
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Improving ransomware detection based on portable executable header using xception convolutional neural network
Caio Moreira, Davi Carvalho Moreira, Claudomiro de S. de Sales
Computers & Security (2023) Vol. 130, pp. 103265-103265
Closed Access | Times Cited: 24
Caio Moreira, Davi Carvalho Moreira, Claudomiro de S. de Sales
Computers & Security (2023) Vol. 130, pp. 103265-103265
Closed Access | Times Cited: 24
Showing 24 citing articles:
XRan: Explainable deep learning-based ransomware detection using dynamic analysis
Sibel Gulmez, Arzu Gorgulu Kakisim, İbrahim Soğukpınar
Computers & Security (2024) Vol. 139, pp. 103703-103703
Closed Access | Times Cited: 12
Sibel Gulmez, Arzu Gorgulu Kakisim, İbrahim Soğukpınar
Computers & Security (2024) Vol. 139, pp. 103703-103703
Closed Access | Times Cited: 12
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
Faria Nawshin, Radwa Gad, Devrim Ünal, et al.
Computers & Electrical Engineering (2024) Vol. 117, pp. 109233-109233
Open Access | Times Cited: 11
Faria Nawshin, Radwa Gad, Devrim Ünal, et al.
Computers & Electrical Engineering (2024) Vol. 117, pp. 109233-109233
Open Access | Times Cited: 11
MeMalDet: A memory analysis-based malware detection framework using deep autoencoders and stacked ensemble under temporal evaluations
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
Computers & Security (2024) Vol. 142, pp. 103864-103864
Open Access | Times Cited: 9
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
Computers & Security (2024) Vol. 142, pp. 103864-103864
Open Access | Times Cited: 9
Ransomware early detection: A survey
Mingcan Cen, Frank Jiang, Xingsheng Qin, et al.
Computer Networks (2023) Vol. 239, pp. 110138-110138
Open Access | Times Cited: 20
Mingcan Cen, Frank Jiang, Xingsheng Qin, et al.
Computer Networks (2023) Vol. 239, pp. 110138-110138
Open Access | Times Cited: 20
Analyzing Data Theft Ransomware Traffic Patterns Using BERT
Gabriela Almeida, Felipe Mendes de Vasconcelos
(2023)
Open Access | Times Cited: 16
Gabriela Almeida, Felipe Mendes de Vasconcelos
(2023)
Open Access | Times Cited: 16
Modelo de gestión para la atención y respuesta ante ataques de ransomware en el área de networking
Vanessa García Pineda, Edison Andrés Zapata Ochoa, Juan Camilo Gallego Gómez, et al.
Revista Sapientía (2025) Vol. 17, Iss. 33
Closed Access
Vanessa García Pineda, Edison Andrés Zapata Ochoa, Juan Camilo Gallego Gómez, et al.
Revista Sapientía (2025) Vol. 17, Iss. 33
Closed Access
Zero-Ran Sniff: A zero-day ransomware early detection method based on zero-shot learning
Mingcan Cen, XiZhen Deng, Frank Jiang, et al.
Computers & Security (2024) Vol. 142, pp. 103849-103849
Open Access | Times Cited: 4
Mingcan Cen, XiZhen Deng, Frank Jiang, et al.
Computers & Security (2024) Vol. 142, pp. 103849-103849
Open Access | Times Cited: 4
A Survey on ML Techniques for Multi-Platform Malware Detection: Securing PC, Mobile Devices, IoT, and Cloud Environments
Jannatul Ferdous, Rafiqul Islam, Arash Mahboubi, et al.
Sensors (2025) Vol. 25, Iss. 4, pp. 1153-1153
Open Access
Jannatul Ferdous, Rafiqul Islam, Arash Mahboubi, et al.
Sensors (2025) Vol. 25, Iss. 4, pp. 1153-1153
Open Access
A Survey of Recent Advances in Deep Learning Models for Detecting Malware in Desktop and Mobile Platforms
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
ACM Computing Surveys (2023) Vol. 56, Iss. 6, pp. 1-41
Closed Access | Times Cited: 12
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
ACM Computing Surveys (2023) Vol. 56, Iss. 6, pp. 1-41
Closed Access | Times Cited: 12
NTFS+: An Enhanced NTFS File System Against Ransomware Invasions
Yuanyuan Gu, Qian Kang
Research Square (Research Square) (2023)
Open Access | Times Cited: 9
Yuanyuan Gu, Qian Kang
Research Square (Research Square) (2023)
Open Access | Times Cited: 9
Machine Learning Classifier Algorithms for Ransomware Lockbit Prediction
Ibrahiem M. M. El Emary, Khalil Yaghi
Journal of Applied Data Sciences (2024) Vol. 5, Iss. 1, pp. 24-32
Open Access | Times Cited: 3
Ibrahiem M. M. El Emary, Khalil Yaghi
Journal of Applied Data Sciences (2024) Vol. 5, Iss. 1, pp. 24-32
Open Access | Times Cited: 3
A comprehensive analysis combining structural features for detection of new ransomware families
Caio Moreira, Davi Carvalho Moreira, Claudomiro Sales
Journal of Information Security and Applications (2024) Vol. 81, pp. 103716-103716
Closed Access | Times Cited: 1
Caio Moreira, Davi Carvalho Moreira, Claudomiro Sales
Journal of Information Security and Applications (2024) Vol. 81, pp. 103716-103716
Closed Access | Times Cited: 1
Top Cyber Threats: The Rise of Ransomware
Amir Djenna, Mohamed Belaoued, Nourdine Lifa
Lecture notes in computer science (2024), pp. 80-95
Closed Access | Times Cited: 1
Amir Djenna, Mohamed Belaoued, Nourdine Lifa
Lecture notes in computer science (2024), pp. 80-95
Closed Access | Times Cited: 1
PARCA: Proactive Anti-Ransomware Cybersecurity Approach
Amir Djenna, Mohamed Belaoued, Nourdine Lifa, et al.
Procedia Computer Science (2024) Vol. 238, pp. 821-826
Open Access | Times Cited: 1
Amir Djenna, Mohamed Belaoued, Nourdine Lifa, et al.
Procedia Computer Science (2024) Vol. 238, pp. 821-826
Open Access | Times Cited: 1
Jueun Jeon, Byeonghui Jeong, Seungyeon Baek, et al.
Expert Systems (2024)
Open Access | Times Cited: 1
An intelligent ransomware attack detection and classification using dual vision transformer with Mantis Search Split Attention Network
K. Ashwini, Nagasundara K.B.
Computers & Electrical Engineering (2024) Vol. 119, pp. 109509-109509
Closed Access | Times Cited: 1
K. Ashwini, Nagasundara K.B.
Computers & Electrical Engineering (2024) Vol. 119, pp. 109509-109509
Closed Access | Times Cited: 1
Enhancing Cybersecurity against Ransomware Attacks Using LSTM Deep Learning Method: A Case Study on Android Devices
Hatice Karaca, Adem Tekerek
Journal of Polytechnic (2024), pp. 1-1
Open Access | Times Cited: 1
Hatice Karaca, Adem Tekerek
Journal of Polytechnic (2024), pp. 1-1
Open Access | Times Cited: 1
RansoGuard: A RNN-based framework leveraging pre-attack sensitive APIs for early ransomware detection
Mingcan Cen, Frank Jiang, Robin Doss
Computers & Security (2024), pp. 104293-104293
Open Access | Times Cited: 1
Mingcan Cen, Frank Jiang, Robin Doss
Computers & Security (2024), pp. 104293-104293
Open Access | Times Cited: 1
Mitigating ransomware attacks through cyber threat intelligence and machine learning
Mamady Kante, Vivek Sharma, Keshav Gupta
Indonesian Journal of Electrical Engineering and Computer Science (2024) Vol. 33, Iss. 3, pp. 1958-1958
Open Access
Mamady Kante, Vivek Sharma, Keshav Gupta
Indonesian Journal of Electrical Engineering and Computer Science (2024) Vol. 33, Iss. 3, pp. 1958-1958
Open Access
Anticipating Threats through Malware Detection Approaches to safeguard Data Privacy and Security: An In-Depth Study
Shivangi Mehta, Lataben J. Gadhavi
(2024), pp. 1-8
Closed Access
Shivangi Mehta, Lataben J. Gadhavi
(2024), pp. 1-8
Closed Access
SoK: Visualization-based Malware Detection Techniques
Matteo Brosolo, Vinod Puthuvath, Asmitha KA, et al.
Proceedings of the 17th International Conference on Availability, Reliability and Security (2024), pp. 1-13
Closed Access
Matteo Brosolo, Vinod Puthuvath, Asmitha KA, et al.
Proceedings of the 17th International Conference on Availability, Reliability and Security (2024), pp. 1-13
Closed Access
Weather Image Recognition Based on Convolutional Neural Network and Transfer Learning
Zunhai Gao, Yuzhan Qiu
(2024), pp. 631-638
Closed Access
Zunhai Gao, Yuzhan Qiu
(2024), pp. 631-638
Closed Access
Emerging Ransomware Attacks: Improvement and Remedies - A Systematic Literature Review
Shuaib Ahmed Wadho, Yichiet Aun, Ming Lee Gan, et al.
(2023), pp. 148-153
Closed Access | Times Cited: 1
Shuaib Ahmed Wadho, Yichiet Aun, Ming Lee Gan, et al.
(2023), pp. 148-153
Closed Access | Times Cited: 1
Detection of Ransomware Attacks Using Weight of Evidence Technique
Rajat Shri Shrimal, Jyoti Gajrani, Vinesh Jain, et al.
(2023), pp. 76-81
Closed Access
Rajat Shri Shrimal, Jyoti Gajrani, Vinesh Jain, et al.
(2023), pp. 76-81
Closed Access