OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Detection of malicious Android applications using Ontology-based intelligent model in mobile cloud environment
Jannath Nisha O.S., Mary Saira Bhanu S
Journal of Information Security and Applications (2021) Vol. 58, pp. 102751-102751
Closed Access | Times Cited: 16

Showing 16 citing articles:

MINDPRES: A Hybrid Prototype System for Comprehensive Data Protection in the User Layer of the Mobile Cloud
Noah Oghenefego Ogwara, Krassie Petrova, Mee Loong Yang, et al.
Sensors (2025) Vol. 25, Iss. 3, pp. 670-670
Open Access

MAD-Onto: an ontology design for mobile app development
Bilal Abu-Salih, Marwan Al-Tawil, Ansar Khoury, et al.
Frontiers in Artificial Intelligence (2025) Vol. 8
Open Access

Android malware analysis and detection: A systematic review
Anuradha Dahiya, Sukhdip Singh, Gulshan Shrivastava
Expert Systems (2023)
Closed Access | Times Cited: 3

Object-based Classification of Natural Scenes Using Machine Learning Methods
Mohammed Saaduldeen Jasim, Mohammed Chachan Younis
Technium Romanian Journal of Applied Sciences and Technology (2023) Vol. 6, pp. 1-22
Open Access | Times Cited: 2

Malicious behavior detection in cloud using self‐optimized dynamic kernel convolutional neural network
Abrar M. Alajlan, Marwah Almasri
Transactions on Emerging Telecommunications Technologies (2022) Vol. 33, Iss. 5
Closed Access | Times Cited: 3

Capturing Malware Behaviour with Ontology-based Knowledge Graphs
Ipshita Roy Chowdhury, Deepayan Bhowmik
(2022), pp. 1-7
Open Access | Times Cited: 3

Comparative Analysis of Ontology Based Data Access Control and Security Enhancement in Healthcare Application
Suthan Renuka, C D Guruprakash
Optoelectronics Instrumentation and Data Processing (2024) Vol. 60, Iss. 2, pp. 297-307
Closed Access

PHIGrader: Evaluating the effectiveness of Manifest file components in Android malware detection using Multi Criteria Decision Making techniques
Yash Sharma, Anshul Arora
Journal of Network and Computer Applications (2024) Vol. 232, pp. 104021-104021
Closed Access

OntoCSD: an ontology-based security model for an integrated solution of cyberspace defense
Dandan Wu, Jie Chen, Ruiyun Xie, et al.
Frontiers of Information Technology & Electronic Engineering (2024) Vol. 25, Iss. 9, pp. 1209-1225
Closed Access

Enhancing mobile data security using red panda optimized approach with chaotic fuzzy encryption in mobile cloud computing
Varun Garg -, Bikrampal Kaur, Surender Jangra
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 23
Closed Access

LSTM-based Approach for Android Malware Detection
Manoj Kumar, Sanjay Kumar Singh, Urmila Pilania, et al.
Procedia Computer Science (2023) Vol. 230, pp. 679-687
Open Access | Times Cited: 1

Electro search optimization based long short‐term memory network for mobile malware detection
Padmapriya Shanmugam, Balajivijayan Venkateswarulu, D. Rajalakshmi, et al.
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 19
Closed Access | Times Cited: 2

MOBDroid2: An Improved Feature Selection Method for Detecting Malicious Applications in a Mobile Cloud Computing Environment
Noah Oghenefego Ogwara, Krassie Petrova, Mee Loong Yang
2021 International Conference on Computational Science and Computational Intelligence (CSCI) (2021), pp. 397-403
Closed Access | Times Cited: 1

A Systematic Literature Review of The Role of Ontology in Modeling Knowledge in Software Development Processes
Evi Triandini, Marco Ariano Kristyanto, Ravi Vendra Rishika, et al.
IPTEK The Journal for Technology and Science (2021) Vol. 32, Iss. 3, pp. 159-159
Open Access | Times Cited: 1

A Comprehensive Review on Permissions-Based Android Malware Detection
Yash Sharma, Anshul Arora
Research Square (Research Square) (2023)
Open Access

Page 1

Scroll to top