OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Cyberthreat Hunting - Part 1: Triaging Ransomware using Fuzzy Hashing, Import Hashing and YARA Rules
Nitin Naik, Paul Jenkins, Nick Savage, et al.
2022 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) (2019), pp. 1-6
Open Access | Times Cited: 28

Showing 1-25 of 28 citing articles:

A Survey on Windows-based Ransomware Taxonomy and Detection Mechanisms
Routa Moussaileb, Nora Cuppens, Jean‐Louis Lanet, et al.
ACM Computing Surveys (2021) Vol. 54, Iss. 6, pp. 1-36
Open Access | Times Cited: 52

Utilizing Cyber Threat Hunting Techniques to Find Ransomware Attacks: A Survey of the State of the Art
Fatimah Aldauiji, Omar Batarfi, Manal Bayousef
IEEE Access (2022) Vol. 10, pp. 61695-61706
Open Access | Times Cited: 31

Threat Hunting Architecture Using a Machine Learning Approach for Critical Infrastructures Protection
Mario Aragonés Lozano, Israel Pérez Llopis, Manuel Esteve Domingo
Big Data and Cognitive Computing (2023) Vol. 7, Iss. 2, pp. 65-65
Open Access | Times Cited: 10

Cyberthreat Hunting - Part 2: Tracking Ransomware Threat Actors using Fuzzy Hashing and Fuzzy C-Means Clustering
Nitin Naik, Paul Jenkins, Nick Savage, et al.
2022 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) (2019), pp. 1-6
Open Access | Times Cited: 26

Information Sources Estimation in Time-Varying Networks
Yun Chai, Youguo Wang, Liang Zhu
IEEE Transactions on Information Forensics and Security (2021) Vol. 16, pp. 2621-2636
Closed Access | Times Cited: 21

Fuzzy-import hashing: A static analysis technique for malware detection
Nitin Naik, Paul Jenkins, Nick Savage, et al.
Forensic Science International Digital Investigation (2021) Vol. 37, pp. 301139-301139
Open Access | Times Cited: 20

Embedded YARA rules: strengthening YARA rules utilising fuzzy hashing and fuzzy rules for malware analysis
Nitin Naik, Paul Jenkins, Nick Savage, et al.
Complex & Intelligent Systems (2020) Vol. 7, Iss. 2, pp. 687-702
Open Access | Times Cited: 23

Evaluating Automatically Generated YARA Rules and Enhancing Their Effectiveness
Nitin Naik, Paul Jenkins, Roger Cooke, et al.
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2020), pp. 1146-1153
Open Access | Times Cited: 20

Augmented YARA Rules Fused With Fuzzy Hashing in Ransomware Triaging
Nitin Naik, Paul Jenkins, Nick Savage, et al.
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2019), pp. 625-632
Open Access | Times Cited: 17

Fuzzy-Import Hashing: A Malware Analysis Approach
Nitin Naik, Paul Jenkins, Nick Savage, et al.
2022 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) (2020), pp. 1-8
Open Access | Times Cited: 16

Understanding uses and misuses of similarity hashing functions for malware detection and family clustering in actual scenarios
Marcus Botacin, Vitor Hugo Galhardo Moia, Fabrício Ceschin, et al.
Forensic Science International Digital Investigation (2021) Vol. 38, pp. 301220-301220
Closed Access | Times Cited: 14

Embedding Fuzzy Rules with YARA Rules for Performance Optimisation of Malware Analysis
Nitin Naik, Paul Jenkins, Nick Savage, et al.
2022 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) (2020), pp. 1-7
Open Access | Times Cited: 14

Analysing the fall 2020 Emotet campaign
Constantinos Patsakis, Anargyros Chrysanthou
arXiv (Cornell University) (2020)
Open Access | Times Cited: 14

Fuzzy Hashing Aided Enhanced YARA Rules for Malware Triaging
Nitin Naik, Paul Jenkins, Nick Savage, et al.
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2020), pp. 1138-1145
Open Access | Times Cited: 14

Lockout-Tagout Ransomware: A Detection Method for Ransomware using Fuzzy Hashing and Clustering
Nitin Naik, Paul Jenkins, Jonathan Gillett, et al.
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2019), pp. 641-648
Open Access | Times Cited: 15

Runtime API Signature for Fileless Malware Detection
Radah Tarek, Chaimae Saadi, Habiba Chaoui
Advances in intelligent systems and computing (2020), pp. 645-654
Closed Access | Times Cited: 8

Network Forensics Against Ryuk Ransomware Using Trigger, Acquire, Analysis, Report, and Action (TAARA) Method
Ridho Surya Kusuma, Rusydi Umar, Imam Riadi
Kinetik Game Technology Information System Computer Network Computing Electronics and Control (2021)
Open Access | Times Cited: 8

Generation of Static YARA-Signatures Using Genetic Algorithm
Alexander V. Zhdanov
(2019), pp. 220-228
Closed Access | Times Cited: 7

YARAMON: A Memory-based Detection Framework for Ransomware Families
May Medhat, Menna Essa, Hend Faisal, et al.
(2020), pp. 1-6
Closed Access | Times Cited: 6

An Optimal Seed Scheduling Strategy Algorithm Applied to Cyberspace Mimic Defense
Zhuoxing Chen, Yiqin Lu, Jiancheng Qin, et al.
IEEE Access (2021) Vol. 9, pp. 129032-129050
Open Access | Times Cited: 6

Unpacking Malware in the Real World: A Step-by Step Guide
Nikolaos Totosis, Constantinos Patsakis
Advances in information security (2024), pp. 299-331
Closed Access

Integrating a Rule-Based Approach to Malware Detection with an LSTM-Based Feature Selection Technique
Sonam Bhardwaj, Mayank Dave
SN Computer Science (2023) Vol. 4, Iss. 6
Closed Access | Times Cited: 1

Rule-Based Approach to Detect IoT Malicious Files
Faisal Alsattam, Mousa Al-Akhras, Marwah Almasri, et al.
Journal of Computer Science (2020) Vol. 16, Iss. 9, pp. 1203-1211
Open Access | Times Cited: 1

Page 1 - Next Page

Scroll to top