OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Review of State-of-the-Art Malware Attack Trends and Defense Mechanisms
Jannatul Ferdous, Rafiqul Islam, Arash Mahboubi, et al.
IEEE Access (2023) Vol. 11, pp. 121118-121141
Open Access | Times Cited: 18

Showing 18 citing articles:

A Survey on ML Techniques for Multi-Platform Malware Detection: Securing PC, Mobile Devices, IoT, and Cloud Environments
Jannatul Ferdous, Rafiqul Islam, Arash Mahboubi, et al.
Sensors (2025) Vol. 25, Iss. 4, pp. 1153-1153
Open Access

Advancing Business Security in Cloud for Fileless Malware Detection Using Machine Learning
Inderjeet Balotia, Prasad Purnaye, Vrushali Kulkarni
Smart innovation, systems and technologies (2025), pp. 605-618
Closed Access

The Application of Blockchain Technology in the Field of Digital Forensics: A Literature Review
Oshoke Samson Igonor, Muhammad Bilal Amin, Saurabh K. Garg†
Blockchains (2025) Vol. 3, Iss. 1, pp. 5-5
Open Access

A novel hyperparameter tuning method for enhanced intrusion detection in network security
Vahid Sinap
Turkish Journal of Engineering (2025) Vol. 9, Iss. 3, pp. 519-534
Open Access

Real-time system call-based ransomware detection
Christopher Jun Wen Chew, Vimal Kumar, Panos Patros, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 1839-1858
Open Access | Times Cited: 4

Exploring Lightweight Deep Learning Techniques for Intrusion Detection Systems in IoT Networks: A Survey
Hind Ali abdul Hassan
Deleted Journal (2024) Vol. 20, Iss. 4s, pp. 1944-1958
Open Access | Times Cited: 1

Mathematical Models for Malware Propagation: State of the Art and Perspectives
A. Martı́n del Rey
Advances in information security (2024), pp. 67-92
Closed Access | Times Cited: 1

A systematic solution of distributed and trusted chain-network integration
Yansheng Chen, Pu Jian, Yin Zhang, et al.
Journal of Industrial Information Integration (2024) Vol. 41, pp. 100664-100664
Closed Access | Times Cited: 1

Intelligent Malware Detection Integrating Cloud and Fog Computing
Carlos H. Paiva, Mateus F. Nascimento, Renan L. Rodrigues, et al.
(2024), pp. 26-31
Closed Access

Harnessing Machine Learning for Adaptive Signature-Based Network Intrusion Detection: A Simulation-Driven Approach
Peter Paul Issah, Ransford Ganyo
International Journal of Latest Technology in Engineering Management & Applied Science (2024) Vol. 13, Iss. 10, pp. 181-192
Open Access

Leveraging on-board computing in autonomous ferries to identify malicious network connections
Kadhim Hayawi, Junaid Sajid, Asad Waqar Malik, et al.
Journal of Transportation Security (2024) Vol. 17, Iss. 1
Closed Access

Modeling and Analysis of Advanced Intrusion Prevention System Using Distributed Host Datasets for Anomaly Detection
Shashank Sharma, Shaligram Prajapat, Nitin Naik
Lecture notes in networks and systems (2024), pp. 625-634
Closed Access

Malware development: From early viruses to modern cyber threats
Denys Kovalchuk
Вісник Черкаського державного технологічного університету (2024) Vol. 29, Iss. 3, pp. 10-20
Open Access

Evaluation of a New-Concept Secure File Server Solution
Gábor Arányi, Ágnes Vathy-Fogarassy, Veronika Szücs
Future Internet (2024) Vol. 16, Iss. 9, pp. 306-306
Open Access

Machine Learning and Transformers for Malware Analysis: Overview
Adam Gajdošík, Ivan Kotuliak
(2024), pp. 1-7
Closed Access

Page 1

Scroll to top