
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
CNN-LSTM and transfer learning models for malware classification based on opcodes and API calls
Ahmed Bensaoud, Jugal Kalita
Knowledge-Based Systems (2024) Vol. 290, pp. 111543-111543
Open Access | Times Cited: 8
Ahmed Bensaoud, Jugal Kalita
Knowledge-Based Systems (2024) Vol. 290, pp. 111543-111543
Open Access | Times Cited: 8
Showing 8 citing articles:
A survey of malware detection using deep learning
Ahmed Bensaoud, Jugal Kalita, Mahmoud Bensaoud
Machine Learning with Applications (2024) Vol. 16, pp. 100546-100546
Open Access | Times Cited: 15
Ahmed Bensaoud, Jugal Kalita, Mahmoud Bensaoud
Machine Learning with Applications (2024) Vol. 16, pp. 100546-100546
Open Access | Times Cited: 15
A Malware-Detection Method Using Deep Learning to Fully Extract API Sequence Features
Shuhui Zhang, Mingyu Gao, Lianhai Wang, et al.
Electronics (2025) Vol. 14, Iss. 1, pp. 167-167
Open Access
Shuhui Zhang, Mingyu Gao, Lianhai Wang, et al.
Electronics (2025) Vol. 14, Iss. 1, pp. 167-167
Open Access
Optimized detection of cyber-attacks on IoT networks via hybrid deep learning models
Ahmed Bensaoud, Jugal Kalita
Ad Hoc Networks (2025) Vol. 170, pp. 103770-103770
Open Access
Ahmed Bensaoud, Jugal Kalita
Ad Hoc Networks (2025) Vol. 170, pp. 103770-103770
Open Access
Robust deep learning model combined with missing input data estimation: Application in a 1000 m3/day high-salinity SWRO plant
Jeongwoo Moon, Kwanho Jeong, Sung Ho Chae, et al.
Desalination (2025), pp. 118678-118678
Closed Access
Jeongwoo Moon, Kwanho Jeong, Sung Ho Chae, et al.
Desalination (2025), pp. 118678-118678
Closed Access
Advancing software security: DCodeBERT for automatic vulnerability detection and repair
Ahmed Bensaoud, Jugal Kalita
Journal of Industrial Information Integration (2025), pp. 100834-100834
Closed Access
Ahmed Bensaoud, Jugal Kalita
Journal of Industrial Information Integration (2025), pp. 100834-100834
Closed Access
SINNER: A Reward-Sensitive Algorithm for Imbalanced Malware Classification Using Neural Networks with Experience Replay
Antonio Coscia, Andrea Iannacone, Antonio Maci, et al.
Information (2024) Vol. 15, Iss. 8, pp. 425-425
Open Access | Times Cited: 1
Antonio Coscia, Andrea Iannacone, Antonio Maci, et al.
Information (2024) Vol. 15, Iss. 8, pp. 425-425
Open Access | Times Cited: 1
Next-Generation Crime Detection and Transmitting: Evaluating Pre-Trained CNN Models
V Viswanatha, A C Ramachandra, B D Parameshachari, et al.
(2024), pp. 1-6
Closed Access
V Viswanatha, A C Ramachandra, B D Parameshachari, et al.
(2024), pp. 1-6
Closed Access
Visualization-based comprehensive feature representation with improved EfficientNet for malicious file and variant recognition
Liangwei Yao, Bin Liu, Xin Yang
Journal of Information Security and Applications (2024) Vol. 86, pp. 103865-103865
Closed Access
Liangwei Yao, Bin Liu, Xin Yang
Journal of Information Security and Applications (2024) Vol. 86, pp. 103865-103865
Closed Access
Exploration of salience theory to deep learning: Evidence from Chinese new energy market high-frequency trading
Qing Zhu, Jinhong Du, Yuze Li
Data Science and Management (2024)
Open Access
Qing Zhu, Jinhong Du, Yuze Li
Data Science and Management (2024)
Open Access