
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Cryptocurrency malware hunting: A deep Recurrent Neural Network approach
Abbas Yazdinejad, Hamed HaddadPajouh, Ali Dehghantanha, et al.
Applied Soft Computing (2020) Vol. 96, pp. 106630-106630
Closed Access | Times Cited: 103
Abbas Yazdinejad, Hamed HaddadPajouh, Ali Dehghantanha, et al.
Applied Soft Computing (2020) Vol. 96, pp. 106630-106630
Closed Access | Times Cited: 103
Showing 1-25 of 103 citing articles:
Cyberbullying detection solutions based on deep learning architectures
Celestine Iwendi, Gautam Srivastava, Suleman Khan, et al.
Multimedia Systems (2020) Vol. 29, Iss. 3, pp. 1839-1852
Closed Access | Times Cited: 140
Celestine Iwendi, Gautam Srivastava, Suleman Khan, et al.
Multimedia Systems (2020) Vol. 29, Iss. 3, pp. 1839-1852
Closed Access | Times Cited: 140
Secure Intelligent Fuzzy Blockchain Framework: Effective Threat Detection in IoT Networks
Abbas Yazdinejad, Ali Dehghantanha, Reza M. Parizi, et al.
Computers in Industry (2022) Vol. 144, pp. 103801-103801
Closed Access | Times Cited: 128
Abbas Yazdinejad, Ali Dehghantanha, Reza M. Parizi, et al.
Computers in Industry (2022) Vol. 144, pp. 103801-103801
Closed Access | Times Cited: 128
An ensemble deep learning model for cyber threat hunting in industrial internet of things
Abbas Yazdinejad, Mostafa Kazemi, Reza M. Parizi, et al.
Digital Communications and Networks (2022) Vol. 9, Iss. 1, pp. 101-110
Open Access | Times Cited: 113
Abbas Yazdinejad, Mostafa Kazemi, Reza M. Parizi, et al.
Digital Communications and Networks (2022) Vol. 9, Iss. 1, pp. 101-110
Open Access | Times Cited: 113
Malware Detection Using Deep Learning and Correlation-Based Feature Selection
Esraa Saleh Alomari, Riyadh Rahef Nuiaa, Zaid Abdi Alkareem Alyasseri, et al.
Symmetry (2023) Vol. 15, Iss. 1, pp. 123-123
Open Access | Times Cited: 87
Esraa Saleh Alomari, Riyadh Rahef Nuiaa, Zaid Abdi Alkareem Alyasseri, et al.
Symmetry (2023) Vol. 15, Iss. 1, pp. 123-123
Open Access | Times Cited: 87
Revolutionizing Malware Detection
Marwan Omar
Advances in medical technologies and clinical practice book series (2024), pp. 196-220
Closed Access | Times Cited: 39
Marwan Omar
Advances in medical technologies and clinical practice book series (2024), pp. 196-220
Closed Access | Times Cited: 39
Deepfakes: current and future trends
Ángel Fernández Gambı́n, Anis Yazidi, Athanasios V. Vasilakos, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 3
Open Access | Times Cited: 30
Ángel Fernández Gambı́n, Anis Yazidi, Athanasios V. Vasilakos, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 3
Open Access | Times Cited: 30
Federated learning for drone authentication
Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha, et al.
Ad Hoc Networks (2021) Vol. 120, pp. 102574-102574
Closed Access | Times Cited: 90
Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha, et al.
Ad Hoc Networks (2021) Vol. 120, pp. 102574-102574
Closed Access | Times Cited: 90
A Review on Security of Smart Farming and Precision Agriculture: Security Aspects, Attacks, Threats and Countermeasures
Abbas Yazdinejad, Behrouz Zolfaghari, Amin Azmoodeh, et al.
Applied Sciences (2021) Vol. 11, Iss. 16, pp. 7518-7518
Open Access | Times Cited: 88
Abbas Yazdinejad, Behrouz Zolfaghari, Amin Azmoodeh, et al.
Applied Sciences (2021) Vol. 11, Iss. 16, pp. 7518-7518
Open Access | Times Cited: 88
Adapting H-infinity controller for the desired reference tracking of the sphere position in the maglev process
José de Jesús Rubio, Edwin Lughofer, J.K. Pieper, et al.
Information Sciences (2021) Vol. 569, pp. 669-686
Closed Access | Times Cited: 76
José de Jesús Rubio, Edwin Lughofer, J.K. Pieper, et al.
Information Sciences (2021) Vol. 569, pp. 669-686
Closed Access | Times Cited: 76
A Novel Hunger Games Search Optimization-Based Artificial Neural Network for Predicting Ground Vibration Intensity Induced by Mine Blasting
Hoang Nguyen, Xuan-Nam Bui
Natural Resources Research (2021) Vol. 30, Iss. 5, pp. 3865-3880
Closed Access | Times Cited: 61
Hoang Nguyen, Xuan-Nam Bui
Natural Resources Research (2021) Vol. 30, Iss. 5, pp. 3865-3880
Closed Access | Times Cited: 61
Prediction of wind turbine blade icing fault based on selective deep ensemble model
Jin Xiao, Chunyan Li, Бо Лю, et al.
Knowledge-Based Systems (2022) Vol. 242, pp. 108290-108290
Closed Access | Times Cited: 56
Jin Xiao, Chunyan Li, Бо Лю, et al.
Knowledge-Based Systems (2022) Vol. 242, pp. 108290-108290
Closed Access | Times Cited: 56
Accurate threat hunting in industrial internet of things edge devices
Abbas Yazdinejad, Behrouz Zolfaghari, Ali Dehghantanha, et al.
Digital Communications and Networks (2022) Vol. 9, Iss. 5, pp. 1123-1130
Open Access | Times Cited: 46
Abbas Yazdinejad, Behrouz Zolfaghari, Ali Dehghantanha, et al.
Digital Communications and Networks (2022) Vol. 9, Iss. 5, pp. 1123-1130
Open Access | Times Cited: 46
A performance overview of machine learning-based defense strategies for advanced persistent threats in industrial control systems
Muhammad Imran, Hafeez Ur Rehman Siddiqui, Ali Raza, et al.
Computers & Security (2023) Vol. 134, pp. 103445-103445
Closed Access | Times Cited: 25
Muhammad Imran, Hafeez Ur Rehman Siddiqui, Ali Raza, et al.
Computers & Security (2023) Vol. 134, pp. 103445-103445
Closed Access | Times Cited: 25
GA-mADAM-IIoT: A New Lightweight Threats Detection in the Industrial IoT Via Genetic Algorithm with Attention Mechanism and LSTM on Multivariate Time Series Sensor Data
Yakub Kayode Saheed, Adekunle Isaac Omole, Musa Odunayo Sabit
Sensors International (2024) Vol. 6, pp. 100297-100297
Closed Access | Times Cited: 10
Yakub Kayode Saheed, Adekunle Isaac Omole, Musa Odunayo Sabit
Sensors International (2024) Vol. 6, pp. 100297-100297
Closed Access | Times Cited: 10
A kangaroo-based intrusion detection system on software-defined networks
Abbas Yazdinejadna, Reza M. Parizi, Ali Dehghantanha, et al.
Computer Networks (2020) Vol. 184, pp. 107688-107688
Closed Access | Times Cited: 63
Abbas Yazdinejadna, Reza M. Parizi, Ali Dehghantanha, et al.
Computer Networks (2020) Vol. 184, pp. 107688-107688
Closed Access | Times Cited: 63
An Empirical Evaluation of AI Deep Explainable Tools
Yoseph Hailemariam, Abbas Yazdinejad, Reza M. Parizi, et al.
2022 IEEE Globecom Workshops (GC Wkshps) (2020), pp. 1-6
Closed Access | Times Cited: 53
Yoseph Hailemariam, Abbas Yazdinejad, Reza M. Parizi, et al.
2022 IEEE Globecom Workshops (GC Wkshps) (2020), pp. 1-6
Closed Access | Times Cited: 53
Convergent newton method and neural network for the electric energy usage prediction
José de Jesús Rubio, Marco Antonio Islas, Genaro Ochoa, et al.
Information Sciences (2021) Vol. 585, pp. 89-112
Closed Access | Times Cited: 51
José de Jesús Rubio, Marco Antonio Islas, Genaro Ochoa, et al.
Information Sciences (2021) Vol. 585, pp. 89-112
Closed Access | Times Cited: 51
High Performance Classification Model to Identify Ransomware Payments for Heterogeneous Bitcoin Networks
Qasem Abu Al‐Haija, Abdulaziz A. Alsulami
Electronics (2021) Vol. 10, Iss. 17, pp. 2113-2113
Open Access | Times Cited: 48
Qasem Abu Al‐Haija, Abdulaziz A. Alsulami
Electronics (2021) Vol. 10, Iss. 17, pp. 2113-2113
Open Access | Times Cited: 48
SeFACED: Semantic-Based Forensic Analysis and Classification of E-Mail Data Using Deep Learning
Maryam Hina, Mohsin Ali, Abdul Rehman Javed, et al.
IEEE Access (2021) Vol. 9, pp. 98398-98411
Open Access | Times Cited: 41
Maryam Hina, Mohsin Ali, Abdul Rehman Javed, et al.
IEEE Access (2021) Vol. 9, pp. 98398-98411
Open Access | Times Cited: 41
Financial Contract Administration in Construction via Cryptocurrency Blockchain and Smart Contract: A Proof of Concept
Rowaid Ibrahim, Ahmed A. Harby, Mohamed Salem Nashwan, et al.
Buildings (2022) Vol. 12, Iss. 8, pp. 1072-1072
Open Access | Times Cited: 30
Rowaid Ibrahim, Ahmed A. Harby, Mohamed Salem Nashwan, et al.
Buildings (2022) Vol. 12, Iss. 8, pp. 1072-1072
Open Access | Times Cited: 30
Federated IoT attack detection using decentralized edge data
Christopher Regan, Mohammad Nasajpour, Reza M. Parizi, et al.
Machine Learning with Applications (2022) Vol. 8, pp. 100263-100263
Open Access | Times Cited: 29
Christopher Regan, Mohammad Nasajpour, Reza M. Parizi, et al.
Machine Learning with Applications (2022) Vol. 8, pp. 100263-100263
Open Access | Times Cited: 29
Generative Adversarial Networks for Cyber Threat Hunting in Ethereum Blockchain
Elnaz Rabieinejad, Abbas Yazdinejad, Reza M. Parizi, et al.
Deleted Journal (2023) Vol. 2, Iss. 2, pp. 1-19
Closed Access | Times Cited: 21
Elnaz Rabieinejad, Abbas Yazdinejad, Reza M. Parizi, et al.
Deleted Journal (2023) Vol. 2, Iss. 2, pp. 1-19
Closed Access | Times Cited: 21
SDIF-CNN: Stacking deep image features using fine-tuned convolution neural network models for real-world malware detection and classification
Sanjeev Kumar, Kajal Panda
Applied Soft Computing (2023) Vol. 146, pp. 110676-110676
Closed Access | Times Cited: 18
Sanjeev Kumar, Kajal Panda
Applied Soft Computing (2023) Vol. 146, pp. 110676-110676
Closed Access | Times Cited: 18
Blockchain-based deep learning in IoT, healthcare and cryptocurrency price prediction: a comprehensive review
Shefali Arora, Ruchi Mittal, Avinash K. Shrivastava, et al.
International Journal of Quality & Reliability Management (2024) Vol. 41, Iss. 8, pp. 2199-2225
Closed Access | Times Cited: 6
Shefali Arora, Ruchi Mittal, Avinash K. Shrivastava, et al.
International Journal of Quality & Reliability Management (2024) Vol. 41, Iss. 8, pp. 2199-2225
Closed Access | Times Cited: 6
Ransomware Anti-Analysis and Evasion Techniques: A Survey and Research Directions
Mohammad N. Olaimat, Mohd Aizaini Maarof, Bander Ali Saleh Al‐rimy
(2021)
Closed Access | Times Cited: 39
Mohammad N. Olaimat, Mohd Aizaini Maarof, Bander Ali Saleh Al‐rimy
(2021)
Closed Access | Times Cited: 39