
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A hybrid deep learning image-based analysis for effective malware detection
Sitalakshmi Venkatraman, Mamoun Alazab, R. Vinayakumar
Journal of Information Security and Applications (2019) Vol. 47, pp. 377-389
Closed Access | Times Cited: 209
Sitalakshmi Venkatraman, Mamoun Alazab, R. Vinayakumar
Journal of Information Security and Applications (2019) Vol. 47, pp. 377-389
Closed Access | Times Cited: 209
Showing 1-25 of 209 citing articles:
IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture
Danish Vasan, Mamoun Alazab, Sobia Wassan, et al.
Computer Networks (2020) Vol. 171, pp. 107138-107138
Closed Access | Times Cited: 381
Danish Vasan, Mamoun Alazab, Sobia Wassan, et al.
Computer Networks (2020) Vol. 171, pp. 107138-107138
Closed Access | Times Cited: 381
A novel PCA–whale optimization-based deep neural network model for classification of tomato plant diseases using GPU
Thippa Reddy Gadekallu, Dharmendra Singh Rajput, Praveen Kumar Reddy Maddikunta, et al.
Journal of Real-Time Image Processing (2020) Vol. 18, Iss. 4, pp. 1383-1396
Closed Access | Times Cited: 270
Thippa Reddy Gadekallu, Dharmendra Singh Rajput, Praveen Kumar Reddy Maddikunta, et al.
Journal of Real-Time Image Processing (2020) Vol. 18, Iss. 4, pp. 1383-1396
Closed Access | Times Cited: 270
A Survey of Android Malware Detection with Deep Neural Models
Junyang Qiu, Jun Zhang, Wei Luo, et al.
ACM Computing Surveys (2020) Vol. 53, Iss. 6, pp. 1-36
Closed Access | Times Cited: 242
Junyang Qiu, Jun Zhang, Wei Luo, et al.
ACM Computing Surveys (2020) Vol. 53, Iss. 6, pp. 1-36
Closed Access | Times Cited: 242
Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review
Priyanka Dixit, Sanjay Silakari
Computer Science Review (2020) Vol. 39, pp. 100317-100317
Closed Access | Times Cited: 182
Priyanka Dixit, Sanjay Silakari
Computer Science Review (2020) Vol. 39, pp. 100317-100317
Closed Access | Times Cited: 182
A Review of Machine Learning Algorithms for Cloud Computing Security
Umer Ahmed Butt, Muhammad Mehmood, Syed Bilal Hussain Shah, et al.
Electronics (2020) Vol. 9, Iss. 9, pp. 1379-1379
Open Access | Times Cited: 152
Umer Ahmed Butt, Muhammad Mehmood, Syed Bilal Hussain Shah, et al.
Electronics (2020) Vol. 9, Iss. 9, pp. 1379-1379
Open Access | Times Cited: 152
SP2F: A secured privacy-preserving framework for smart agricultural Unmanned Aerial Vehicles
Randhir Kumar, Prabhat Kumar, Rakesh Tripathi, et al.
Computer Networks (2021) Vol. 187, pp. 107819-107819
Closed Access | Times Cited: 148
Randhir Kumar, Prabhat Kumar, Rakesh Tripathi, et al.
Computer Networks (2021) Vol. 187, pp. 107819-107819
Closed Access | Times Cited: 148
A New Malware Classification Framework Based on Deep Learning Algorithms
Ömer Aslan, Abdullah Asım Yılmaz
IEEE Access (2021) Vol. 9, pp. 87936-87951
Closed Access | Times Cited: 141
Ömer Aslan, Abdullah Asım Yılmaz
IEEE Access (2021) Vol. 9, pp. 87936-87951
Closed Access | Times Cited: 141
Cross corpus multi-lingual speech emotion recognition using ensemble learning
Wisha Zehra, Abdul Rehman Javed, Zunera Jalil, et al.
Complex & Intelligent Systems (2021) Vol. 7, Iss. 4, pp. 1845-1854
Open Access | Times Cited: 114
Wisha Zehra, Abdul Rehman Javed, Zunera Jalil, et al.
Complex & Intelligent Systems (2021) Vol. 7, Iss. 4, pp. 1845-1854
Open Access | Times Cited: 114
Image-Based Malware Classification Using VGG19 Network and Spatial Convolutional Attention
Mazhar Javed Awan, Osama Ahmed Masood, Mazin Abed Mohammed, et al.
Electronics (2021) Vol. 10, Iss. 19, pp. 2444-2444
Open Access | Times Cited: 107
Mazhar Javed Awan, Osama Ahmed Masood, Mazin Abed Mohammed, et al.
Electronics (2021) Vol. 10, Iss. 19, pp. 2444-2444
Open Access | Times Cited: 107
MCFT-CNN: Malware classification with fine-tune convolution neural networks using traditional and transfer learning in Internet of Things
Sudhakar, Sushil Kumar
Future Generation Computer Systems (2021) Vol. 125, pp. 334-351
Closed Access | Times Cited: 104
Sudhakar, Sushil Kumar
Future Generation Computer Systems (2021) Vol. 125, pp. 334-351
Closed Access | Times Cited: 104
A novel machine learning approach for detecting first-time-appeared malware
Kamran Shaukat, Suhuai Luo, Vijay Varadharajan
Engineering Applications of Artificial Intelligence (2024) Vol. 131, pp. 107801-107801
Open Access | Times Cited: 26
Kamran Shaukat, Suhuai Luo, Vijay Varadharajan
Engineering Applications of Artificial Intelligence (2024) Vol. 131, pp. 107801-107801
Open Access | Times Cited: 26
Android malware detection and identification frameworks by leveraging the machine and deep learning techniques: A comprehensive review
Santosh K. Smmarwar, Govind P. Gupta, Sanjay Kumar
Telematics and Informatics Reports (2024) Vol. 14, pp. 100130-100130
Open Access | Times Cited: 22
Santosh K. Smmarwar, Govind P. Gupta, Sanjay Kumar
Telematics and Informatics Reports (2024) Vol. 14, pp. 100130-100130
Open Access | Times Cited: 22
Hybrid Malware Classification Method Using Segmentation-Based Fractal Texture Analysis and Deep Convolution Neural Network Features
Maryam Nisa, Jamal Hussain Shah, Shansa Kanwal, et al.
Applied Sciences (2020) Vol. 10, Iss. 14, pp. 4966-4966
Open Access | Times Cited: 116
Maryam Nisa, Jamal Hussain Shah, Shansa Kanwal, et al.
Applied Sciences (2020) Vol. 10, Iss. 14, pp. 4966-4966
Open Access | Times Cited: 116
An Intrusion Detection System Against DDoS Attacks in IoT Networks
Monika Roopak, Gui Yun Tian, Jonathon A. Chambers
2020 10th Annual Computing and Communication Workshop and Conference (CCWC) (2020)
Closed Access | Times Cited: 112
Monika Roopak, Gui Yun Tian, Jonathon A. Chambers
2020 10th Annual Computing and Communication Workshop and Conference (CCWC) (2020)
Closed Access | Times Cited: 112
IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges
Pooja Anand, Yashwant Singh, Arvind Selwal, et al.
IEEE Access (2020) Vol. 8, pp. 168825-168853
Open Access | Times Cited: 105
Pooja Anand, Yashwant Singh, Arvind Selwal, et al.
IEEE Access (2020) Vol. 8, pp. 168825-168853
Open Access | Times Cited: 105
Artificial intelligence for securing industrial-based cyber–physical systems
Zhihan Lv, Dongliang Chen, Ranran Lou, et al.
Future Generation Computer Systems (2020) Vol. 117, pp. 291-298
Closed Access | Times Cited: 97
Zhihan Lv, Dongliang Chen, Ranran Lou, et al.
Future Generation Computer Systems (2020) Vol. 117, pp. 291-298
Closed Access | Times Cited: 97
Information security breaches due to ransomware attacks - a systematic literature review
T. R. Reshmi
International Journal of Information Management Data Insights (2021) Vol. 1, Iss. 2, pp. 100013-100013
Open Access | Times Cited: 92
T. R. Reshmi
International Journal of Information Management Data Insights (2021) Vol. 1, Iss. 2, pp. 100013-100013
Open Access | Times Cited: 92
Deep Feature Extraction and Classification of Android Malware Images
Jaiteg Singh, Deepak Thakur, Farman Ali, et al.
Sensors (2020) Vol. 20, Iss. 24, pp. 7013-7013
Open Access | Times Cited: 85
Jaiteg Singh, Deepak Thakur, Farman Ali, et al.
Sensors (2020) Vol. 20, Iss. 24, pp. 7013-7013
Open Access | Times Cited: 85
MTHAEL: Cross-Architecture IoT Malware Detection Based on Neural Network Advanced Ensemble Learning
Danish Vasan, Mamoun Alazab, Sitalakshmi Venkatraman, et al.
IEEE Transactions on Computers (2020) Vol. 69, Iss. 11, pp. 1654-1667
Closed Access | Times Cited: 83
Danish Vasan, Mamoun Alazab, Sitalakshmi Venkatraman, et al.
IEEE Transactions on Computers (2020) Vol. 69, Iss. 11, pp. 1654-1667
Closed Access | Times Cited: 83
Windows PE Malware Detection Using Ensemble Learning
Nureni Ayofe Azeez, Oluwanifise Ebunoluwa Odufuwa, Sanjay Misra, et al.
Informatics (2021) Vol. 8, Iss. 1, pp. 10-10
Open Access | Times Cited: 79
Nureni Ayofe Azeez, Oluwanifise Ebunoluwa Odufuwa, Sanjay Misra, et al.
Informatics (2021) Vol. 8, Iss. 1, pp. 10-10
Open Access | Times Cited: 79
DTMIC: Deep transfer learning for malware image classification
Sanjeev Kumar, B. Janet
Journal of Information Security and Applications (2021) Vol. 64, pp. 103063-103063
Closed Access | Times Cited: 67
Sanjeev Kumar, B. Janet
Journal of Information Security and Applications (2021) Vol. 64, pp. 103063-103063
Closed Access | Times Cited: 67
Classification model for accuracy and intrusion detection using machine learning approach
Arushi Agarwal, Purushottam Sharma, Mohammed Alshehri, et al.
PeerJ Computer Science (2021) Vol. 7, pp. e437-e437
Open Access | Times Cited: 66
Arushi Agarwal, Purushottam Sharma, Mohammed Alshehri, et al.
PeerJ Computer Science (2021) Vol. 7, pp. e437-e437
Open Access | Times Cited: 66
A novel framework for image-based malware detection with a deep neural network
Yifei Jian, Hongbo Kuang, Chenglong Ren, et al.
Computers & Security (2021) Vol. 109, pp. 102400-102400
Closed Access | Times Cited: 65
Yifei Jian, Hongbo Kuang, Chenglong Ren, et al.
Computers & Security (2021) Vol. 109, pp. 102400-102400
Closed Access | Times Cited: 65
Data augmentation based malware detection using convolutional neural networks
Ferhat Özgür Çatak, Javed Ahmed, Kevser ŞAHİNBAŞ, et al.
PeerJ Computer Science (2021) Vol. 7, pp. e346-e346
Open Access | Times Cited: 64
Ferhat Özgür Çatak, Javed Ahmed, Kevser ŞAHİNBAŞ, et al.
PeerJ Computer Science (2021) Vol. 7, pp. e346-e346
Open Access | Times Cited: 64
Malware detection employed by visualization and deep neural network
Anson Pinhero, Matteti Anupama, P. Vinod, et al.
Computers & Security (2021) Vol. 105, pp. 102247-102247
Closed Access | Times Cited: 60
Anson Pinhero, Matteti Anupama, P. Vinod, et al.
Computers & Security (2021) Vol. 105, pp. 102247-102247
Closed Access | Times Cited: 60