OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Improving ransomware detection based on portable executable header using xception convolutional neural network
Caio Moreira, Davi Carvalho Moreira, Claudomiro de S. de Sales
Computers & Security (2023) Vol. 130, pp. 103265-103265
Closed Access | Times Cited: 24

Showing 24 citing articles:

XRan: Explainable deep learning-based ransomware detection using dynamic analysis
Sibel Gulmez, Arzu Gorgulu Kakisim, İbrahim Soğukpınar
Computers & Security (2024) Vol. 139, pp. 103703-103703
Closed Access | Times Cited: 12

Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
Faria Nawshin, Radwa Gad, Devrim Ünal, et al.
Computers & Electrical Engineering (2024) Vol. 117, pp. 109233-109233
Open Access | Times Cited: 11

MeMalDet: A memory analysis-based malware detection framework using deep autoencoders and stacked ensemble under temporal evaluations
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
Computers & Security (2024) Vol. 142, pp. 103864-103864
Open Access | Times Cited: 9

Ransomware early detection: A survey
Mingcan Cen, Frank Jiang, Xingsheng Qin, et al.
Computer Networks (2023) Vol. 239, pp. 110138-110138
Open Access | Times Cited: 20

Analyzing Data Theft Ransomware Traffic Patterns Using BERT
Gabriela Almeida, Felipe Mendes de Vasconcelos
(2023)
Open Access | Times Cited: 16

Modelo de gestión para la atención y respuesta ante ataques de ransomware en el área de networking
Vanessa García Pineda, Edison Andrés Zapata Ochoa, Juan Camilo Gallego Gómez, et al.
Revista Sapientía (2025) Vol. 17, Iss. 33
Closed Access

Zero-Ran Sniff: A zero-day ransomware early detection method based on zero-shot learning
Mingcan Cen, XiZhen Deng, Frank Jiang, et al.
Computers & Security (2024) Vol. 142, pp. 103849-103849
Open Access | Times Cited: 4

A Survey on ML Techniques for Multi-Platform Malware Detection: Securing PC, Mobile Devices, IoT, and Cloud Environments
Jannatul Ferdous, Rafiqul Islam, Arash Mahboubi, et al.
Sensors (2025) Vol. 25, Iss. 4, pp. 1153-1153
Open Access

A Survey of Recent Advances in Deep Learning Models for Detecting Malware in Desktop and Mobile Platforms
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
ACM Computing Surveys (2023) Vol. 56, Iss. 6, pp. 1-41
Closed Access | Times Cited: 12

NTFS+: An Enhanced NTFS File System Against Ransomware Invasions
Yuanyuan Gu, Qian Kang
Research Square (Research Square) (2023)
Open Access | Times Cited: 9

Machine Learning Classifier Algorithms for Ransomware Lockbit Prediction
Ibrahiem M. M. El Emary, Khalil Yaghi
Journal of Applied Data Sciences (2024) Vol. 5, Iss. 1, pp. 24-32
Open Access | Times Cited: 3

A comprehensive analysis combining structural features for detection of new ransomware families
Caio Moreira, Davi Carvalho Moreira, Claudomiro Sales
Journal of Information Security and Applications (2024) Vol. 81, pp. 103716-103716
Closed Access | Times Cited: 1

Top Cyber Threats: The Rise of Ransomware
Amir Djenna, Mohamed Belaoued, Nourdine Lifa
Lecture notes in computer science (2024), pp. 80-95
Closed Access | Times Cited: 1

PARCA: Proactive Anti-Ransomware Cybersecurity Approach
Amir Djenna, Mohamed Belaoued, Nourdine Lifa, et al.
Procedia Computer Science (2024) Vol. 238, pp. 821-826
Open Access | Times Cited: 1

TMaD: Three‐tier malware detection using multi‐view feature for secure convergence ICT environments
Jueun Jeon, Byeonghui Jeong, Seungyeon Baek, et al.
Expert Systems (2024)
Open Access | Times Cited: 1

An intelligent ransomware attack detection and classification using dual vision transformer with Mantis Search Split Attention Network
K. Ashwini, Nagasundara K.B.
Computers & Electrical Engineering (2024) Vol. 119, pp. 109509-109509
Closed Access | Times Cited: 1

RansoGuard: A RNN-based framework leveraging pre-attack sensitive APIs for early ransomware detection
Mingcan Cen, Frank Jiang, Robin Doss
Computers & Security (2024), pp. 104293-104293
Open Access | Times Cited: 1

Mitigating ransomware attacks through cyber threat intelligence and machine learning
Mamady Kante, Vivek Sharma, Keshav Gupta
Indonesian Journal of Electrical Engineering and Computer Science (2024) Vol. 33, Iss. 3, pp. 1958-1958
Open Access

SoK: Visualization-based Malware Detection Techniques
Matteo Brosolo, Vinod Puthuvath, Asmitha KA, et al.
Proceedings of the 17th International Conference on Availability, Reliability and Security (2024), pp. 1-13
Closed Access

Emerging Ransomware Attacks: Improvement and Remedies - A Systematic Literature Review
Shuaib Ahmed Wadho, Yichiet Aun, Ming Lee Gan, et al.
(2023), pp. 148-153
Closed Access | Times Cited: 1

Detection of Ransomware Attacks Using Weight of Evidence Technique
Rajat Shri Shrimal, Jyoti Gajrani, Vinesh Jain, et al.
(2023), pp. 76-81
Closed Access

Page 1

Scroll to top