Times Cited: 10
Attack scenario reconstruction via fusing heterogeneous threat intelligence
Xiaodong Zang, Jian Gong, Xinchang Zhang, et al.
Computers & Security (2023) Vol. 133, pp. 103420-103420
Closed Access | Times Cited: 5
Xiaodong Zang, Jian Gong, Xinchang Zhang, et al.
Computers & Security (2023) Vol. 133, pp. 103420-103420
Closed Access | Times Cited: 5
Accurate Encrypted Malicious Traffic Identification via Traffic Interaction Pattern Using Graph Convolutional Network
Guoqiang Ren, Guang Cheng, Nan Fu
Applied Sciences (2023) Vol. 13, Iss. 3, pp. 1483-1483
Open Access | Times Cited: 4
Guoqiang Ren, Guang Cheng, Nan Fu
Applied Sciences (2023) Vol. 13, Iss. 3, pp. 1483-1483
Open Access | Times Cited: 4
Hacker group identification based on dynamic heterogeneous graph node update
Yijia Xu, Yong Fang, Cheng Zhi Huang, et al.
Applied Soft Computing (2024) Vol. 158, pp. 111587-111587
Closed Access | Times Cited: 1
Yijia Xu, Yong Fang, Cheng Zhi Huang, et al.
Applied Soft Computing (2024) Vol. 158, pp. 111587-111587
Closed Access | Times Cited: 1
A comprehensive review of machine learning applications in cybersecurity: identifying gaps and advocating for cybersecurity auditing
Ndaedzo Rananga, Hein S. Venter
Research Square (Research Square) (2024)
Open Access | Times Cited: 1
Ndaedzo Rananga, Hein S. Venter
Research Square (Research Square) (2024)
Open Access | Times Cited: 1
Using knowledge graphs and contrastive learning for detecting APT Malware on Endpoint systems
Cho Do Xuan, Hoa D. Nguyen
Journal of Intelligent & Fuzzy Systems (2023) Vol. 45, Iss. 3, pp. 4517-4533
Closed Access | Times Cited: 3
Cho Do Xuan, Hoa D. Nguyen
Journal of Intelligent & Fuzzy Systems (2023) Vol. 45, Iss. 3, pp. 4517-4533
Closed Access | Times Cited: 3
A Federated Learning-Based Approach for Predicting Cross-Domain Network Attack Behavior
Jiakai Hao, Ming Jin, Guanghuai Zhao, et al.
Lecture notes in electrical engineering (2024), pp. 221-229
Closed Access
Jiakai Hao, Ming Jin, Guanghuai Zhao, et al.
Lecture notes in electrical engineering (2024), pp. 221-229
Closed Access
Malware2ATT&CK: A sophisticated model for mapping malware to ATT&CK techniques
Huaqi Sun, Hui Shu, Fei Kang, et al.
Computers & Security (2024) Vol. 140, pp. 103772-103772
Closed Access
Huaqi Sun, Hui Shu, Fei Kang, et al.
Computers & Security (2024) Vol. 140, pp. 103772-103772
Closed Access
From Fine-Grained to Refined: APT Malware Knowledge Graph Construction and Attribution Analysis Driven by Multi-stage Graph Computation
Rongqi Jing, Zhengwei Jiang, Qiuyun Wang, et al.
Lecture notes in computer science (2024), pp. 78-93
Closed Access
Rongqi Jing, Zhengwei Jiang, Qiuyun Wang, et al.
Lecture notes in computer science (2024), pp. 78-93
Closed Access
Attribution classification method of APT malware based on multi-feature fusion
Jian Zhang, Shengquan Liu, Zhihua Liu
PLoS ONE (2024) Vol. 19, Iss. 6, pp. e0304066-e0304066
Open Access
Jian Zhang, Shengquan Liu, Zhihua Liu
PLoS ONE (2024) Vol. 19, Iss. 6, pp. e0304066-e0304066
Open Access
Deep Learning Based Hybrid Analysis of Malware Detection and Classification: A Recent Review
Syed Shuja Hussain, Mohd Faizal Ab Razak, Ahmad Firdaus
Journal of Cyber Security and Mobility (2023)
Open Access | Times Cited: 1
Syed Shuja Hussain, Mohd Faizal Ab Razak, Ahmad Firdaus
Journal of Cyber Security and Mobility (2023)
Open Access | Times Cited: 1
Evaluation and Survey of State of the Art Malware Detection and Classification Techniques: Analysis and Recommendation
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
SSRN Electronic Journal (2022)
Closed Access | Times Cited: 1
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
SSRN Electronic Journal (2022)
Closed Access | Times Cited: 1
i-HGHAN: Improved Model for Hacker Group Identifification Based on Dynamic Heterogeneous Graph Node Update
Yijia Xu, Yong Fang, Zhonglin Liu
(2023)
Closed Access
Yijia Xu, Yong Fang, Zhonglin Liu
(2023)
Closed Access