
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Generation of Static YARA-Signatures Using Genetic Algorithm
Alexander V. Zhdanov
(2019), pp. 220-228
Closed Access | Times Cited: 7
Alexander V. Zhdanov
(2019), pp. 220-228
Closed Access | Times Cited: 7
Showing 7 citing articles:
YAMME: a YAra-byte-signatures Metamorphic Mutation Engine
Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 4530-4545
Open Access | Times Cited: 13
Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 4530-4545
Open Access | Times Cited: 13
An Efficient Hybrid Webshell Detection Method for Webserver of Marine Transportation Systems
Ha Vu Le, Tu N. Nguyen, Hoa N. Nguyen, et al.
IEEE Transactions on Intelligent Transportation Systems (2021), pp. 1-13
Open Access | Times Cited: 23
Ha Vu Le, Tu N. Nguyen, Hoa N. Nguyen, et al.
IEEE Transactions on Intelligent Transportation Systems (2021), pp. 1-13
Open Access | Times Cited: 23
Detection of Malware by Using YARA Rules
Reyadh Hazim Mahdi, Hafedh Trabelsi
(2024) Vol. 5500, pp. 1-8
Closed Access | Times Cited: 1
Reyadh Hazim Mahdi, Hafedh Trabelsi
(2024) Vol. 5500, pp. 1-8
Closed Access | Times Cited: 1
Innovating Threat Detection: Behavioral Rule Generators for Malware Families
Pavan R. Kashyap, Phaneesh R. Katti, Bhat P. Hrishikesh, et al.
Lecture notes in networks and systems (2024), pp. 335-348
Closed Access
Pavan R. Kashyap, Phaneesh R. Katti, Bhat P. Hrishikesh, et al.
Lecture notes in networks and systems (2024), pp. 335-348
Closed Access
Marcus Botacin, Francis B. Moreira, Philippe O. A. Navaux, et al.
ACM Transactions on Privacy and Security (2022) Vol. 25, Iss. 2, pp. 1-34
Closed Access | Times Cited: 2
An Improved Genetic Algorithm for Safety and Availability Checking in Cyber-Physical Systems
Zheng Wang, Yanan Jin, Shasha Yang, et al.
IEEE Access (2021) Vol. 9, pp. 56869-56880
Open Access | Times Cited: 2
Zheng Wang, Yanan Jin, Shasha Yang, et al.
IEEE Access (2021) Vol. 9, pp. 56869-56880
Open Access | Times Cited: 2
Implementation of Yara Rules in Android
Pragya Bharti, Shreya Saha Roy, A. Suresh
2022 International Conference on Computer Communication and Informatics (ICCCI) (2023)
Closed Access
Pragya Bharti, Shreya Saha Roy, A. Suresh
2022 International Conference on Computer Communication and Informatics (ICCCI) (2023)
Closed Access