OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

The Dangerous Combo: Fileless Malware and Cryptojacking
Said Varlioglu, Nelly Elsayed, Zag ElSayed, et al.
SoutheastCon (2022), pp. 125-132
Open Access | Times Cited: 24

Showing 24 citing articles:

An Insight into the Machine-Learning-Based Fileless Malware Detection
Osama Khalid, Subhan Ullah, Tahir Ahmad, et al.
Sensors (2023) Vol. 23, Iss. 2, pp. 612-612
Open Access | Times Cited: 24

MeMalDet: A memory analysis-based malware detection framework using deep autoencoders and stacked ensemble under temporal evaluations
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
Computers & Security (2024) Vol. 142, pp. 103864-103864
Open Access | Times Cited: 9

Fileless malware threats: Recent advances, analysis approach through memory forensics and research challenges
İlker Kara
Expert Systems with Applications (2022) Vol. 214, pp. 119133-119133
Closed Access | Times Cited: 31

The types of hackers and cyberattacks in the aviation industry
Lázaro Florido-Benítez
Journal of Transportation Security (2024) Vol. 17, Iss. 1
Open Access | Times Cited: 6

Defending novice user privacy: An evaluation of default web browser configurations
Kristina Radivojevic, N Clark, Anna Klempay, et al.
Computers & Security (2024) Vol. 140, pp. 103784-103784
Closed Access | Times Cited: 5

Enhancing EV Charging Station Security Using a Multi-dimensional Dataset: CICEVSE2024
Emmanuel Dana Buedi, Ali A. Ghorbani, Sajjad Dadkhah, et al.
Lecture notes in computer science (2024), pp. 171-190
Closed Access | Times Cited: 4

Analysis of Malicious Files Gathering via Honeypot Trap System and Benchmark of Anti-Virus Software
Melike Başer, Ebu Yusuf Güven, Muhammed Ali Aydın
Balkan Journal of Electrical and Computer Engineering (2025) Vol. 12, Iss. 4, pp. 337-348
Open Access

Advancing Business Security in Cloud for Fileless Malware Detection Using Machine Learning
Inderjeet Balotia, Prasad Purnaye, Vrushali Kulkarni
Smart innovation, systems and technologies (2025), pp. 605-618
Closed Access

cryptoRAN: A Review on Cryptojacking and Ransomware Attacks W.R.T. Banking Industry - Threats, Challenges, & Problems
Naresh Kshetri, Mir Mehedi Rahman, Sayed Abu Sayeed, et al.
(2024) Vol. 5, pp. 523-528
Closed Access | Times Cited: 3

Phishing Attacks on Cryptocurrency Investors in the Arab States of the Gulf
Marzooq Hadi Marzooq Alyami, Reem Alhotaylah, Sawsan Alshehri, et al.
Journal of risk and financial management (2023) Vol. 16, Iss. 5, pp. 271-271
Open Access | Times Cited: 4

A deep learning approach for host-based cryptojacking malware detection
Olanrewaju Sanda, Michalis Pavlidis, Nikolaos Polatidis
Evolving Systems (2023) Vol. 15, Iss. 1, pp. 41-56
Closed Access | Times Cited: 4

An optimized neural network with AdaHessian for cryptojacking attack prediction for Securing Crypto Exchange Operations of MEC applications
Uma Rani, Sunil Kumar, Neeraj Dahiya, et al.
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 1

Malware and Windows APIs: A Dangerous Duo
Muhammad Taseer Suleman
International Journal for Electronic Crime Investigation (2024) Vol. 7, Iss. 4, pp. 33-50
Open Access | Times Cited: 1

The Pulse of Fileless Cryptojacking Attacks: Malicious PowerShell Scripts
Said Varlioglu, Nelly Elsayed, Eva Ruhsar Varlioglu, et al.
SoutheastCon (2024), pp. 571-580
Open Access | Times Cited: 1

Unified Multi-Layered Model To Secure Computing Environments Against Cryptomining Malware
Rohan Sharma, M. Swapna
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2023)
Closed Access | Times Cited: 3

Prevention of Cryptojacking Attacks in Business and FinTech Applications
Subhan Ullah, Tahir Ahmad, Rizwan Ahmad, et al.
Advances in information security, privacy, and ethics book series (2022), pp. 266-287
Closed Access | Times Cited: 4

Enhancing Cryptojacking Detection Through Hybrid Black Widow Optimization and Generative Adversarial Networks
Meenal R. Kale, Deepa Deepa, Anil Kumar N, et al.
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 3
Open Access

Experimental Design of Intranet Penetration for Anti Anti-Virus Traffic Characterization
Peifeng Xiong, Deqiang Yang, Bin Wen
(2024), pp. 5-10
Closed Access

Analysis of Malicious Files Gathering via Honeypot Trap System and Benchmark of Anti-Virus Software
Melike Başer, Ebu Yusuf Güven, Muhammed Ali Aydın
Research Square (Research Square) (2023)
Open Access | Times Cited: 1

Cryptojacking Malware Detection in Docker Images Using Supervised Machine Learning
Saide Manuel Saide, Ednilson Luis Alfredo Sarmento, Felermino D. M. A. Ali
International Conference on Intelligent and Innovative Computing Applications (2022) Vol. 2022, pp. 49-56
Open Access | Times Cited: 2

Crypto Mining Attacks on Cyber Security
İlker Kara, Emre Hasgul
Advances in finance, accounting, and economics book series (2022), pp. 94-107
Closed Access | Times Cited: 1

The Devil is in the Details: Unwrapping the Cryptojacking Malware Ecosystem on Android
Boladji Vinny Adjibi, Fatou Ndiaye Mbodji, Tegawendé F. Bissyandé, et al.
(2022), pp. 153-163
Open Access | Times Cited: 1

Page 1

Scroll to top