OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Ransomware Triage Using Deep Learning: Twitter as a Case Study
R. Vinayakumar, Mamoun Alazab, Alireza Jolfaei, et al.
(2019) Vol. 521, pp. 67-73
Closed Access | Times Cited: 44

Showing 1-25 of 44 citing articles:

A Survey on Machine Learning Techniques for Cyber Security in the Last Decade
Kamran Shaukat, Suhuai Luo, Vijay Varadharajan, et al.
IEEE Access (2020) Vol. 8, pp. 222310-222354
Open Access | Times Cited: 348

A Visualized Botnet Detection System Based Deep Learning for the Internet of Things Networks of Smart Cities
R. Vinayakumar, Mamoun Alazab, Sriram Srinivasan, et al.
IEEE Transactions on Industry Applications (2020) Vol. 56, Iss. 4, pp. 4436-4456
Closed Access | Times Cited: 288

IoT malicious traffic identification using wrapper-based feature selection mechanisms
Muhammad Shafiq, Zhihong Tian, Ali Kashif Bashir, et al.
Computers & Security (2020) Vol. 94, pp. 101863-101863
Open Access | Times Cited: 231

Cyber security in smart cities: A review of deep learning-based applications and case studies
Dongliang Chen, Paweł Wawrzyński, Zhihan Lv
Sustainable Cities and Society (2020) Vol. 66, pp. 102655-102655
Closed Access | Times Cited: 229

Network Flow based IoT Botnet Attack Detection using Deep Learning
S. Sriram, R. Vinayakumar, Mamoun Alazab, et al.
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (2020)
Closed Access | Times Cited: 145

The Age of Ransomware: A Survey on the Evolution, Taxonomy, and Research Directions
Salwa Razaulla, Claude Fachkha, Christine Markarian, et al.
IEEE Access (2023) Vol. 11, pp. 40698-40723
Open Access | Times Cited: 53

A Multi-level Random Forest Model-Based Intrusion Detection Using Fuzzy Inference System for Internet of Things Networks
Joseph Bamidele Awotunde, Femi Emmanuel Ayo, Ranjit Panigrahi, et al.
International Journal of Computational Intelligence Systems (2023) Vol. 16, Iss. 1
Open Access | Times Cited: 23

A survey on cybersecurity knowledge graph construction
Xiaojuan Zhao, Rong Jiang, Yue Han, et al.
Computers & Security (2023) Vol. 136, pp. 103524-103524
Closed Access | Times Cited: 20

Securing smart vehicles from relay attacks using machine learning
Ahmad Usman, Hong Song, Awais Bilal, et al.
The Journal of Supercomputing (2019) Vol. 76, Iss. 4, pp. 2665-2682
Closed Access | Times Cited: 49

DBD: Deep Learning DGA-Based Botnet Detection
R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran, et al.
Advanced sciences and technologies for security applications (2019), pp. 127-149
Closed Access | Times Cited: 45

Multi-scale Learning based Malware Variant Detection using Spatial Pyramid Pooling Network
S. Sriram, R. Vinayakumar, V. Sowmya, et al.
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (2020), pp. 740-745
Closed Access | Times Cited: 39

DURLD: Malicious URL Detection Using Deep Learning-Based Character Level Representations
Sriram Srinivasan, R. Vinayakumar, Ajay Arunachalam, et al.
Springer eBooks (2020), pp. 535-554
Closed Access | Times Cited: 33

Review of NLP-based Systems in Digital Forensics and Cybersecurity
David Okore Ukwen, Murat Karabatak
(2021) Vol. 7, pp. 1-9
Closed Access | Times Cited: 25

Deep Learning Approach for Intelligent Named Entity Recognition of Cyber Security
K. Simran, Sai Sriram, R. Vinayakumar, et al.
Communications in computer and information science (2020), pp. 163-172
Closed Access | Times Cited: 25

Enhanced Domain Generating Algorithm Detection Based on Deep Neural Networks
Amara Dinesh Kumar, Harish Thodupunoori, R. Vinayakumar, et al.
Advanced sciences and technologies for security applications (2019), pp. 151-173
Closed Access | Times Cited: 16

A Comprehensive Tutorial and Survey of Applications of Deep Learning for Cyber Security
Vinayakumar Ravi, Soman KP, Mamoun Alazab, et al.
(2020)
Open Access | Times Cited: 14

Deep Learning Approach for Enhanced Cyber Threat Indicators in Twitter Stream
K. Simran, Prathiksha Balakrishna, R. Vinayakumar, et al.
Communications in computer and information science (2020), pp. 135-145
Closed Access | Times Cited: 12

Malicious URL Detection using Deep Learning
R. Vinayakumar, Sai Sriram, Soman KP, et al.
(2020)
Open Access | Times Cited: 9

Deep Learning for Cyber Security Applications: A Comprehensive Survey
R. Vinayakumar, Mamoun Alazab, Soman KP, et al.
(2021)
Open Access | Times Cited: 9

On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security
Omar Alshaikh, Simon Parkinson, Saad Khan
Communications in computer and information science (2023), pp. 545-555
Closed Access | Times Cited: 3

RETRACTED ARTICLE: IoT Based Multimodal Social Interaction Activity Framework for the Physical Education System
Liang Zhuang, Ching‐Hsien Hsu, Priyan Malarvizhi Kumar
Wireless Personal Communications (2021) Vol. 127, Iss. S1, pp. 41-41
Closed Access | Times Cited: 6

A Comprehensive Tutorial and Survey of Applications of Deep Learning for Cyber Security
Vinayakumar Ravi, Soman KP, Mamoun Alazab, et al.
(2020)
Open Access | Times Cited: 6

Malicious URL Detection using Deep Learning
R. Vinayakumar, S Sriram, Soman KP, et al.
(2020)
Open Access | Times Cited: 5

Towards Evaluating the Robustness of Deep Intrusion Detection Models in Adversarial Environment
Sriram Srinivasan, K. Simran, R. Vinayakumar, et al.
(2020)
Open Access | Times Cited: 4

Deep Learning for Cyber Security Applications: A Comprehensive Survey
R. Vinayakumar, Mamoun Alazab, Soman KP, et al.
(2021)
Open Access | Times Cited: 4

Page 1 - Next Page

Scroll to top