OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Showing 23 citing articles:

The Age of Ransomware: A Survey on the Evolution, Taxonomy, and Research Directions
Salwa Razaulla, Claude Fachkha, Christine Markarian, et al.
IEEE Access (2023) Vol. 11, pp. 40698-40723
Open Access | Times Cited: 52

COVID 19: Identification of Masked Face using CNN Architecture
Sanjay Kumar Singh, Ankur Aggarwal, P. Ramesh, et al.
2022 3rd International Conference on Electronics and Sustainable Communication Systems (ICESC) (2022), pp. 1045-1051
Closed Access | Times Cited: 44

FLSH: A Framework Leveraging Similarity Hashing for Android Malware and Variant Detection
Hassan Jalil Hadi, Aqsa Khalid, Faisal Bashir Hussain, et al.
IEEE Access (2025) Vol. 13, pp. 26142-26156
Open Access

Masked Face Recognition Algorithm for a Contactless Distribution Cabinet
Gui-Ling Wu
Mathematical Problems in Engineering (2021) Vol. 2021, pp. 1-11
Open Access | Times Cited: 27

Digital Forensics AI: Evaluating, Standardizing and Optimizing Digital Evidence Mining Techniques
Abiodun A. Solanke, Maria Angela Biasiotti
KI - Künstliche Intelligenz (2022) Vol. 36, Iss. 2, pp. 143-161
Open Access | Times Cited: 16

Fuzzy-import hashing: A static analysis technique for malware detection
Nitin Naik, Paul Jenkins, Nick Savage, et al.
Forensic Science International Digital Investigation (2021) Vol. 37, pp. 301139-301139
Open Access | Times Cited: 20

A Procedure for Tracing Chain of Custody in Digital Image Forensics: A Paradigm Based on Grey Hash and Blockchain
Mohamed Al Ali, Ahmed Adel Ismail, Hany M. Elgohary, et al.
Symmetry (2022) Vol. 14, Iss. 2, pp. 334-334
Open Access | Times Cited: 14

L-IDS: A Multi-Layered Approach to Ransomware Detection in IoT
Farhad Mofidi, Sena G Hounsinou, Gedare Bloom
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) (2024), pp. 0387-0396
Closed Access | Times Cited: 2

Embedded YARA rules: strengthening YARA rules utilising fuzzy hashing and fuzzy rules for malware analysis
Nitin Naik, Paul Jenkins, Nick Savage, et al.
Complex & Intelligent Systems (2020) Vol. 7, Iss. 2, pp. 687-702
Open Access | Times Cited: 23

Evaluating Automatically Generated YARA Rules and Enhancing Their Effectiveness
Nitin Naik, Paul Jenkins, Roger Cooke, et al.
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2020), pp. 1146-1153
Open Access | Times Cited: 20

Augmented YARA Rules Fused With Fuzzy Hashing in Ransomware Triaging
Nitin Naik, Paul Jenkins, Nick Savage, et al.
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2019), pp. 625-632
Open Access | Times Cited: 17

Fuzzy-Import Hashing: A Malware Analysis Approach
Nitin Naik, Paul Jenkins, Nick Savage, et al.
2022 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) (2020), pp. 1-8
Open Access | Times Cited: 16

A Classification Approach Based on Evolutionary Clustering and Its Application for Ransomware Detection
Raneem Qaddoura, Ibrahim Aljarah, Hossam Faris, et al.
Algorithms for intelligent systems (2021), pp. 237-248
Closed Access | Times Cited: 15

Embedding Fuzzy Rules with YARA Rules for Performance Optimisation of Malware Analysis
Nitin Naik, Paul Jenkins, Nick Savage, et al.
2022 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) (2020), pp. 1-7
Open Access | Times Cited: 14

Fuzzy Hashing Aided Enhanced YARA Rules for Malware Triaging
Nitin Naik, Paul Jenkins, Nick Savage, et al.
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2020), pp. 1138-1145
Open Access | Times Cited: 14

Signature-less ransomware detection and mitigation
Yash Shashikant Joshi, Harsh Mahajan, Sumedh Nitin Joshi, et al.
Journal of Computer Virology and Hacking Techniques (2021) Vol. 17, Iss. 4, pp. 299-306
Closed Access | Times Cited: 13

Lockout-Tagout Ransomware: A Detection Method for Ransomware using Fuzzy Hashing and Clustering
Nitin Naik, Paul Jenkins, Jonathan Gillett, et al.
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2019), pp. 641-648
Open Access | Times Cited: 15

Ant Colony Optimization based Light weight Binary Search for efficient signature matching to filter Ransomware
Sreelaja N.K.
Applied Soft Computing (2021) Vol. 111, pp. 107635-107635
Closed Access | Times Cited: 11

An Approach for Stego-Insider Detection Based on a Hybrid NoSQL Database
Igor Kotenko, Andrey Krasov, Igor Ushakov, et al.
Journal of Sensor and Actuator Networks (2021) Vol. 10, Iss. 2, pp. 25-25
Open Access | Times Cited: 9

CAP - A Context-Aware Framework for Detection and Analysis of Packed Malware
Muhammad Nouman Ahmed, Zafar Iqbal, Hasan Mahmood, et al.
(2024), pp. 1-6
Closed Access

When Similarity Digest Meets Vector Management System: A Survey on Similarity Hash Function
Zhushou Tang, Lingyi Tang, Keying Tang, et al.
arXiv (Cornell University) (2021)
Open Access

Page 1

Scroll to top