
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Automated Android Malware Detection Using Optimal Ensemble Learning Approach for Cybersecurity
Hayam Alamro, Wafa Mtouaa, Sumayh S. Aljameel, et al.
IEEE Access (2023) Vol. 11, pp. 72509-72517
Open Access | Times Cited: 25
Hayam Alamro, Wafa Mtouaa, Sumayh S. Aljameel, et al.
IEEE Access (2023) Vol. 11, pp. 72509-72517
Open Access | Times Cited: 25
Showing 25 citing articles:
Intelligent Pattern Recognition Using Equilibrium Optimizer With Deep Learning Model for Android Malware Detection
Mohammed Maray, Mashael Maashi, Haya Mesfer Alshahrani, et al.
IEEE Access (2024) Vol. 12, pp. 24516-24524
Open Access | Times Cited: 5
Mohammed Maray, Mashael Maashi, Haya Mesfer Alshahrani, et al.
IEEE Access (2024) Vol. 12, pp. 24516-24524
Open Access | Times Cited: 5
Earthworm Optimization Algorithm Based Cascade LSTM-GRU Model for Android Malware Detection
Brij B. Gupta, Akshat Gaurav, Varsha Arya, et al.
Cyber Security and Applications (2025), pp. 100083-100083
Open Access
Brij B. Gupta, Akshat Gaurav, Varsha Arya, et al.
Cyber Security and Applications (2025), pp. 100083-100083
Open Access
Design of an efficient Malware Prediction Model using Auto Encoded & Attention-based Recurrent Graph Relationship Analysis
Mahesh T. Dhande, S. P. Tiwari, Nikhil J. Rathod
International Research Journal of Multidisciplinary Technovation (2025), pp. 71-87
Open Access
Mahesh T. Dhande, S. P. Tiwari, Nikhil J. Rathod
International Research Journal of Multidisciplinary Technovation (2025), pp. 71-87
Open Access
Comparing Conformer, Genetic Artificial Intelligence Conformer, and Active Learning Conformer Approaches for Encrypted Android Malware Traffic Detection
Md. Shakib
(2025)
Closed Access
Md. Shakib
(2025)
Closed Access
MA_BiRAE - Malware analysis and detection technique using adversarial learning and deep learning
Surbhi Prakash, Amar Kumar Mohapatra
Journal of Information Security and Applications (2025) Vol. 90, pp. 104009-104009
Closed Access
Surbhi Prakash, Amar Kumar Mohapatra
Journal of Information Security and Applications (2025) Vol. 90, pp. 104009-104009
Closed Access
An intelligent ransomware based cyberthreat detection model using multi head attention-based recurrent neural networks with optimization algorithm in IoT environment
Sarah A. Alzakari, Mohammed Aljebreen, Naz̲īr Aḥmad, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Sarah A. Alzakari, Mohammed Aljebreen, Naz̲īr Aḥmad, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Deep Reinforcement Learning-based Malicious URL Detection with Feature Selection
Antonio Maci, Nicola Tamma, Antonio Coscia
(2024), pp. 1-7
Closed Access | Times Cited: 4
Antonio Maci, Nicola Tamma, Antonio Coscia
(2024), pp. 1-7
Closed Access | Times Cited: 4
Visualising Static Features and Classifying Android Malware Using a Convolutional Neural Network Approach
Ömer KİRAZ, İbrahim Alper Doğru
Applied Sciences (2024) Vol. 14, Iss. 11, pp. 4772-4772
Open Access | Times Cited: 4
Ömer KİRAZ, İbrahim Alper Doğru
Applied Sciences (2024) Vol. 14, Iss. 11, pp. 4772-4772
Open Access | Times Cited: 4
Deep learning-based improved transformer model on android malware detection and classification in internet of vehicles
Naif Almakayeel
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 3
Naif Almakayeel
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 3
Securing Cloud-Encrypted Data: Detecting Ransomware-as-a-Service (RaaS) Attacks through Deep Learning Ensemble
Amardeep Singh, Hamad Ali Abosaq, Saad Arif, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 1, pp. 857-873
Open Access | Times Cited: 2
Amardeep Singh, Hamad Ali Abosaq, Saad Arif, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 1, pp. 857-873
Open Access | Times Cited: 2
Android Malware Detection and Prevention Based on Deep Learning and Tweets Analysis
Mahmoud A. Khalifa, Abdallah Elsayed, Amr M. A. Hussien, et al.
(2024), pp. 153-157
Closed Access | Times Cited: 2
Mahmoud A. Khalifa, Abdallah Elsayed, Amr M. A. Hussien, et al.
(2024), pp. 153-157
Closed Access | Times Cited: 2
CPL-Net: A Malware Detection Network Based on Parallel CNN and LSTM Feature Fusion
Jun Q. Lu, Xiaokai Ren, Jiaxin Zhang, et al.
Electronics (2023) Vol. 12, Iss. 19, pp. 4025-4025
Open Access | Times Cited: 3
Jun Q. Lu, Xiaokai Ren, Jiaxin Zhang, et al.
Electronics (2023) Vol. 12, Iss. 19, pp. 4025-4025
Open Access | Times Cited: 3
Enhancing android application security: A novel approach using DroidXGB for malware detection based on permission analysis
Pawan Kumar, Sukhdip Singh
Security and Privacy (2023) Vol. 7, Iss. 2
Closed Access | Times Cited: 2
Pawan Kumar, Sukhdip Singh
Security and Privacy (2023) Vol. 7, Iss. 2
Closed Access | Times Cited: 2
Classification of Malware Families Using Transformers and Auto Formers in Deep Learning
T. Deepthi, SK. Tasleema Kulsum, K R Supritha, et al.
2021 International Conference on Emerging Smart Computing and Informatics (ESCI) (2024), pp. 1-5
Closed Access
T. Deepthi, SK. Tasleema Kulsum, K R Supritha, et al.
2021 International Conference on Emerging Smart Computing and Informatics (ESCI) (2024), pp. 1-5
Closed Access
Ensemble-learning-based android malware detection using hybrid features
Z.X. Li W.H. Li, Yinghua Zhou
(2024), pp. 154-158
Closed Access
Z.X. Li W.H. Li, Yinghua Zhou
(2024), pp. 154-158
Closed Access
Predictive Shield: Harnessing Machine Learning to Forecast Vulnerability Exploitability
Dr Priya P Sajan, Sanketan Ashok Mohate, Sarthak Kishor Thorat, et al.
International Journal of Advanced Research in Science Communication and Technology (2024), pp. 603-617
Open Access
Dr Priya P Sajan, Sanketan Ashok Mohate, Sarthak Kishor Thorat, et al.
International Journal of Advanced Research in Science Communication and Technology (2024), pp. 603-617
Open Access
TDBAMLA: Temporal and Dynamic Behavior Analysis in Android Malware using LSTM and Attention Mechanisms
Harshal D. Misalkar, Pon Harshavardhanan
Computer Standards & Interfaces (2024) Vol. 92, pp. 103920-103920
Closed Access
Harshal D. Misalkar, Pon Harshavardhanan
Computer Standards & Interfaces (2024) Vol. 92, pp. 103920-103920
Closed Access
ANFIS-AMAL: Android Malware Threat Assessment Using Ensemble of ANFIS and GWO
Nedal Nwasra, Mohammad I. Daoud, Zahid Hussain Qaisar
Cybernetics and Information Technologies (2024) Vol. 24, Iss. 3, pp. 39-58
Open Access
Nedal Nwasra, Mohammad I. Daoud, Zahid Hussain Qaisar
Cybernetics and Information Technologies (2024) Vol. 24, Iss. 3, pp. 39-58
Open Access
Robust malicious software detection and classification using global whale optimization algorithm with deep learning approach
Mohammed Assiri
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
Mohammed Assiri
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
Assessing Cybersecurity Threats: The Application of NLP in Advanced Threat Intelligence Systems
Md Aminul Islam, Rabiul Islam, Sabbir Ahmed Chowdhury, et al.
Lecture notes in networks and systems (2024), pp. 1-14
Closed Access
Md Aminul Islam, Rabiul Islam, Sabbir Ahmed Chowdhury, et al.
Lecture notes in networks and systems (2024), pp. 1-14
Closed Access
High-Precision Malware Detection in Android Apps Using Quantum Explainable Hierarchical Interaction Network
Ramnath Muthusamy, Yesubai Rubavathi Charles
Knowledge-Based Systems (2024), pp. 112916-112916
Closed Access
Ramnath Muthusamy, Yesubai Rubavathi Charles
Knowledge-Based Systems (2024), pp. 112916-112916
Closed Access
Security Testing of Android Apps Using Malware Analysis and XGboost Optimized by Adaptive Particle Swarm Optimization
Pawan Kumar, Sukhdip Singh
SN Computer Science (2023) Vol. 5, Iss. 1
Closed Access | Times Cited: 1
Pawan Kumar, Sukhdip Singh
SN Computer Science (2023) Vol. 5, Iss. 1
Closed Access | Times Cited: 1
Binary Malware Detection via Heterogeneous Information Deep Ensemble Learning
Runhan Song, Lun Li, Lei Cui, et al.
(2023)
Closed Access | Times Cited: 1
Runhan Song, Lun Li, Lei Cui, et al.
(2023)
Closed Access | Times Cited: 1
Tdbamla: Temporal and Dynamic Behavior Analysis in Android Malware Using Lstm and Attention Mechanisms
Harshal D. Misalkar, Pon Harshavardhanan
(2023)
Closed Access
Harshal D. Misalkar, Pon Harshavardhanan
(2023)
Closed Access