
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Detecting vulnerabilities in IoT software: New hybrid model and comprehensive data analysis
Huan Mei, Guanjun Lin, Fang Da, et al.
Journal of Information Security and Applications (2023) Vol. 74, pp. 103467-103467
Closed Access | Times Cited: 10
Huan Mei, Guanjun Lin, Fang Da, et al.
Journal of Information Security and Applications (2023) Vol. 74, pp. 103467-103467
Closed Access | Times Cited: 10
Showing 10 citing articles:
SVScanner: Detecting smart contract vulnerabilities via deep semantic extraction
Hengyan Zhang, Weizhe Zhang, Yuming Feng, et al.
Journal of Information Security and Applications (2023) Vol. 75, pp. 103484-103484
Closed Access | Times Cited: 11
Hengyan Zhang, Weizhe Zhang, Yuming Feng, et al.
Journal of Information Security and Applications (2023) Vol. 75, pp. 103484-103484
Closed Access | Times Cited: 11
Software vulnerable functions discovery based on code composite feature
Xue Yuan, Guanjun Lin, Huan Mei, et al.
Journal of Information Security and Applications (2024) Vol. 81, pp. 103718-103718
Closed Access | Times Cited: 2
Xue Yuan, Guanjun Lin, Huan Mei, et al.
Journal of Information Security and Applications (2024) Vol. 81, pp. 103718-103718
Closed Access | Times Cited: 2
Enhancing vulnerability detection efficiency: An exploration of light-weight LLMs with hybrid code features
Jianing Liu, Guanjun Lin, Huan Mei, et al.
Journal of Information Security and Applications (2024) Vol. 88, pp. 103925-103925
Closed Access | Times Cited: 1
Jianing Liu, Guanjun Lin, Huan Mei, et al.
Journal of Information Security and Applications (2024) Vol. 88, pp. 103925-103925
Closed Access | Times Cited: 1
A Data-driven Approach for Risk Exposure Analysis in Enterprise Security
Albert Calvo, Santiago Escuder, Josep Escrig, et al.
2022 IEEE 9th International Conference on Data Science and Advanced Analytics (DSAA) (2023), pp. 1-9
Closed Access | Times Cited: 3
Albert Calvo, Santiago Escuder, Josep Escrig, et al.
2022 IEEE 9th International Conference on Data Science and Advanced Analytics (DSAA) (2023), pp. 1-9
Closed Access | Times Cited: 3
Vulnerability Localization Based On Intermediate Code Representation and Feature Fusion
Chenguang Zhu, Renzheng Wei, Liwei Chen, et al.
The Computer Journal (2024) Vol. 67, Iss. 9, pp. 2749-2762
Closed Access
Chenguang Zhu, Renzheng Wei, Liwei Chen, et al.
The Computer Journal (2024) Vol. 67, Iss. 9, pp. 2749-2762
Closed Access
(Deep) Learning of Android Access Control Recommendation from Static Execution Paths
Dheeraj Vagavolu, Yousra Aafer, Meiyappan Nagappan
(2024), pp. 758-772
Closed Access
Dheeraj Vagavolu, Yousra Aafer, Meiyappan Nagappan
(2024), pp. 758-772
Closed Access
Identifying and Addressing Security Vulnerabilities in Hybrid Network Security Algorithms
Arun Kumar Pipersenia, M. S. Nidhya, Sandeep Jain
(2024), pp. 1-6
Closed Access
Arun Kumar Pipersenia, M. S. Nidhya, Sandeep Jain
(2024), pp. 1-6
Closed Access
EXVUL: Towards Effective and Explainable Vulnerability Detection for IoT Devices
Sicong Cao, Xiaobing Sun, Wei Liu, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 12, pp. 22385-22398
Closed Access
Sicong Cao, Xiaobing Sun, Wei Liu, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 12, pp. 22385-22398
Closed Access
An Analytical Review of the Source Code Models for Exploit Analysis
Elena Fedorchenko, Evgenia Novikova, Andrey Fedorchenko, et al.
Information (2023) Vol. 14, Iss. 9, pp. 497-497
Open Access | Times Cited: 1
Elena Fedorchenko, Evgenia Novikova, Andrey Fedorchenko, et al.
Information (2023) Vol. 14, Iss. 9, pp. 497-497
Open Access | Times Cited: 1
Ripple20 Vulnerabilities Detection using a Featureless Deep Learning Model
Sarah Binhulayyil, Shancang Li
(2023), pp. 1236-1240
Open Access
Sarah Binhulayyil, Shancang Li
(2023), pp. 1236-1240
Open Access