
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Image-based malware representation approach with EfficientNet convolutional neural networks for effective malware classification
Rajasekhar Chaganti, Vinayakumar Ravi, Tuan D. Pham
Journal of Information Security and Applications (2022) Vol. 69, pp. 103306-103306
Closed Access | Times Cited: 40
Rajasekhar Chaganti, Vinayakumar Ravi, Tuan D. Pham
Journal of Information Security and Applications (2022) Vol. 69, pp. 103306-103306
Closed Access | Times Cited: 40
Showing 1-25 of 40 citing articles:
Deep Learning Approach for SDN-Enabled Intrusion Detection System in IoT Networks
Rajasekhar Chaganti, Wael Suliman, Vinayakumar Ravi, et al.
Information (2023) Vol. 14, Iss. 1, pp. 41-41
Open Access | Times Cited: 71
Rajasekhar Chaganti, Wael Suliman, Vinayakumar Ravi, et al.
Information (2023) Vol. 14, Iss. 1, pp. 41-41
Open Access | Times Cited: 71
API-MalDetect: Automated malware detection framework for windows based on API calls and deep learning techniques
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
Journal of Network and Computer Applications (2023) Vol. 218, pp. 103704-103704
Open Access | Times Cited: 31
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
Journal of Network and Computer Applications (2023) Vol. 218, pp. 103704-103704
Open Access | Times Cited: 31
CNN-LSTM and transfer learning models for malware classification based on opcodes and API calls
Ahmed Bensaoud, Jugal Kalita
Knowledge-Based Systems (2024) Vol. 290, pp. 111543-111543
Open Access | Times Cited: 8
Ahmed Bensaoud, Jugal Kalita
Knowledge-Based Systems (2024) Vol. 290, pp. 111543-111543
Open Access | Times Cited: 8
SDIF-CNN: Stacking deep image features using fine-tuned convolution neural network models for real-world malware detection and classification
Sanjeev Kumar, Kajal Panda
Applied Soft Computing (2023) Vol. 146, pp. 110676-110676
Closed Access | Times Cited: 16
Sanjeev Kumar, Kajal Panda
Applied Soft Computing (2023) Vol. 146, pp. 110676-110676
Closed Access | Times Cited: 16
Enhancing Malware Detection With Deep Learning Convolutional Neural Networks: Investigating the Impact of Image Size Variations
Ahmed Hawana, Emad S. Hassan, Walid El‐Shafai, et al.
Security and Privacy (2025) Vol. 8, Iss. 2
Closed Access
Ahmed Hawana, Emad S. Hassan, Walid El‐Shafai, et al.
Security and Privacy (2025) Vol. 8, Iss. 2
Closed Access
Self-supervised contrastive representation learning for classifying Internet of Things malware
Fangwei Wang, Yinhe Chen, Hongfeng Gao, et al.
Engineering Applications of Artificial Intelligence (2025) Vol. 150, pp. 110299-110299
Closed Access
Fangwei Wang, Yinhe Chen, Hongfeng Gao, et al.
Engineering Applications of Artificial Intelligence (2025) Vol. 150, pp. 110299-110299
Closed Access
A New Framework for Visual Classification of Multi-Channel Malware Based on Transfer Learning
Zilin Zhao, Shumian Yang, Dawei Zhao
Applied Sciences (2023) Vol. 13, Iss. 4, pp. 2484-2484
Open Access | Times Cited: 13
Zilin Zhao, Shumian Yang, Dawei Zhao
Applied Sciences (2023) Vol. 13, Iss. 4, pp. 2484-2484
Open Access | Times Cited: 13
Global-Local Attention-Based Butterfly Vision Transformer for Visualization-Based Malware Classification
Mohamad Mulham Belal, Divya Meena Sundaram
IEEE Access (2023) Vol. 11, pp. 69337-69355
Open Access | Times Cited: 13
Mohamad Mulham Belal, Divya Meena Sundaram
IEEE Access (2023) Vol. 11, pp. 69337-69355
Open Access | Times Cited: 13
Using 3D-VGG-16 and 3D-Resnet-18 deep learning models and FABEMD techniques in the detection of malware
Wadha Al-Khater, Somaya Al-Máadeed
Alexandria Engineering Journal (2024) Vol. 89, pp. 39-52
Open Access | Times Cited: 4
Wadha Al-Khater, Somaya Al-Máadeed
Alexandria Engineering Journal (2024) Vol. 89, pp. 39-52
Open Access | Times Cited: 4
A systematic literature review on Windows malware detection: Techniques, research issues, and future directions
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
Journal of Systems and Software (2023) Vol. 209, pp. 111921-111921
Open Access | Times Cited: 10
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
Journal of Systems and Software (2023) Vol. 209, pp. 111921-111921
Open Access | Times Cited: 10
Deep learning-powered malware detection in cyberspace: a contemporary review
Ananya Redhu, Prince Choudhary, Kathiravan Srinivasan, et al.
Frontiers in Physics (2024) Vol. 12
Open Access | Times Cited: 3
Ananya Redhu, Prince Choudhary, Kathiravan Srinivasan, et al.
Frontiers in Physics (2024) Vol. 12
Open Access | Times Cited: 3
An Optimized Multi-Task Learning Model for Disaster Classification and Victim Detection in Federated Learning Environments
Yi Jie Wong, Mau‐Luen Tham, Ban-Hoe Kwan, et al.
IEEE Access (2022) Vol. 10, pp. 115930-115944
Open Access | Times Cited: 14
Yi Jie Wong, Mau‐Luen Tham, Ban-Hoe Kwan, et al.
IEEE Access (2022) Vol. 10, pp. 115930-115944
Open Access | Times Cited: 14
FACILE: A capsule network with fewer capsules and richer hierarchical information for malware image classification
Binghui Zou, Chunjie Cao, Longjuan Wang, et al.
Computers & Security (2023) Vol. 137, pp. 103606-103606
Closed Access | Times Cited: 7
Binghui Zou, Chunjie Cao, Longjuan Wang, et al.
Computers & Security (2023) Vol. 137, pp. 103606-103606
Closed Access | Times Cited: 7
Visualizing Portable Executable Headers for Ransomware Detection: A Deep Learning-Based Approach
T. Dam, N. Nguyen, Viet Trung Le, et al.
JUCS - Journal of Universal Computer Science (2024) Vol. 30, Iss. 2, pp. 262-286
Open Access | Times Cited: 2
T. Dam, N. Nguyen, Viet Trung Le, et al.
JUCS - Journal of Universal Computer Science (2024) Vol. 30, Iss. 2, pp. 262-286
Open Access | Times Cited: 2
Deep hybrid approach with sequential feature extraction and classification for robust malware detection
Swapnil Singh, Deepa Krishnan, Vidhi Vazirani, et al.
Egyptian Informatics Journal (2024) Vol. 27, pp. 100539-100539
Open Access | Times Cited: 2
Swapnil Singh, Deepa Krishnan, Vidhi Vazirani, et al.
Egyptian Informatics Journal (2024) Vol. 27, pp. 100539-100539
Open Access | Times Cited: 2
Embedded AMIS-Deep Learning with Dialog-Based Object Query System for Multi-Class Tuberculosis Drug Response Classification
Chutinun Prasitpuriprecha, Rapeepan Pitakaso, Sarayut Gonwirat, et al.
Diagnostics (2022) Vol. 12, Iss. 12, pp. 2980-2980
Open Access | Times Cited: 9
Chutinun Prasitpuriprecha, Rapeepan Pitakaso, Sarayut Gonwirat, et al.
Diagnostics (2022) Vol. 12, Iss. 12, pp. 2980-2980
Open Access | Times Cited: 9
Enhanced Image-Based Malware Classification Using Snake Optimization Algorithm With Deep Convolutional Neural Network
Salahaldeen Duraibi
IEEE Access (2024) Vol. 12, pp. 95047-95057
Open Access | Times Cited: 1
Salahaldeen Duraibi
IEEE Access (2024) Vol. 12, pp. 95047-95057
Open Access | Times Cited: 1
Enhanced Image-Based Malware Classification Using Transformer-Based Convolutional Neural Networks (CNNs)
Moses Ashawa, Nsikak Owoh, Salaheddin Hosseinzadeh, et al.
Electronics (2024) Vol. 13, Iss. 20, pp. 4081-4081
Open Access | Times Cited: 1
Moses Ashawa, Nsikak Owoh, Salaheddin Hosseinzadeh, et al.
Electronics (2024) Vol. 13, Iss. 20, pp. 4081-4081
Open Access | Times Cited: 1
API2Vec++: Boosting API Sequence Representation for Malware Detection and Classification
Lei Cui, Junnan Yin, Jiancong Cui, et al.
IEEE Transactions on Software Engineering (2024) Vol. 50, Iss. 8, pp. 2142-2162
Closed Access | Times Cited: 1
Lei Cui, Junnan Yin, Jiancong Cui, et al.
IEEE Transactions on Software Engineering (2024) Vol. 50, Iss. 8, pp. 2142-2162
Closed Access | Times Cited: 1
Scalable and Fast Algorithm for Constructing Phylogenetic Trees With Application to IoT Malware Clustering
Tianxiang He, Chansu Han, Ryoichi Isawa, et al.
IEEE Access (2023) Vol. 11, pp. 8240-8253
Open Access | Times Cited: 3
Tianxiang He, Chansu Han, Ryoichi Isawa, et al.
IEEE Access (2023) Vol. 11, pp. 8240-8253
Open Access | Times Cited: 3
A GAN-EfficientNet-Based Traceability Method for Malicious Code Variant Families
Li Li, Qing Zhang, Youran Kong
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 80, Iss. 1, pp. 801-818
Open Access
Li Li, Qing Zhang, Youran Kong
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 80, Iss. 1, pp. 801-818
Open Access
Enhanced Malware Image Classification through Ensemble model
Eshwar Kotha, Lakshmi Harika Palivela, Afruza Begum
(2024), pp. 1421-1425
Closed Access
Eshwar Kotha, Lakshmi Harika Palivela, Afruza Begum
(2024), pp. 1421-1425
Closed Access
Addressing Overlooked Aspects and Misapplication in Malware Visualization Classification
Wanhu Nie
(2024)
Closed Access
Wanhu Nie
(2024)
Closed Access
Efficient malware detection using hybrid approach of transfer learning and generative adversarial examples with image representation
Yue Zhao, Farhan Ullah, Chien‐Ming Chen, et al.
Expert Systems (2024)
Closed Access
Yue Zhao, Farhan Ullah, Chien‐Ming Chen, et al.
Expert Systems (2024)
Closed Access
Multi-variants vision transformer-based malware image classification model using multi-criteria decision-making
Mohamad Mulham Belal, Divya Meena Sundaram
Journal of Intelligent & Fuzzy Systems (2024) Vol. 46, Iss. 5-6, pp. 11331-11351
Closed Access
Mohamad Mulham Belal, Divya Meena Sundaram
Journal of Intelligent & Fuzzy Systems (2024) Vol. 46, Iss. 5-6, pp. 11331-11351
Closed Access