
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Augmented YARA Rules Fused With Fuzzy Hashing in Ransomware Triaging
Nitin Naik, Paul Jenkins, Nick Savage, et al.
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2019), pp. 625-632
Open Access | Times Cited: 17
Nitin Naik, Paul Jenkins, Nick Savage, et al.
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2019), pp. 625-632
Open Access | Times Cited: 17
Showing 17 citing articles:
The Age of Ransomware: A Survey on the Evolution, Taxonomy, and Research Directions
Salwa Razaulla, Claude Fachkha, Christine Markarian, et al.
IEEE Access (2023) Vol. 11, pp. 40698-40723
Open Access | Times Cited: 52
Salwa Razaulla, Claude Fachkha, Christine Markarian, et al.
IEEE Access (2023) Vol. 11, pp. 40698-40723
Open Access | Times Cited: 52
YAMME: a YAra-byte-signatures Metamorphic Mutation Engine
Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 4530-4545
Open Access | Times Cited: 13
Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 4530-4545
Open Access | Times Cited: 13
Fuzzy-import hashing: A static analysis technique for malware detection
Nitin Naik, Paul Jenkins, Nick Savage, et al.
Forensic Science International Digital Investigation (2021) Vol. 37, pp. 301139-301139
Open Access | Times Cited: 20
Nitin Naik, Paul Jenkins, Nick Savage, et al.
Forensic Science International Digital Investigation (2021) Vol. 37, pp. 301139-301139
Open Access | Times Cited: 20
Embedded YARA rules: strengthening YARA rules utilising fuzzy hashing and fuzzy rules for malware analysis
Nitin Naik, Paul Jenkins, Nick Savage, et al.
Complex & Intelligent Systems (2020) Vol. 7, Iss. 2, pp. 687-702
Open Access | Times Cited: 23
Nitin Naik, Paul Jenkins, Nick Savage, et al.
Complex & Intelligent Systems (2020) Vol. 7, Iss. 2, pp. 687-702
Open Access | Times Cited: 23
Evaluating Automatically Generated YARA Rules and Enhancing Their Effectiveness
Nitin Naik, Paul Jenkins, Roger Cooke, et al.
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2020), pp. 1146-1153
Open Access | Times Cited: 20
Nitin Naik, Paul Jenkins, Roger Cooke, et al.
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2020), pp. 1146-1153
Open Access | Times Cited: 20
Fuzzy-Import Hashing: A Malware Analysis Approach
Nitin Naik, Paul Jenkins, Nick Savage, et al.
2022 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) (2020), pp. 1-8
Open Access | Times Cited: 16
Nitin Naik, Paul Jenkins, Nick Savage, et al.
2022 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) (2020), pp. 1-8
Open Access | Times Cited: 16
Understanding uses and misuses of similarity hashing functions for malware detection and family clustering in actual scenarios
Marcus Botacin, Vitor Hugo Galhardo Moia, FabrÃcio Ceschin, et al.
Forensic Science International Digital Investigation (2021) Vol. 38, pp. 301220-301220
Closed Access | Times Cited: 14
Marcus Botacin, Vitor Hugo Galhardo Moia, FabrÃcio Ceschin, et al.
Forensic Science International Digital Investigation (2021) Vol. 38, pp. 301220-301220
Closed Access | Times Cited: 14
Embedding Fuzzy Rules with YARA Rules for Performance Optimisation of Malware Analysis
Nitin Naik, Paul Jenkins, Nick Savage, et al.
2022 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) (2020), pp. 1-7
Open Access | Times Cited: 14
Nitin Naik, Paul Jenkins, Nick Savage, et al.
2022 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) (2020), pp. 1-7
Open Access | Times Cited: 14
Fuzzy Hashing Aided Enhanced YARA Rules for Malware Triaging
Nitin Naik, Paul Jenkins, Nick Savage, et al.
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2020), pp. 1138-1145
Open Access | Times Cited: 14
Nitin Naik, Paul Jenkins, Nick Savage, et al.
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2020), pp. 1138-1145
Open Access | Times Cited: 14
Signature-less ransomware detection and mitigation
Yash Shashikant Joshi, Harsh Mahajan, Sumedh Nitin Joshi, et al.
Journal of Computer Virology and Hacking Techniques (2021) Vol. 17, Iss. 4, pp. 299-306
Closed Access | Times Cited: 13
Yash Shashikant Joshi, Harsh Mahajan, Sumedh Nitin Joshi, et al.
Journal of Computer Virology and Hacking Techniques (2021) Vol. 17, Iss. 4, pp. 299-306
Closed Access | Times Cited: 13
Lockout-Tagout Ransomware: A Detection Method for Ransomware using Fuzzy Hashing and Clustering
Nitin Naik, Paul Jenkins, Jonathan Gillett, et al.
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2019), pp. 641-648
Open Access | Times Cited: 15
Nitin Naik, Paul Jenkins, Jonathan Gillett, et al.
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2019), pp. 641-648
Open Access | Times Cited: 15
Navigating the Landscape of Ransomware Detection Methods: A Review
Nikiema Benito, Ouedraogo Martial, Tamiano Banda, et al.
Lecture notes in networks and systems (2024), pp. 423-448
Closed Access
Nikiema Benito, Ouedraogo Martial, Tamiano Banda, et al.
Lecture notes in networks and systems (2024), pp. 423-448
Closed Access
Malware Detection on Local Network based on Honeypot and Yara
Nur Rohman Rosyid, Budi Bayu Murti, Brama Prayudha, et al.
SISTEMASI (2023) Vol. 12, Iss. 1, pp. 186-186
Open Access | Times Cited: 1
Nur Rohman Rosyid, Budi Bayu Murti, Brama Prayudha, et al.
SISTEMASI (2023) Vol. 12, Iss. 1, pp. 186-186
Open Access | Times Cited: 1
Fuzzy Bayesian Learning for Cyber Threat Hunting in Industrial Control Systems
Kassidy Marsh, Samira Eisaloo Gharghasheh
Springer eBooks (2021), pp. 117-130
Closed Access | Times Cited: 3
Kassidy Marsh, Samira Eisaloo Gharghasheh
Springer eBooks (2021), pp. 117-130
Closed Access | Times Cited: 3
Marcus Botacin, Francis B. Moreira, Philippe O. A. Navaux, et al.
ACM Transactions on Privacy and Security (2022) Vol. 25, Iss. 2, pp. 1-34
Closed Access | Times Cited: 2
About the Robustness and Looseness of Yara Rules
Gerardo Canfora, Mimmo Carapella, Andrea Del Vecchio, et al.
Lecture notes in computer science (2020), pp. 104-120
Open Access | Times Cited: 2
Gerardo Canfora, Mimmo Carapella, Andrea Del Vecchio, et al.
Lecture notes in computer science (2020), pp. 104-120
Open Access | Times Cited: 2
Implementation of Yara Rules in Android
Pragya Bharti, Shreya Saha Roy, A. Suresh
2022 International Conference on Computer Communication and Informatics (ICCCI) (2023)
Closed Access
Pragya Bharti, Shreya Saha Roy, A. Suresh
2022 International Conference on Computer Communication and Informatics (ICCCI) (2023)
Closed Access