OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

BigRC-EML: big-data based ransomware classification using ensemble machine learning
Sana Aurangzeb, Haris Anwar, M. Asif Naeem, et al.
Cluster Computing (2022) Vol. 25, Iss. 5, pp. 3405-3422
Closed Access | Times Cited: 43

Showing 1-25 of 43 citing articles:

Evaluation and classification of obfuscated Android malware through deep learning using ensemble voting mechanism
Sana Aurangzeb, Muhammad Aleem
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 30

Ransomware Detection Using Machine Learning: A Review, Research Limitations and Future Directions
Jamil Ispahany, Rafiqul Islam, Md Zahidul Islam, et al.
IEEE Access (2024) Vol. 12, pp. 68785-68813
Open Access | Times Cited: 12

Ransomware Reloaded: Re-examining Its Trend, Research and Mitigation in the Era of Data Exfiltration
Timothy R. McIntosh, Teo Sušnjak, Tong Liu, et al.
ACM Computing Surveys (2024)
Open Access | Times Cited: 12

Dwarf Mongoose Optimization with Machine-Learning-Driven Ransomware Detection in Internet of Things Environment
Khalid Alissa, Dalia H. Elkamchouchi, Khaled Tarmissi, et al.
Applied Sciences (2022) Vol. 12, Iss. 19, pp. 9513-9513
Open Access | Times Cited: 28

Evaluating Large Language Models in Ransomware Negotiation: A Comparative Analysis of ChatGPT and Claude
Takako Kumamoto, Yunko Yoshida, Himari Fujima
Research Square (Research Square) (2023)
Open Access | Times Cited: 21

Determination of Gas–Oil minimum miscibility pressure for impure CO2 through optimized machine learning models
Chenyu Wu, Lu Jin, Jin Zhao, et al.
Geoenergy Science and Engineering (2024) Vol. 242, pp. 213216-213216
Closed Access | Times Cited: 6

Combatting ransomware in ZephyrOS-activated industrial IoT environments
Usman Tariq
Heliyon (2024) Vol. 10, Iss. 9, pp. e29917-e29917
Open Access | Times Cited: 5

Obfuscated malware detection using dilated convolutional network
Anzhelika Mezina, Radim Bürget
(2022), pp. 110-115
Closed Access | Times Cited: 22

A Hybrid Optimization Model for Efficient Detection and Classification of Malware in the Internet of Things
Ijaz Ahmad, Zhong Wan, Ashfaq Ahmad, et al.
Mathematics (2024) Vol. 12, Iss. 10, pp. 1437-1437
Open Access | Times Cited: 4

RThreatDroid: A Ransomware Detection Approach to Secure IoT Based Healthcare Systems
Muhammad Junaid Iqbal, Sana Aurangzeb, Muhammad Aleem, et al.
IEEE Transactions on Network Science and Engineering (2022) Vol. 10, Iss. 5, pp. 2574-2583
Closed Access | Times Cited: 16

Decentralized Identity Verification System for Data Access to Prevent Data Exfiltration Ransomware
Kazuya Takeuchi, Takako Kumamoto, Yunko Yoshida, et al.
(2023)
Open Access | Times Cited: 10

AndroDex: Android Dex Images of Obfuscated Malware
Sana Aurangzeb, Muhammad Aleem, Muhammad Taimoor Khan, et al.
Scientific Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 3

BHMDC: A byte and hex n-gram based malware detection and classification method
Yonghe Tang, Xuyan Qi, Jing Jing, et al.
Computers & Security (2023) Vol. 128, pp. 103118-103118
Closed Access | Times Cited: 8

FACILE: A capsule network with fewer capsules and richer hierarchical information for malware image classification
Binghui Zou, Chunjie Cao, Longjuan Wang, et al.
Computers & Security (2023) Vol. 137, pp. 103606-103606
Closed Access | Times Cited: 8

Malware Detection Using K-Nearest Neighbor Algorithm and Feature Selection
Catur Supriyanto, Fauzi Adi Rafrastara, Afinzaki Amiral, et al.
JURNAL MEDIA INFORMATIKA BUDIDARMA (2024) Vol. 8, Iss. 1, pp. 412-412
Open Access | Times Cited: 2

Performance Comparison of k-Nearest Neighbor Algorithm with Various k Values and Distance Metrics for Malware Detection
Fauzi Adi Rafrastara, Catur Supriyanto, Afinzaki Amiral, et al.
JURNAL MEDIA INFORMATIKA BUDIDARMA (2024) Vol. 8, Iss. 1, pp. 450-450
Open Access | Times Cited: 2

Optimal Deep Learning Based Ransomware Detection and Classification in the Internet of Things Environment
Manal Abdullah Alohali, Muna Elsadig, Fahd N. Al‐Wesabi, et al.
Computer Systems Science and Engineering (2023) Vol. 46, Iss. 3, pp. 3087-3102
Open Access | Times Cited: 4

The Effect of the Ransomware Dataset Age on the Detection Accuracy of Machine Learning Models
Qussai Yaseen
Information (2023) Vol. 14, Iss. 3, pp. 193-193
Open Access | Times Cited: 3

Enhancing Ransomware Classification with Multi-stage Feature Selection and Data Imbalance Correction
Faithful Chiagoziem Onwuegbuche, Anca Delia Jurcut, Liliana Pasquale
Lecture notes in computer science (2023), pp. 285-295
Closed Access | Times Cited: 3

Android ransomware detection using binary Jaya optimization algorithm
Moutaz Alazab
Expert Systems (2023) Vol. 41, Iss. 1
Closed Access | Times Cited: 3

APKOWL: An Automatic Approach to Enhance the Malware Detection
Doaa Aboshady, Naglaa E. Ghannam, Eman K. Elsayed, et al.
Mobile Networks and Applications (2023) Vol. 28, Iss. 5, pp. 1901-1912
Open Access | Times Cited: 2

Deteksi Malware menggunakan Metode Stacking berbasis Ensemble
Fauzi Adi Rafrastara, Catur Supriyanto, Cinantya Paramita, et al.
Jurnal Informatika Jurnal Pengembangan IT (2023) Vol. 8, Iss. 1, pp. 11-16
Open Access | Times Cited: 2

Page 1 - Next Page

Scroll to top