
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
SDIF-CNN: Stacking deep image features using fine-tuned convolution neural network models for real-world malware detection and classification
Sanjeev Kumar, Kajal Panda
Applied Soft Computing (2023) Vol. 146, pp. 110676-110676
Closed Access | Times Cited: 16
Sanjeev Kumar, Kajal Panda
Applied Soft Computing (2023) Vol. 146, pp. 110676-110676
Closed Access | Times Cited: 16
Showing 16 citing articles:
La inteligencia artificial en la seguridad informática: Una revisión literaria
Bernabé Ortega-Tenezaca, Lady Rodriguez Carmona, Edgar Macías Farias, et al.
Arandu-UTIC. (2025) Vol. 11, Iss. 2, pp. 2798-2819
Closed Access
Bernabé Ortega-Tenezaca, Lady Rodriguez Carmona, Edgar Macías Farias, et al.
Arandu-UTIC. (2025) Vol. 11, Iss. 2, pp. 2798-2819
Closed Access
Android malware detection based on feature fusion and the improved stacking ensemble model
Jiahao Zhang, Z. Xu, Zhi Xiong, et al.
Journal of Computer Virology and Hacking Techniques (2025) Vol. 21, Iss. 1
Closed Access
Jiahao Zhang, Z. Xu, Zhi Xiong, et al.
Journal of Computer Virology and Hacking Techniques (2025) Vol. 21, Iss. 1
Closed Access
Deep learning-powered malware detection in cyberspace: a contemporary review
Ananya Redhu, Prince Choudhary, Kathiravan Srinivasan, et al.
Frontiers in Physics (2024) Vol. 12
Open Access | Times Cited: 3
Ananya Redhu, Prince Choudhary, Kathiravan Srinivasan, et al.
Frontiers in Physics (2024) Vol. 12
Open Access | Times Cited: 3
Malware Detection and Classification System Based on CNN-BiLSTM
Haesoo Kim, Mihui Kim
Electronics (2024) Vol. 13, Iss. 13, pp. 2539-2539
Open Access | Times Cited: 1
Haesoo Kim, Mihui Kim
Electronics (2024) Vol. 13, Iss. 13, pp. 2539-2539
Open Access | Times Cited: 1
Hybrid feature extraction and integrated deep learning for cloud-based malware detection
Pham Sy Nguyen, Tran Nhat Huy, Tong Anh Tuan, et al.
Computers & Security (2024), pp. 104233-104233
Closed Access | Times Cited: 1
Pham Sy Nguyen, Tran Nhat Huy, Tong Anh Tuan, et al.
Computers & Security (2024), pp. 104233-104233
Closed Access | Times Cited: 1
Comprehensive Malware Classification and Visualization with EfficientNet Based Malware Image Transformations
Ceren Umay Özten, Adem Tekerek
Journal of Polytechnic (2024)
Open Access
Ceren Umay Özten, Adem Tekerek
Journal of Polytechnic (2024)
Open Access
Improve the interpretability of convolutional neural networks with probability density function
Yueqi Chen, Tingting Pan, Jie Yang
Information Sciences (2024), pp. 121796-121796
Closed Access
Yueqi Chen, Tingting Pan, Jie Yang
Information Sciences (2024), pp. 121796-121796
Closed Access
Transfer learning based multi-class malware classification using VGG16 feature extractor and SVM classifier
Harman Saggu, Er. Karandeep Singh, Tammisetti Nagendra Babu
(2024)
Closed Access
Harman Saggu, Er. Karandeep Singh, Tammisetti Nagendra Babu
(2024)
Closed Access
Feature Fusion for Malware Traffic Detection Using Image Visualization and Transfer Learning
Sanjeev Kumar, Yudhishthira Sapru, K. Purushottama Rao
(2024)
Closed Access
Sanjeev Kumar, Yudhishthira Sapru, K. Purushottama Rao
(2024)
Closed Access
MalViT: An Approach to Enhancing Malware Detection
Nrk Roshan, Debarghya Barik, S. Abijah Roseline
2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (2024), pp. 1-8
Closed Access
Nrk Roshan, Debarghya Barik, S. Abijah Roseline
2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (2024), pp. 1-8
Closed Access
Structured Defense Model Against DNP3-Based Critical Infrastructure Attacks
Erdal ÖZDOĞAN
Arabian Journal for Science and Engineering (2024)
Closed Access
Erdal ÖZDOĞAN
Arabian Journal for Science and Engineering (2024)
Closed Access
Malicious program detection using distinct textural features and fine-tuned InceptionV3 model
Sanjeev Kumar, Yudhishthira Sapru, Navdeep S. Chahal
(2024), pp. 1-6
Closed Access
Sanjeev Kumar, Yudhishthira Sapru, Navdeep S. Chahal
(2024), pp. 1-6
Closed Access
A Weighted Discrete Wavelet Transform-Based Capsule Network for Malware Classification
Tonghua Qiao, Chunjie Cao, Binghui Zou, et al.
Lecture notes in computer science (2024), pp. 259-274
Closed Access
Tonghua Qiao, Chunjie Cao, Binghui Zou, et al.
Lecture notes in computer science (2024), pp. 259-274
Closed Access
A Survey on Cybersecurity Enhancing Malware Classification using Deep Learning Convolution Neural Networks
Ahmed Hawana, Emad Said, Walid El‐Shafai, et al.
(2023), pp. 1-6
Closed Access
Ahmed Hawana, Emad Said, Walid El‐Shafai, et al.
(2023), pp. 1-6
Closed Access
Detection of Malware Using Machine Learning techniques on Random Forest, Decision Tree, KNeighbour, AdaBoost, SGD, ExtraTrees and GaussianNB Classifier
Kanwarpartap Singh Gill, Vatsala Anand, Rupesh Gupta, et al.
(2023), pp. 1-7
Closed Access
Kanwarpartap Singh Gill, Vatsala Anand, Rupesh Gupta, et al.
(2023), pp. 1-7
Closed Access