
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Image-based malware classification using section distribution information
Mao Xiao, Chun Guo, Guowei Shen, et al.
Computers & Security (2021) Vol. 110, pp. 102420-102420
Closed Access | Times Cited: 39
Mao Xiao, Chun Guo, Guowei Shen, et al.
Computers & Security (2021) Vol. 110, pp. 102420-102420
Closed Access | Times Cited: 39
Showing 1-25 of 39 citing articles:
A survey of malware detection using deep learning
Ahmed Bensaoud, Jugal Kalita, Mahmoud Bensaoud
Machine Learning with Applications (2024) Vol. 16, pp. 100546-100546
Open Access | Times Cited: 16
Ahmed Bensaoud, Jugal Kalita, Mahmoud Bensaoud
Machine Learning with Applications (2024) Vol. 16, pp. 100546-100546
Open Access | Times Cited: 16
Fusing feature engineering and deep learning: A case study for malware classification
Daniel Gibert, Jordi Planes, Carles Mateu, et al.
Expert Systems with Applications (2022) Vol. 207, pp. 117957-117957
Open Access | Times Cited: 47
Daniel Gibert, Jordi Planes, Carles Mateu, et al.
Expert Systems with Applications (2022) Vol. 207, pp. 117957-117957
Open Access | Times Cited: 47
MCTVD: A malware classification method based on three-channel visualization and deep learning
Huaxin Deng, Chun Guo, Guowei Shen, et al.
Computers & Security (2023) Vol. 126, pp. 103084-103084
Closed Access | Times Cited: 21
Huaxin Deng, Chun Guo, Guowei Shen, et al.
Computers & Security (2023) Vol. 126, pp. 103084-103084
Closed Access | Times Cited: 21
Generative adversarial networks and image-based malware classification
Huy Toan Nguyen, Fabio Di Troia, Genya Ishigaki, et al.
Journal of Computer Virology and Hacking Techniques (2023) Vol. 19, Iss. 4, pp. 579-595
Open Access | Times Cited: 17
Huy Toan Nguyen, Fabio Di Troia, Genya Ishigaki, et al.
Journal of Computer Virology and Hacking Techniques (2023) Vol. 19, Iss. 4, pp. 579-595
Open Access | Times Cited: 17
Efficient Ransomware Detection via Portable Executable File Image Analysis By LLaMA-7b
Xiang Li, Tingting Zhu, Wenbo Zhang
Research Square (Research Square) (2023)
Open Access | Times Cited: 17
Xiang Li, Tingting Zhu, Wenbo Zhang
Research Square (Research Square) (2023)
Open Access | Times Cited: 17
Broad learning: A GPU-free image-based malware classification
Danish Vasan, Mohammad Hammoudeh, Mamoun Alazab
Applied Soft Computing (2024) Vol. 154, pp. 111401-111401
Closed Access | Times Cited: 7
Danish Vasan, Mohammad Hammoudeh, Mamoun Alazab
Applied Soft Computing (2024) Vol. 154, pp. 111401-111401
Closed Access | Times Cited: 7
MalSort: Lightweight and efficient image-based malware classification using masked self-supervised framework with Swin Transformer
Fangwei Wang, Xipeng Shi, Fang Yang, et al.
Journal of Information Security and Applications (2024) Vol. 83, pp. 103784-103784
Closed Access | Times Cited: 5
Fangwei Wang, Xipeng Shi, Fang Yang, et al.
Journal of Information Security and Applications (2024) Vol. 83, pp. 103784-103784
Closed Access | Times Cited: 5
A lightweight machine learning methods for malware classification
Mahmoud E. Farfoura, Ibrahim Mashal, Ahmad Alkhatib, et al.
Cluster Computing (2024) Vol. 28, Iss. 1
Closed Access | Times Cited: 5
Mahmoud E. Farfoura, Ibrahim Mashal, Ahmad Alkhatib, et al.
Cluster Computing (2024) Vol. 28, Iss. 1
Closed Access | Times Cited: 5
FLSH: A Framework Leveraging Similarity Hashing for Android Malware and Variant Detection
Hassan Jalil Hadi, Aqsa Khalid, Faisal Bashir Hussain, et al.
IEEE Access (2025) Vol. 13, pp. 26142-26156
Open Access
Hassan Jalil Hadi, Aqsa Khalid, Faisal Bashir Hussain, et al.
IEEE Access (2025) Vol. 13, pp. 26142-26156
Open Access
Radon transform based malware classification in cyber-physical system using deep learning
Rasim Alguliyev, Ramiz M. Aliguliyev, Lyudmila Sukhostat
Results in Control and Optimization (2024) Vol. 14, pp. 100382-100382
Open Access | Times Cited: 4
Rasim Alguliyev, Ramiz M. Aliguliyev, Lyudmila Sukhostat
Results in Control and Optimization (2024) Vol. 14, pp. 100382-100382
Open Access | Times Cited: 4
Towards a Malware Family Classification Model Using Static Call Graph Instruction Visualization
Attila Mester, Zalán Bodó, P. Vinod, et al.
Lecture notes in computer science (2025), pp. 167-186
Closed Access
Attila Mester, Zalán Bodó, P. Vinod, et al.
Lecture notes in computer science (2025), pp. 167-186
Closed Access
A Study on Feature Extraction Methods for Effective Malware Detection: DCT, LBP, and HOG
Mohamad Faiz Mohd Amin, Raja Abdullah Raja Ahmad, Ahmad Ashraf Abdul Halim, et al.
Studies in computational intelligence (2025), pp. 339-348
Closed Access
Mohamad Faiz Mohd Amin, Raja Abdullah Raja Ahmad, Ahmad Ashraf Abdul Halim, et al.
Studies in computational intelligence (2025), pp. 339-348
Closed Access
BHMDC: A byte and hex n-gram based malware detection and classification method
Yonghe Tang, Xuyan Qi, Jing Jing, et al.
Computers & Security (2023) Vol. 128, pp. 103118-103118
Closed Access | Times Cited: 8
Yonghe Tang, Xuyan Qi, Jing Jing, et al.
Computers & Security (2023) Vol. 128, pp. 103118-103118
Closed Access | Times Cited: 8
Attention-Based Cross-Modal CNN Using Non-Disassembled Files for Malware Classification
Jeongwoo Kim, Joon‐Young Paik, Eun-Sun Cho
IEEE Access (2023) Vol. 11, pp. 22889-22903
Open Access | Times Cited: 8
Jeongwoo Kim, Joon‐Young Paik, Eun-Sun Cho
IEEE Access (2023) Vol. 11, pp. 22889-22903
Open Access | Times Cited: 8
IMCLNet: A lightweight deep neural network for Image-based Malware Classification
Binghui Zou, Chunjie Cao, Fangjian Tao, et al.
Journal of Information Security and Applications (2022) Vol. 70, pp. 103313-103313
Closed Access | Times Cited: 13
Binghui Zou, Chunjie Cao, Fangjian Tao, et al.
Journal of Information Security and Applications (2022) Vol. 70, pp. 103313-103313
Closed Access | Times Cited: 13
Visualizing Portable Executable Headers for Ransomware Detection: A Deep Learning-Based Approach
T. Dam, N. Nguyen, Viet Trung Le, et al.
JUCS - Journal of Universal Computer Science (2024) Vol. 30, Iss. 2, pp. 262-286
Open Access | Times Cited: 2
T. Dam, N. Nguyen, Viet Trung Le, et al.
JUCS - Journal of Universal Computer Science (2024) Vol. 30, Iss. 2, pp. 262-286
Open Access | Times Cited: 2
Stories behind decisions: Towards interpretable malware family classification with hierarchical attention
Huaifeng Bao, Wenhao Li, Huashan Chen, et al.
Computers & Security (2024) Vol. 144, pp. 103943-103943
Closed Access | Times Cited: 2
Huaifeng Bao, Wenhao Li, Huashan Chen, et al.
Computers & Security (2024) Vol. 144, pp. 103943-103943
Closed Access | Times Cited: 2
Review on Malware Classification and Malware Detection Using Transfer Learning Approach
V. Priya, A. Sathya Sofia
2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT) (2023), pp. 1042-1049
Closed Access | Times Cited: 6
V. Priya, A. Sathya Sofia
2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT) (2023), pp. 1042-1049
Closed Access | Times Cited: 6
MalRed: An innovative approach for detecting malware using the red channel analysis of color images
Syed Shakir Hameed Shah, Norziana Jamil, Atta ur Rehman Khan, et al.
Egyptian Informatics Journal (2024) Vol. 26, pp. 100478-100478
Open Access | Times Cited: 1
Syed Shakir Hameed Shah, Norziana Jamil, Atta ur Rehman Khan, et al.
Egyptian Informatics Journal (2024) Vol. 26, pp. 100478-100478
Open Access | Times Cited: 1
MIRACLE: Malware image recognition and classification by layered extraction
Inzamamul Alam, Md. Samiullah, S M Asaduzzaman, et al.
Data Mining and Knowledge Discovery (2024) Vol. 39, Iss. 1
Closed Access | Times Cited: 1
Inzamamul Alam, Md. Samiullah, S M Asaduzzaman, et al.
Data Mining and Knowledge Discovery (2024) Vol. 39, Iss. 1
Closed Access | Times Cited: 1
Malware Variants Detection Model Based on MFF–HDBA
Shuo Wang, Jian Wang, Yafei Song, et al.
Applied Sciences (2022) Vol. 12, Iss. 19, pp. 9593-9593
Open Access | Times Cited: 4
Shuo Wang, Jian Wang, Yafei Song, et al.
Applied Sciences (2022) Vol. 12, Iss. 19, pp. 9593-9593
Open Access | Times Cited: 4
Fusing Feature Engineering and Deep Learning: A Case Study for Malware Classification
Daniel Gibert, Carles Mateu, Jordi Planes, et al.
arXiv (Cornell University) (2022)
Open Access | Times Cited: 3
Daniel Gibert, Carles Mateu, Jordi Planes, et al.
arXiv (Cornell University) (2022)
Open Access | Times Cited: 3
Malred: An Innovative Approach for Detecting Malware Using the Red Channel Analysis of Color Images
Syed Shakir Hameed Shah, Norziana Jamil, Atta ur Rehman Khan, et al.
(2024)
Closed Access
Syed Shakir Hameed Shah, Norziana Jamil, Atta ur Rehman Khan, et al.
(2024)
Closed Access
SoK: Visualization-based Malware Detection Techniques
Matteo Brosolo, Vinod Puthuvath, Asmitha KA, et al.
Proceedings of the 17th International Conference on Availability, Reliability and Security (2024), pp. 1-13
Closed Access
Matteo Brosolo, Vinod Puthuvath, Asmitha KA, et al.
Proceedings of the 17th International Conference on Availability, Reliability and Security (2024), pp. 1-13
Closed Access
Malware Classification Based on EfficientNetV2 and Feature Fusion
晖智 杨
Computer Science and Application (2024) Vol. 14, Iss. 09, pp. 151-160
Closed Access
晖智 杨
Computer Science and Application (2024) Vol. 14, Iss. 09, pp. 151-160
Closed Access