
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A novel malware classification and augmentation model based on convolutional neural network
Adem Tekerek, Muhammed Mutlu Yapıcı
Computers & Security (2021) Vol. 112, pp. 102515-102515
Closed Access | Times Cited: 55
Adem Tekerek, Muhammed Mutlu Yapıcı
Computers & Security (2021) Vol. 112, pp. 102515-102515
Closed Access | Times Cited: 55
Showing 1-25 of 55 citing articles:
A novel machine learning approach for detecting first-time-appeared malware
Kamran Shaukat, Suhuai Luo, Vijay Varadharajan
Engineering Applications of Artificial Intelligence (2024) Vol. 131, pp. 107801-107801
Open Access | Times Cited: 24
Kamran Shaukat, Suhuai Luo, Vijay Varadharajan
Engineering Applications of Artificial Intelligence (2024) Vol. 131, pp. 107801-107801
Open Access | Times Cited: 24
Malware Detection Using Memory Analysis Data in Big Data Environment
Murat Dener, Gökçe Ok, Abdullah Orman
Applied Sciences (2022) Vol. 12, Iss. 17, pp. 8604-8604
Open Access | Times Cited: 47
Murat Dener, Gökçe Ok, Abdullah Orman
Applied Sciences (2022) Vol. 12, Iss. 17, pp. 8604-8604
Open Access | Times Cited: 47
API-MalDetect: Automated malware detection framework for windows based on API calls and deep learning techniques
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
Journal of Network and Computer Applications (2023) Vol. 218, pp. 103704-103704
Open Access | Times Cited: 31
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
Journal of Network and Computer Applications (2023) Vol. 218, pp. 103704-103704
Open Access | Times Cited: 31
MeMalDet: A memory analysis-based malware detection framework using deep autoencoders and stacked ensemble under temporal evaluations
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
Computers & Security (2024) Vol. 142, pp. 103864-103864
Open Access | Times Cited: 9
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
Computers & Security (2024) Vol. 142, pp. 103864-103864
Open Access | Times Cited: 9
MalHAPGNN: An Enhanced Call Graph-Based Malware Detection Framework Using Hierarchical Attention Pooling Graph Neural Network
Wenjie Guo, Wei Du, Xiuqi Yang, et al.
Sensors (2025) Vol. 25, Iss. 2, pp. 374-374
Open Access
Wenjie Guo, Wei Du, Xiuqi Yang, et al.
Sensors (2025) Vol. 25, Iss. 2, pp. 374-374
Open Access
A Survey on ML Techniques for Multi-Platform Malware Detection: Securing PC, Mobile Devices, IoT, and Cloud Environments
Jannatul Ferdous, Rafiqul Islam, Arash Mahboubi, et al.
Sensors (2025) Vol. 25, Iss. 4, pp. 1153-1153
Open Access
Jannatul Ferdous, Rafiqul Islam, Arash Mahboubi, et al.
Sensors (2025) Vol. 25, Iss. 4, pp. 1153-1153
Open Access
Semantic lossless encoded image representation for malware classification
Yaoxiang Yu, Bo Cai, Kamran Aziz, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Yaoxiang Yu, Bo Cai, Kamran Aziz, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
MalSPM: Metamorphic malware behavior analysis and classification using sequential pattern mining
M. Saqib Nawaz, Philippe Fournier‐Viger, M. Zohaib Nawaz, et al.
Computers & Security (2022) Vol. 118, pp. 102741-102741
Closed Access | Times Cited: 23
M. Saqib Nawaz, Philippe Fournier‐Viger, M. Zohaib Nawaz, et al.
Computers & Security (2022) Vol. 118, pp. 102741-102741
Closed Access | Times Cited: 23
A New Framework for Visual Classification of Multi-Channel Malware Based on Transfer Learning
Zilin Zhao, Shumian Yang, Dawei Zhao
Applied Sciences (2023) Vol. 13, Iss. 4, pp. 2484-2484
Open Access | Times Cited: 13
Zilin Zhao, Shumian Yang, Dawei Zhao
Applied Sciences (2023) Vol. 13, Iss. 4, pp. 2484-2484
Open Access | Times Cited: 13
A Survey of Recent Advances in Deep Learning Models for Detecting Malware in Desktop and Mobile Platforms
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
ACM Computing Surveys (2023) Vol. 56, Iss. 6, pp. 1-41
Closed Access | Times Cited: 12
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
ACM Computing Surveys (2023) Vol. 56, Iss. 6, pp. 1-41
Closed Access | Times Cited: 12
Using 3D-VGG-16 and 3D-Resnet-18 deep learning models and FABEMD techniques in the detection of malware
Wadha Al-Khater, Somaya Al-Máadeed
Alexandria Engineering Journal (2024) Vol. 89, pp. 39-52
Open Access | Times Cited: 4
Wadha Al-Khater, Somaya Al-Máadeed
Alexandria Engineering Journal (2024) Vol. 89, pp. 39-52
Open Access | Times Cited: 4
Obfuscated malware detection using dilated convolutional network
Anzhelika Mezina, Radim Bürget
(2022), pp. 110-115
Closed Access | Times Cited: 20
Anzhelika Mezina, Radim Bürget
(2022), pp. 110-115
Closed Access | Times Cited: 20
A systematic literature review on Windows malware detection: Techniques, research issues, and future directions
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
Journal of Systems and Software (2023) Vol. 209, pp. 111921-111921
Open Access | Times Cited: 10
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
Journal of Systems and Software (2023) Vol. 209, pp. 111921-111921
Open Access | Times Cited: 10
Radon transform based malware classification in cyber-physical system using deep learning
Rasim Alguliyev, Ramiz M. Aliguliyev, Lyudmila Sukhostat
Results in Control and Optimization (2024) Vol. 14, pp. 100382-100382
Open Access | Times Cited: 3
Rasim Alguliyev, Ramiz M. Aliguliyev, Lyudmila Sukhostat
Results in Control and Optimization (2024) Vol. 14, pp. 100382-100382
Open Access | Times Cited: 3
Convolutional neural network model for discrimination of harmful algal bloom (HAB) from non-HABs using Sentinel-3 OLCI imagery
Jisun Shin, Boo‐Keun Khim, Lee-Hyun Jang, et al.
ISPRS Journal of Photogrammetry and Remote Sensing (2022) Vol. 191, pp. 250-262
Closed Access | Times Cited: 14
Jisun Shin, Boo‐Keun Khim, Lee-Hyun Jang, et al.
ISPRS Journal of Photogrammetry and Remote Sensing (2022) Vol. 191, pp. 250-262
Closed Access | Times Cited: 14
Malware detection with dynamic evolving graph convolutional networks
Zikai Zhang, Yidong Li, Wei Wang, et al.
International Journal of Intelligent Systems (2022) Vol. 37, Iss. 10, pp. 7261-7280
Closed Access | Times Cited: 13
Zikai Zhang, Yidong Li, Wei Wang, et al.
International Journal of Intelligent Systems (2022) Vol. 37, Iss. 10, pp. 7261-7280
Closed Access | Times Cited: 13
An Efficient Boosting-Based Windows Malware Family Classification System Using Multi-Features Fusion
Zhiguo Chen, Xuanyu Ren
Applied Sciences (2023) Vol. 13, Iss. 6, pp. 4060-4060
Open Access | Times Cited: 7
Zhiguo Chen, Xuanyu Ren
Applied Sciences (2023) Vol. 13, Iss. 6, pp. 4060-4060
Open Access | Times Cited: 7
Image-Based Malware Classification Method with the AlexNet Convolutional Neural Network Model
Zilin Zhao, Dawei Zhao, Shumian Yang, et al.
Security and Communication Networks (2023) Vol. 2023, pp. 1-15
Open Access | Times Cited: 7
Zilin Zhao, Dawei Zhao, Shumian Yang, et al.
Security and Communication Networks (2023) Vol. 2023, pp. 1-15
Open Access | Times Cited: 7
FACILE: A capsule network with fewer capsules and richer hierarchical information for malware image classification
Binghui Zou, Chunjie Cao, Longjuan Wang, et al.
Computers & Security (2023) Vol. 137, pp. 103606-103606
Closed Access | Times Cited: 7
Binghui Zou, Chunjie Cao, Longjuan Wang, et al.
Computers & Security (2023) Vol. 137, pp. 103606-103606
Closed Access | Times Cited: 7
A Review on Radar-Based Human Detection Techniques
Muhammet Talha Büyükakkaşlar, Mehmet Ali Ertürk, Muhammed Ali Aydın
Sensors (2024) Vol. 24, Iss. 17, pp. 5709-5709
Open Access | Times Cited: 2
Muhammet Talha Büyükakkaşlar, Mehmet Ali Ertürk, Muhammed Ali Aydın
Sensors (2024) Vol. 24, Iss. 17, pp. 5709-5709
Open Access | Times Cited: 2
Image-Based Malware Detection Using α-Cuts and Binary Visualisation
Betty Saridou, Isidoros Moulas, Stavros Shiaeles, et al.
Applied Sciences (2023) Vol. 13, Iss. 7, pp. 4624-4624
Open Access | Times Cited: 6
Betty Saridou, Isidoros Moulas, Stavros Shiaeles, et al.
Applied Sciences (2023) Vol. 13, Iss. 7, pp. 4624-4624
Open Access | Times Cited: 6
An Improved Land Use Classification Method Based on DeepLab V3+ Under GauGAN Data Enhancement
Kang Zheng, Haiying Wang, Feng Qin, et al.
IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing (2023) Vol. 16, pp. 5526-5537
Open Access | Times Cited: 6
Kang Zheng, Haiying Wang, Feng Qin, et al.
IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing (2023) Vol. 16, pp. 5526-5537
Open Access | Times Cited: 6
Efficient Windows malware identification and classification scheme for plant protection information systems
Zhiguo Chen, Shuangshuang Xing, Xuanyu Ren
Frontiers in Plant Science (2023) Vol. 14
Open Access | Times Cited: 5
Zhiguo Chen, Shuangshuang Xing, Xuanyu Ren
Frontiers in Plant Science (2023) Vol. 14
Open Access | Times Cited: 5
MRm-DLDet: a memory-resident malware detection framework based on memory forensics and deep neural network
Jiaxi Liu, Yunjiang Feng, Xinyu Liu, et al.
Cybersecurity (2023) Vol. 6, Iss. 1
Open Access | Times Cited: 5
Jiaxi Liu, Yunjiang Feng, Xinyu Liu, et al.
Cybersecurity (2023) Vol. 6, Iss. 1
Open Access | Times Cited: 5
Unveiling shadows: A comprehensive framework for insider threat detection based on statistical and sequential analysis
Haitao Xiao, Yan Zhu, Bin Zhang, et al.
Computers & Security (2023) Vol. 138, pp. 103665-103665
Closed Access | Times Cited: 5
Haitao Xiao, Yan Zhu, Bin Zhang, et al.
Computers & Security (2023) Vol. 138, pp. 103665-103665
Closed Access | Times Cited: 5