OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Robust Malware Detection using Residual Attention Network
Shamika Ganesan, Vinayakumar Ravi, Moez Krichen, et al.
2023 IEEE International Conference on Consumer Electronics (ICCE) (2021), pp. 1-6
Open Access | Times Cited: 18

Showing 18 citing articles:

An Insight into the Machine-Learning-Based Fileless Malware Detection
Osama Khalid, Subhan Ullah, Tahir Ahmad, et al.
Sensors (2023) Vol. 23, Iss. 2, pp. 612-612
Open Access | Times Cited: 24

MalBERTv2: Code Aware BERT-Based Model for Malware Identification
Abir Rahali, Moulay A. Akhloufi
Big Data and Cognitive Computing (2023) Vol. 7, Iss. 2, pp. 60-60
Open Access | Times Cited: 24

Malware Detection in Internet of Things (IoT) Devices Using Deep Learning
Sharjeel Riaz, Shahzad Latif, Syed Muhammad Usman, et al.
Sensors (2022) Vol. 22, Iss. 23, pp. 9305-9305
Open Access | Times Cited: 24

Development of improved heuristic-assisted deep learning for content-based image retrieval systems using multi-similarity measures
Sarika Khandelwal, Ruchi Vyas, Neha Singh, et al.
The Imaging Science Journal (2025), pp. 1-21
Closed Access

Deep-Hook: A trusted deep learning-based framework for unknown malware detection and classification in Linux cloud environments
Tom Landman, Nir Nissim
Neural Networks (2021) Vol. 144, pp. 648-685
Closed Access | Times Cited: 29

Features Engineering to Differentiate between Malware and Legitimate Software
Ammar Yahya Daeef, Ali Al‐Naji, Ali Kareem Nahar, et al.
Applied Sciences (2023) Vol. 13, Iss. 3, pp. 1972-1972
Open Access | Times Cited: 11

MalBERT: Using Transformers for Cybersecurity and Malicious Software Detection
Abir Rahali, Moulay A. Akhloufi
arXiv (Cornell University) (2021)
Open Access | Times Cited: 21

Self-Attentive Models for Real-Time Malware Classification
Qikai Lu, Hongwen Zhang, Husam Kinawi, et al.
IEEE Access (2022) Vol. 10, pp. 95970-95985
Open Access | Times Cited: 12

Android malware analysis in a nutshell
Iman Almomani, Mohanned Ahmed, Walid El‐Shafai
PLoS ONE (2022) Vol. 17, Iss. 7, pp. e0270647-e0270647
Open Access | Times Cited: 8

Network Intrusion Detection Using Multi-Modal Ensemble Modeling
Aravindha Lochanan M, Indraveni Chebolu, Ch A S Murty
(2024), pp. 1-5
Closed Access | Times Cited: 1

Hybrid Features-Based Ensembled Residual Convolutional Neural Network for Bird Acoustic Identification
Hari Theivaprakasham, V. Sowmya, Vinayakumar Ravi, et al.
Lecture notes in electrical engineering (2022), pp. 437-445
Closed Access | Times Cited: 6

Deep Learning with Attention Mechanism for Cryptocurrency Price Forecasting
V. Yazhini, Nimal Madhu M., B. Premjith, et al.
Lecture notes in networks and systems (2023), pp. 471-484
Closed Access | Times Cited: 3

A Robust Cyber Attack Detection Method Through Attention-based Graph Neural Networks
Xiangyang Xu, Yu Song
Journal of Circuits Systems and Computers (2024)
Closed Access

An Analysis and Implementation of a Deep Learning Model for Image Steganography
Raksha Ramakotti, Surekha Paneerselvam
Springer eBooks (2021), pp. 210-224
Closed Access | Times Cited: 3

Machine Learning based Malware Detection for IoT Networks
Shiva Shankar Mutupuri, Vallabhaneni Preetam, Dudugu Aditya, et al.
(2023), pp. 298-303
Closed Access

Edge Computing Based Secure Healthcare System
G Souganthika, T. Gireesh Kumar, N. Radhika
2019 Innovations in Power and Advanced Computing Technologies (i-PACT) (2023), pp. 1-5
Closed Access

Page 1

Scroll to top