OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A multi-view feature fusion approach for effective malware classification using Deep Learning
Rajasekhar Chaganti, Vinayakumar Ravi, Tuan D. Pham
Journal of Information Security and Applications (2022) Vol. 72, pp. 103402-103402
Closed Access | Times Cited: 27

Showing 1-25 of 27 citing articles:

A novel machine learning approach for detecting first-time-appeared malware
Kamran Shaukat, Suhuai Luo, Vijay Varadharajan
Engineering Applications of Artificial Intelligence (2024) Vol. 131, pp. 107801-107801
Open Access | Times Cited: 24

Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
Faria Nawshin, Radwa Gad, Devrim Ünal, et al.
Computers & Electrical Engineering (2024) Vol. 117, pp. 109233-109233
Open Access | Times Cited: 11

Ransomware Detection Using Machine Learning: A Review, Research Limitations and Future Directions
Jamil Ispahany, Rafiqul Islam, Md Zahidul Islam, et al.
IEEE Access (2024) Vol. 12, pp. 68785-68813
Open Access | Times Cited: 9

A Holistic Approach to Ransomware Classification: Leveraging Static and Dynamic Analysis with Visualization
Bahaa Yamany, Mahmoud Said Elsayed, Anca Delia Jurcut, et al.
Information (2024) Vol. 15, Iss. 1, pp. 46-46
Open Access | Times Cited: 6

A Survey on ML Techniques for Multi-Platform Malware Detection: Securing PC, Mobile Devices, IoT, and Cloud Environments
Jannatul Ferdous, Rafiqul Islam, Arash Mahboubi, et al.
Sensors (2025) Vol. 25, Iss. 4, pp. 1153-1153
Open Access

A Survey of Recent Advances in Deep Learning Models for Detecting Malware in Desktop and Mobile Platforms
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
ACM Computing Surveys (2023) Vol. 56, Iss. 6, pp. 1-41
Closed Access | Times Cited: 12

MIGAN: GAN for facilitating malware image synthesis with improved malware classification on novel dataset
Osho Sharma, Akashdeep Sharma, Arvind Kalia
Expert Systems with Applications (2023) Vol. 241, pp. 122678-122678
Closed Access | Times Cited: 10

Radon transform based malware classification in cyber-physical system using deep learning
Rasim Alguliyev, Ramiz M. Aliguliyev, Lyudmila Sukhostat
Results in Control and Optimization (2024) Vol. 14, pp. 100382-100382
Open Access | Times Cited: 3

The Homology Determination System for APT Samples Based on Gene Maps
Rui-chao Xu, Yue-bin Di, Z. B. Shou, et al.
Journal of Cyber Security and Mobility (2024), pp. 751-774
Open Access | Times Cited: 1

Multi-Timeframe Forecasting Using Deep Learning Models for Solar Energy Efficiency in Smart Agriculture
Saravanakumar Venkatesan, Yongyun Cho
Energies (2024) Vol. 17, Iss. 17, pp. 4322-4322
Open Access | Times Cited: 1

Enhanced Image-Based Malware Classification Using Transformer-Based Convolutional Neural Networks (CNNs)
Moses Ashawa, Nsikak Owoh, Salaheddin Hosseinzadeh, et al.
Electronics (2024) Vol. 13, Iss. 20, pp. 4081-4081
Open Access | Times Cited: 1

API2Vec++: Boosting API Sequence Representation for Malware Detection and Classification
Lei Cui, Junnan Yin, Jiancong Cui, et al.
IEEE Transactions on Software Engineering (2024) Vol. 50, Iss. 8, pp. 2142-2162
Closed Access | Times Cited: 1

GBJOF: Gradient Boosting Integrated with Jaya Algorithm to Optimize the Features in Malware Analysis
Deepa Rani, G. Bala Krishna, M Radha, et al.
International Journal on Recent and Innovation Trends in Computing and Communication (2023) Vol. 11, Iss. 8s, pp. 538-548
Open Access | Times Cited: 3

Interpretable Detection of Malicious Behavior in Windows Portable Executables Using Multi-Head 2D Transformers
Sohail Khan, Mohammad Nauman
Big Data Mining and Analytics (2024) Vol. 7, Iss. 2, pp. 485-499
Open Access

Enhanced slime mould optimization with convolutional BLSTM autoencoder based malware classification in intelligent systems
Shtwai Alsubai, Ashit Kumar Dutta, Abdul Rahaman Wahab Sait, et al.
Expert Systems (2024) Vol. 42, Iss. 1
Closed Access

Malware Detection for Portable Executables Using a Multi-input Transformer-Based Approach
Ting-Li Huoh, Timothy Miskell, Onur Barut, et al.
2016 International Conference on Computing, Networking and Communications (ICNC) (2024), pp. 778-782
Closed Access

SoK: Visualization-based Malware Detection Techniques
Matteo Brosolo, Vinod Puthuvath, Asmitha KA, et al.
Proceedings of the 17th International Conference on Availability, Reliability and Security (2024), pp. 1-13
Closed Access

Efficient and Generalized Image-Based CNN Algorithm for Multi-Class Malware Detection
Yajun Liu, Hong Fan, Jianguang Zhao, et al.
IEEE Access (2024) Vol. 12, pp. 104317-104332
Open Access

Malware Detector and Classifier Using API Call Embedding and Graph Neural Networks
Rajneekant, Pushkar Kishore, Bishwajit Prasad Gond, et al.
(2024), pp. 515-531
Closed Access

RockNet: Deep progressive lithology recognition model based on feature saliency and fusion
Xiangyuan Zhu, Mincan Li, Zhiming Lan, et al.
Neurocomputing (2024) Vol. 616, pp. 128898-128898
Closed Access

An Efficient Malware Classification Method Using Novel Deep Learning Model
Zinah Khalid Jasim Jasim, Sefer Kurnaz
AURUM Journal of Engineering Systems and Architecture (2024)
Closed Access

Efficient Malware Classification with Spiking Neural Networks: A Case Study on N-BaIoT Dataset
Muhammad Umair, Wooi-Haw Tan, Yee‐Loo Foo
(2023), pp. 231-236
Closed Access | Times Cited: 1

Page 1 - Next Page

Scroll to top