
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Review of State-of-the-Art Malware Attack Trends and Defense Mechanisms
Jannatul Ferdous, Rafiqul Islam, Arash Mahboubi, et al.
IEEE Access (2023) Vol. 11, pp. 121118-121141
Open Access | Times Cited: 18
Jannatul Ferdous, Rafiqul Islam, Arash Mahboubi, et al.
IEEE Access (2023) Vol. 11, pp. 121118-121141
Open Access | Times Cited: 18
Showing 18 citing articles:
A Survey on ML Techniques for Multi-Platform Malware Detection: Securing PC, Mobile Devices, IoT, and Cloud Environments
Jannatul Ferdous, Rafiqul Islam, Arash Mahboubi, et al.
Sensors (2025) Vol. 25, Iss. 4, pp. 1153-1153
Open Access
Jannatul Ferdous, Rafiqul Islam, Arash Mahboubi, et al.
Sensors (2025) Vol. 25, Iss. 4, pp. 1153-1153
Open Access
Advancing Business Security in Cloud for Fileless Malware Detection Using Machine Learning
Inderjeet Balotia, Prasad Purnaye, Vrushali Kulkarni
Smart innovation, systems and technologies (2025), pp. 605-618
Closed Access
Inderjeet Balotia, Prasad Purnaye, Vrushali Kulkarni
Smart innovation, systems and technologies (2025), pp. 605-618
Closed Access
The Application of Blockchain Technology in the Field of Digital Forensics: A Literature Review
Oshoke Samson Igonor, Muhammad Bilal Amin, Saurabh K. Garg†
Blockchains (2025) Vol. 3, Iss. 1, pp. 5-5
Open Access
Oshoke Samson Igonor, Muhammad Bilal Amin, Saurabh K. Garg†
Blockchains (2025) Vol. 3, Iss. 1, pp. 5-5
Open Access
A novel hyperparameter tuning method for enhanced intrusion detection in network security
Vahid Sinap
Turkish Journal of Engineering (2025) Vol. 9, Iss. 3, pp. 519-534
Open Access
Vahid Sinap
Turkish Journal of Engineering (2025) Vol. 9, Iss. 3, pp. 519-534
Open Access
Real-time system call-based ransomware detection
Christopher Jun Wen Chew, Vimal Kumar, Panos Patros, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 1839-1858
Open Access | Times Cited: 4
Christopher Jun Wen Chew, Vimal Kumar, Panos Patros, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 1839-1858
Open Access | Times Cited: 4
Exploring Lightweight Deep Learning Techniques for Intrusion Detection Systems in IoT Networks: A Survey
Hind Ali abdul Hassan
Deleted Journal (2024) Vol. 20, Iss. 4s, pp. 1944-1958
Open Access | Times Cited: 1
Hind Ali abdul Hassan
Deleted Journal (2024) Vol. 20, Iss. 4s, pp. 1944-1958
Open Access | Times Cited: 1
Modeling Cybersecurity Risk: The Integration of Decision Theory and Pivot Pairwise Relative Criteria Importance Assessment with Scale for Cybersecurity Threat Evaluation
Aleksandar Šijan, Dejan Viduka, Luka Ilić, et al.
Electronics (2024) Vol. 13, Iss. 21, pp. 4209-4209
Open Access | Times Cited: 1
Aleksandar Šijan, Dejan Viduka, Luka Ilić, et al.
Electronics (2024) Vol. 13, Iss. 21, pp. 4209-4209
Open Access | Times Cited: 1
Mathematical Models for Malware Propagation: State of the Art and Perspectives
A. Martı́n del Rey
Advances in information security (2024), pp. 67-92
Closed Access | Times Cited: 1
A. Martı́n del Rey
Advances in information security (2024), pp. 67-92
Closed Access | Times Cited: 1
A systematic solution of distributed and trusted chain-network integration
Yansheng Chen, Pu Jian, Yin Zhang, et al.
Journal of Industrial Information Integration (2024) Vol. 41, pp. 100664-100664
Closed Access | Times Cited: 1
Yansheng Chen, Pu Jian, Yin Zhang, et al.
Journal of Industrial Information Integration (2024) Vol. 41, pp. 100664-100664
Closed Access | Times Cited: 1
Accelerating Ransomware Defenses with Computational Storage Drive-Based API Call Sequence Classification
Kurt Friday, Elias Bou‐Harb
(2024), pp. 8-16
Closed Access
Kurt Friday, Elias Bou‐Harb
(2024), pp. 8-16
Closed Access
Intelligent Malware Detection Integrating Cloud and Fog Computing
Carlos H. Paiva, Mateus F. Nascimento, Renan L. Rodrigues, et al.
(2024), pp. 26-31
Closed Access
Carlos H. Paiva, Mateus F. Nascimento, Renan L. Rodrigues, et al.
(2024), pp. 26-31
Closed Access
Harnessing Machine Learning for Adaptive Signature-Based Network Intrusion Detection: A Simulation-Driven Approach
Peter Paul Issah, Ransford Ganyo
International Journal of Latest Technology in Engineering Management & Applied Science (2024) Vol. 13, Iss. 10, pp. 181-192
Open Access
Peter Paul Issah, Ransford Ganyo
International Journal of Latest Technology in Engineering Management & Applied Science (2024) Vol. 13, Iss. 10, pp. 181-192
Open Access
Leveraging on-board computing in autonomous ferries to identify malicious network connections
Kadhim Hayawi, Junaid Sajid, Asad Waqar Malik, et al.
Journal of Transportation Security (2024) Vol. 17, Iss. 1
Closed Access
Kadhim Hayawi, Junaid Sajid, Asad Waqar Malik, et al.
Journal of Transportation Security (2024) Vol. 17, Iss. 1
Closed Access
Modeling and Analysis of Advanced Intrusion Prevention System Using Distributed Host Datasets for Anomaly Detection
Shashank Sharma, Shaligram Prajapat, Nitin Naik
Lecture notes in networks and systems (2024), pp. 625-634
Closed Access
Shashank Sharma, Shaligram Prajapat, Nitin Naik
Lecture notes in networks and systems (2024), pp. 625-634
Closed Access
Malware development: From early viruses to modern cyber threats
Denys Kovalchuk
Вісник Черкаського державного технологічного університету (2024) Vol. 29, Iss. 3, pp. 10-20
Open Access
Denys Kovalchuk
Вісник Черкаського державного технологічного університету (2024) Vol. 29, Iss. 3, pp. 10-20
Open Access
Evaluation of a New-Concept Secure File Server Solution
Gábor Arányi, Ágnes Vathy-Fogarassy, Veronika Szücs
Future Internet (2024) Vol. 16, Iss. 9, pp. 306-306
Open Access
Gábor Arányi, Ágnes Vathy-Fogarassy, Veronika Szücs
Future Internet (2024) Vol. 16, Iss. 9, pp. 306-306
Open Access
Machine Learning and Transformers for Malware Analysis: Overview
Adam Gajdošík, Ivan Kotuliak
(2024), pp. 1-7
Closed Access
Adam Gajdošík, Ivan Kotuliak
(2024), pp. 1-7
Closed Access
Geopolitical Ramifications of Cybersecurity Threats: State Responses and International Cooperations in the Digital Warfare Era
Aisha Adeyeri, Hossein Abroshan
Information (2024) Vol. 15, Iss. 11, pp. 682-682
Open Access
Aisha Adeyeri, Hossein Abroshan
Information (2024) Vol. 15, Iss. 11, pp. 682-682
Open Access