
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Android Ransomware Detection From Traffic Analysis Using Metaheuristic Feature Selection
Md. Sakir Hossain, Naim Hasan, Md Abdus Samad, et al.
IEEE Access (2022) Vol. 10, pp. 128754-128763
Closed Access | Times Cited: 15
Md. Sakir Hossain, Naim Hasan, Md Abdus Samad, et al.
IEEE Access (2022) Vol. 10, pp. 128754-128763
Closed Access | Times Cited: 15
Showing 15 citing articles:
Android malware detection and identification frameworks by leveraging the machine and deep learning techniques: A comprehensive review
Santosh K. Smmarwar, Govind P. Gupta, Sanjay Kumar
Telematics and Informatics Reports (2024) Vol. 14, pp. 100130-100130
Open Access | Times Cited: 21
Santosh K. Smmarwar, Govind P. Gupta, Sanjay Kumar
Telematics and Informatics Reports (2024) Vol. 14, pp. 100130-100130
Open Access | Times Cited: 21
Medicinal Plant Classification Using Particle Swarm Optimized Cascaded Network
Md. Tarequl Islam, Wahidur Rahman, Md Shakhawat Hossain, et al.
IEEE Access (2024) Vol. 12, pp. 42465-42478
Open Access | Times Cited: 5
Md. Tarequl Islam, Wahidur Rahman, Md Shakhawat Hossain, et al.
IEEE Access (2024) Vol. 12, pp. 42465-42478
Open Access | Times Cited: 5
Gauss-Mapping Black Widow Optimization With Deep Extreme Learning Machine for Android Malware Classification Model
Ghadah Aldehim, Munya A. Arasi, Majdi Khalid, et al.
IEEE Access (2023) Vol. 11, pp. 87062-87070
Open Access | Times Cited: 11
Ghadah Aldehim, Munya A. Arasi, Majdi Khalid, et al.
IEEE Access (2023) Vol. 11, pp. 87062-87070
Open Access | Times Cited: 11
Crypto-Ransomware: A Revision of the State of the Art, Advances and Challenges
J.A. Gómez-Hernández, Pedro García Teodoro, Roberto Magán-Carrión, et al.
Electronics (2023) Vol. 12, Iss. 21, pp. 4494-4494
Open Access | Times Cited: 11
J.A. Gómez-Hernández, Pedro García Teodoro, Roberto Magán-Carrión, et al.
Electronics (2023) Vol. 12, Iss. 21, pp. 4494-4494
Open Access | Times Cited: 11
Android ransomware detection using a novel hamming distance based feature selection
Hashida Haidros Rahima Manzil, S. Manohar Naik
Journal of Computer Virology and Hacking Techniques (2023) Vol. 20, Iss. 1, pp. 71-93
Closed Access | Times Cited: 10
Hashida Haidros Rahima Manzil, S. Manohar Naik
Journal of Computer Virology and Hacking Techniques (2023) Vol. 20, Iss. 1, pp. 71-93
Closed Access | Times Cited: 10
Android Ransomware Detection Using Supervised Machine Learning Techniques Based on Traffic Analysis
Amnah Albin Ahmed, Afrah Shaahid, Fatima Alnasser, et al.
Sensors (2023) Vol. 24, Iss. 1, pp. 189-189
Open Access | Times Cited: 9
Amnah Albin Ahmed, Afrah Shaahid, Fatima Alnasser, et al.
Sensors (2023) Vol. 24, Iss. 1, pp. 189-189
Open Access | Times Cited: 9
Edge Computing Ransomware Detection in IoT Using Machine Learning
Tejesh Radhakrishna, Nahid Ebrahimi Majd
2016 International Conference on Computing, Networking and Communications (ICNC) (2024), pp. 244-248
Closed Access | Times Cited: 3
Tejesh Radhakrishna, Nahid Ebrahimi Majd
2016 International Conference on Computing, Networking and Communications (ICNC) (2024), pp. 244-248
Closed Access | Times Cited: 3
Covalent Bond Based Android Malware Detection Using Permission and System Call Pairs
Rahul Gupta, Kapil Sharma, Ramesh Kumar Garg
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 3, pp. 4283-4301
Open Access | Times Cited: 2
Rahul Gupta, Kapil Sharma, Ramesh Kumar Garg
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 3, pp. 4283-4301
Open Access | Times Cited: 2
The Future of Cybersecurity and Its Potential Threats
R. Ramakrishnan
International Journal for Research in Applied Science and Engineering Technology (2023) Vol. 11, Iss. 7, pp. 269-274
Open Access | Times Cited: 6
R. Ramakrishnan
International Journal for Research in Applied Science and Engineering Technology (2023) Vol. 11, Iss. 7, pp. 269-274
Open Access | Times Cited: 6
Lightweight Crypto-Ransomware Detection in Android Based on Reactive Honeyfile Monitoring
José-Antonio Gómez-Hernández, Pedro García‐Teodoro
Sensors (2024) Vol. 24, Iss. 9, pp. 2679-2679
Open Access | Times Cited: 1
José-Antonio Gómez-Hernández, Pedro García‐Teodoro
Sensors (2024) Vol. 24, Iss. 9, pp. 2679-2679
Open Access | Times Cited: 1
Prediction of android ransomware with deep learning model using hybrid cryptography
K R Kalphana, S. Aanjankumar, Michrandi N Surya, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1
K R Kalphana, S. Aanjankumar, Michrandi N Surya, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1
ARdetector: android ransomware detection framework
Dan Li, Wenbo Shi, Ning Lu, et al.
The Journal of Supercomputing (2023) Vol. 80, Iss. 6, pp. 7557-7584
Closed Access | Times Cited: 4
Dan Li, Wenbo Shi, Ning Lu, et al.
The Journal of Supercomputing (2023) Vol. 80, Iss. 6, pp. 7557-7584
Closed Access | Times Cited: 4
A Review on Ransomware Detection in Android Using Feature Selection and Machine Learning
Neha Tiwari, Ishita Gupta, Deeya Sethi, et al.
(2024), pp. 01-06
Closed Access
Neha Tiwari, Ishita Gupta, Deeya Sethi, et al.
(2024), pp. 01-06
Closed Access
Android traffic malware analysis and detection using ensemble classifier
A. Mohanraj, K. Sivasankari
Ain Shams Engineering Journal (2024), pp. 103134-103134
Open Access
A. Mohanraj, K. Sivasankari
Ain Shams Engineering Journal (2024), pp. 103134-103134
Open Access
Cyber-Malware Detection using Machine Learning
Sulakshana Bhausaheb Mane, Sandhya Jadhav, Chinmayee Gamre, et al.
(2023), pp. 915-920
Closed Access
Sulakshana Bhausaheb Mane, Sandhya Jadhav, Chinmayee Gamre, et al.
(2023), pp. 915-920
Closed Access