
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Development of a deep stacked ensemble with process based volatile memory forensics for platform independent malware detection and classification
Hamad Naeem, Shi Dong, Olorunjube James Falana, et al.
Expert Systems with Applications (2023) Vol. 223, pp. 119952-119952
Closed Access | Times Cited: 35
Hamad Naeem, Shi Dong, Olorunjube James Falana, et al.
Expert Systems with Applications (2023) Vol. 223, pp. 119952-119952
Closed Access | Times Cited: 35
Showing 1-25 of 35 citing articles:
Android malware detection and identification frameworks by leveraging the machine and deep learning techniques: A comprehensive review
Santosh K. Smmarwar, Govind P. Gupta, Sanjay Kumar
Telematics and Informatics Reports (2024) Vol. 14, pp. 100130-100130
Open Access | Times Cited: 20
Santosh K. Smmarwar, Govind P. Gupta, Sanjay Kumar
Telematics and Informatics Reports (2024) Vol. 14, pp. 100130-100130
Open Access | Times Cited: 20
AI-enabled approach for enhancing obfuscated malware detection: a hybrid ensemble learning with combined feature selection techniques
Md. Alamgir Hossain, Md. Alimul Haque, Sultan Ahmad, et al.
International Journal of Systems Assurance Engineering and Management (2024)
Closed Access | Times Cited: 16
Md. Alamgir Hossain, Md. Alimul Haque, Sultan Ahmad, et al.
International Journal of Systems Assurance Engineering and Management (2024)
Closed Access | Times Cited: 16
MeMalDet: A memory analysis-based malware detection framework using deep autoencoders and stacked ensemble under temporal evaluations
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
Computers & Security (2024) Vol. 142, pp. 103864-103864
Open Access | Times Cited: 9
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
Computers & Security (2024) Vol. 142, pp. 103864-103864
Open Access | Times Cited: 9
MalHyStack: A hybrid stacked ensemble learning framework with feature engineering schemes for obfuscated malware analysis
Kowshik Sankar Roy, Tanim Ahmed, Pritom Biswas Udas, et al.
Intelligent Systems with Applications (2023) Vol. 20, pp. 200283-200283
Open Access | Times Cited: 20
Kowshik Sankar Roy, Tanim Ahmed, Pritom Biswas Udas, et al.
Intelligent Systems with Applications (2023) Vol. 20, pp. 200283-200283
Open Access | Times Cited: 20
FABLDroid: Malware detection based on hybrid analysis with factor analysis and broad learning methods for android applications
Kazım Kiliç, İsmail Atacak, İbrahim Alper Doğru
Engineering Science and Technology an International Journal (2025) Vol. 62, pp. 101945-101945
Open Access
Kazım Kiliç, İsmail Atacak, İbrahim Alper Doğru
Engineering Science and Technology an International Journal (2025) Vol. 62, pp. 101945-101945
Open Access
Transformer-based malware detection using process resource utilization metrics
Dimosthenis Natsos, Andreas L. Symeonidis
Results in Engineering (2025) Vol. 25, pp. 104250-104250
Open Access
Dimosthenis Natsos, Andreas L. Symeonidis
Results in Engineering (2025) Vol. 25, pp. 104250-104250
Open Access
A Survey on ML Techniques for Multi-Platform Malware Detection: Securing PC, Mobile Devices, IoT, and Cloud Environments
Jannatul Ferdous, Rafiqul Islam, Arash Mahboubi, et al.
Sensors (2025) Vol. 25, Iss. 4, pp. 1153-1153
Open Access
Jannatul Ferdous, Rafiqul Islam, Arash Mahboubi, et al.
Sensors (2025) Vol. 25, Iss. 4, pp. 1153-1153
Open Access
Leveraging Memory Forensic Features for Explainable Obfuscated Malware Detection with Isolated Family Distinction Paradigm
S. Sharmila, Shubham Gupta, Aruna Tiwari, et al.
Computers & Electrical Engineering (2025) Vol. 123, pp. 110107-110107
Closed Access
S. Sharmila, Shubham Gupta, Aruna Tiwari, et al.
Computers & Electrical Engineering (2025) Vol. 123, pp. 110107-110107
Closed Access
MA_BiRAE - Malware analysis and detection technique using adversarial learning and deep learning
Surbhi Prakash, Amar Kumar Mohapatra
Journal of Information Security and Applications (2025) Vol. 90, pp. 104009-104009
Closed Access
Surbhi Prakash, Amar Kumar Mohapatra
Journal of Information Security and Applications (2025) Vol. 90, pp. 104009-104009
Closed Access
An Advanced Ensemble Framework for defending against obfuscated Windows, Android, and IoT malware
Danish Vasan, Junaid Akram, Mohammad Hammoudeh, et al.
Applied Soft Computing (2025), pp. 112908-112908
Closed Access
Danish Vasan, Junaid Akram, Mohammad Hammoudeh, et al.
Applied Soft Computing (2025), pp. 112908-112908
Closed Access
A malware classification method based on directed API call relationships
C. Ma, Zhenwan Li, Haixia Long, et al.
PLoS ONE (2025) Vol. 20, Iss. 3, pp. e0299706-e0299706
Open Access
C. Ma, Zhenwan Li, Haixia Long, et al.
PLoS ONE (2025) Vol. 20, Iss. 3, pp. e0299706-e0299706
Open Access
FEDetect: A Federated Learning-Based Malware Detection and Classification Using Deep Neural Network Algorithms
Zeki Çıplak, Kazım Yıldız, Şahsene Altınkaya
Arabian Journal for Science and Engineering (2025)
Open Access
Zeki Çıplak, Kazım Yıldız, Şahsene Altınkaya
Arabian Journal for Science and Engineering (2025)
Open Access
A Survey of Recent Advances in Deep Learning Models for Detecting Malware in Desktop and Mobile Platforms
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
ACM Computing Surveys (2023) Vol. 56, Iss. 6, pp. 1-41
Closed Access | Times Cited: 12
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
ACM Computing Surveys (2023) Vol. 56, Iss. 6, pp. 1-41
Closed Access | Times Cited: 12
Decision Preference Networks in Ensemble Classification learning: Focusing on decision preferences and influences
X. Li, Min Guo, Kaiguang Wang, et al.
Information Processing & Management (2025) Vol. 62, Iss. 4, pp. 104133-104133
Closed Access
X. Li, Min Guo, Kaiguang Wang, et al.
Information Processing & Management (2025) Vol. 62, Iss. 4, pp. 104133-104133
Closed Access
Radon transform based malware classification in cyber-physical system using deep learning
Rasim Alguliyev, Ramiz M. Aliguliyev, Lyudmila Sukhostat
Results in Control and Optimization (2024) Vol. 14, pp. 100382-100382
Open Access | Times Cited: 3
Rasim Alguliyev, Ramiz M. Aliguliyev, Lyudmila Sukhostat
Results in Control and Optimization (2024) Vol. 14, pp. 100382-100382
Open Access | Times Cited: 3
Deep learning-powered malware detection in cyberspace: a contemporary review
Ananya Redhu, Prince Choudhary, Kathiravan Srinivasan, et al.
Frontiers in Physics (2024) Vol. 12
Open Access | Times Cited: 3
Ananya Redhu, Prince Choudhary, Kathiravan Srinivasan, et al.
Frontiers in Physics (2024) Vol. 12
Open Access | Times Cited: 3
VolMemDroid—Investigating android malware insights with volatile memory artifacts
Saneeha Khalid, Faisal Hussain
Expert Systems with Applications (2024) Vol. 253, pp. 124347-124347
Closed Access | Times Cited: 2
Saneeha Khalid, Faisal Hussain
Expert Systems with Applications (2024) Vol. 253, pp. 124347-124347
Closed Access | Times Cited: 2
Recent Applications of Explainable AI (XAI): A Systematic Literature Review
Mirka Saarela, Vili Podgorelec
Applied Sciences (2024) Vol. 14, Iss. 19, pp. 8884-8884
Open Access | Times Cited: 2
Mirka Saarela, Vili Podgorelec
Applied Sciences (2024) Vol. 14, Iss. 19, pp. 8884-8884
Open Access | Times Cited: 2
MalDetect: A classifier fusion approach for detection of android malware
Meghna Dhalaria, Ekta Gandotra
Expert Systems with Applications (2023) Vol. 235, pp. 121155-121155
Closed Access | Times Cited: 6
Meghna Dhalaria, Ekta Gandotra
Expert Systems with Applications (2023) Vol. 235, pp. 121155-121155
Closed Access | Times Cited: 6
Malware Classification Using Machine Learning Models
Sudesh Kumar, Shersingh, Siddhant kumar, et al.
Procedia Computer Science (2024) Vol. 235, pp. 1419-1428
Open Access | Times Cited: 1
Sudesh Kumar, Shersingh, Siddhant kumar, et al.
Procedia Computer Science (2024) Vol. 235, pp. 1419-1428
Open Access | Times Cited: 1
GSB: GNGS and SAG-BiGRU network for malware dynamic detection
Zhanhui Hu, Guangzhong Liu, Xinyu Xiang, et al.
PLoS ONE (2024) Vol. 19, Iss. 4, pp. e0298809-e0298809
Open Access | Times Cited: 1
Zhanhui Hu, Guangzhong Liu, Xinyu Xiang, et al.
PLoS ONE (2024) Vol. 19, Iss. 4, pp. e0298809-e0298809
Open Access | Times Cited: 1
Modeling and automation of the process for detecting duplicate objects in memory snapshots
Nikolay Y. Mitikov, Natalia Guk
Herald of Advanced Information Technology (2024) Vol. 7, Iss. 2, pp. 147-157
Open Access | Times Cited: 1
Nikolay Y. Mitikov, Natalia Guk
Herald of Advanced Information Technology (2024) Vol. 7, Iss. 2, pp. 147-157
Open Access | Times Cited: 1
Malware Detection and Classification System Based on CNN-BiLSTM
Haesoo Kim, Mihui Kim
Electronics (2024) Vol. 13, Iss. 13, pp. 2539-2539
Open Access | Times Cited: 1
Haesoo Kim, Mihui Kim
Electronics (2024) Vol. 13, Iss. 13, pp. 2539-2539
Open Access | Times Cited: 1
MDGraph: A novel malware detection method based on memory dump and graph neural network
Qiyuan Li, Bo Zhang, Donghai Tian, et al.
Expert Systems with Applications (2024) Vol. 255, pp. 124776-124776
Closed Access | Times Cited: 1
Qiyuan Li, Bo Zhang, Donghai Tian, et al.
Expert Systems with Applications (2024) Vol. 255, pp. 124776-124776
Closed Access | Times Cited: 1
MFEMDroid: A Novel Malware Detection Framework Using Combined Multitype Features and Ensemble Modeling
Wei Gu, Hongyan Xing, Tianhao Hou
IET Information Security (2024) Vol. 2024, pp. 1-12
Open Access
Wei Gu, Hongyan Xing, Tianhao Hou
IET Information Security (2024) Vol. 2024, pp. 1-12
Open Access