
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Evaluating Automatically Generated YARA Rules and Enhancing Their Effectiveness
Nitin Naik, Paul Jenkins, Roger Cooke, et al.
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2020), pp. 1146-1153
Open Access | Times Cited: 20
Nitin Naik, Paul Jenkins, Roger Cooke, et al.
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2020), pp. 1146-1153
Open Access | Times Cited: 20
Showing 20 citing articles:
The current state and future of mobile security in the light of the recent mobile security threat reports
Ahmet Cevahir Çınar, Turkan Beyza Kara
Multimedia Tools and Applications (2023) Vol. 82, Iss. 13, pp. 20269-20281
Open Access | Times Cited: 28
Ahmet Cevahir Çınar, Turkan Beyza Kara
Multimedia Tools and Applications (2023) Vol. 82, Iss. 13, pp. 20269-20281
Open Access | Times Cited: 28
YAMME: a YAra-byte-signatures Metamorphic Mutation Engine
Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 4530-4545
Open Access | Times Cited: 13
Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 4530-4545
Open Access | Times Cited: 13
Fuzzy-import hashing: A static analysis technique for malware detection
Nitin Naik, Paul Jenkins, Nick Savage, et al.
Forensic Science International Digital Investigation (2021) Vol. 37, pp. 301139-301139
Open Access | Times Cited: 20
Nitin Naik, Paul Jenkins, Nick Savage, et al.
Forensic Science International Digital Investigation (2021) Vol. 37, pp. 301139-301139
Open Access | Times Cited: 20
Embedded YARA rules: strengthening YARA rules utilising fuzzy hashing and fuzzy rules for malware analysis
Nitin Naik, Paul Jenkins, Nick Savage, et al.
Complex & Intelligent Systems (2020) Vol. 7, Iss. 2, pp. 687-702
Open Access | Times Cited: 23
Nitin Naik, Paul Jenkins, Nick Savage, et al.
Complex & Intelligent Systems (2020) Vol. 7, Iss. 2, pp. 687-702
Open Access | Times Cited: 23
Pattern Matching in YARA: Improved Aho-Corasick Algorithm
Dominika Regéciová, Dušan Kolář, Marek Milkovic
IEEE Access (2021) Vol. 9, pp. 62857-62866
Open Access | Times Cited: 16
Dominika Regéciová, Dušan Kolář, Marek Milkovic
IEEE Access (2021) Vol. 9, pp. 62857-62866
Open Access | Times Cited: 16
Fuzzy Hashing Aided Enhanced YARA Rules for Malware Triaging
Nitin Naik, Paul Jenkins, Nick Savage, et al.
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2020), pp. 1138-1145
Open Access | Times Cited: 14
Nitin Naik, Paul Jenkins, Nick Savage, et al.
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2020), pp. 1138-1145
Open Access | Times Cited: 14
Malware Detection Using Automated Generation of Yara Rules on Dynamic Features
Si Qin, Hui Xu, Ying Tong, et al.
Lecture notes in computer science (2022), pp. 315-330
Closed Access | Times Cited: 8
Si Qin, Hui Xu, Ying Tong, et al.
Lecture notes in computer science (2022), pp. 315-330
Closed Access | Times Cited: 8
A YARA-based approach for detecting cyber security attack types
Kübra Yıldırım, Mustafa Demir, Tuğçe Keleş, et al.
Firat University Journal of Experimental and Computational Engineering (2023) Vol. 2, Iss. 2, pp. 55-68
Open Access | Times Cited: 3
Kübra Yıldırım, Mustafa Demir, Tuğçe Keleş, et al.
Firat University Journal of Experimental and Computational Engineering (2023) Vol. 2, Iss. 2, pp. 55-68
Open Access | Times Cited: 3
A Comparative Study of Log4Shell Test Tools
Douglas Everson, Ashish Bastola, Rajat Mittal, et al.
(2022), pp. 16-22
Closed Access | Times Cited: 3
Douglas Everson, Ashish Bastola, Rajat Mittal, et al.
(2022), pp. 16-22
Closed Access | Times Cited: 3
YARWEB: WEB-BASED GENERIC YARA RULE GENERATOR
Mr. Shreyas Biju Nair, Mr. Laalas Tadavarthy, Mr. Kailas M K, et al.
EPRA International Journal of Research & Development (IJRD) (2024), pp. 295-302
Open Access
Mr. Shreyas Biju Nair, Mr. Laalas Tadavarthy, Mr. Kailas M K, et al.
EPRA International Journal of Research & Development (IJRD) (2024), pp. 295-302
Open Access
Obfuscated Malware Classification Using Hierarchy-Based Pipeline
Ivan Mršulja, Јелена Сливка, Goran Sladić
Lecture notes in networks and systems (2024), pp. 401-409
Closed Access
Ivan Mršulja, Јелена Сливка, Goran Sladić
Lecture notes in networks and systems (2024), pp. 401-409
Closed Access
Modeling and Analysis of Advanced Intrusion Prevention System Using Distributed Host Datasets for Anomaly Detection
Shashank Sharma, Shaligram Prajapat, Nitin Naik
Lecture notes in networks and systems (2024), pp. 625-634
Closed Access
Shashank Sharma, Shaligram Prajapat, Nitin Naik
Lecture notes in networks and systems (2024), pp. 625-634
Closed Access
CAP - A Context-Aware Framework for Detection and Analysis of Packed Malware
Muhammad Nouman Ahmed, Zafar Iqbal, Hasan Mahmood, et al.
(2024), pp. 1-6
Closed Access
Muhammad Nouman Ahmed, Zafar Iqbal, Hasan Mahmood, et al.
(2024), pp. 1-6
Closed Access
Malware Detection on Local Network based on Honeypot and Yara
Nur Rohman Rosyid, Budi Bayu Murti, Brama Prayudha, et al.
SISTEMASI (2023) Vol. 12, Iss. 1, pp. 186-186
Open Access | Times Cited: 1
Nur Rohman Rosyid, Budi Bayu Murti, Brama Prayudha, et al.
SISTEMASI (2023) Vol. 12, Iss. 1, pp. 186-186
Open Access | Times Cited: 1
Implementation of Yara Rules in Android
Pragya Bharti, Shreya Saha Roy, A. Suresh
2022 International Conference on Computer Communication and Informatics (ICCCI) (2023)
Closed Access
Pragya Bharti, Shreya Saha Roy, A. Suresh
2022 International Conference on Computer Communication and Informatics (ICCCI) (2023)
Closed Access
Malware Detection and Classification Based on Graph Convolutional Networks and Function Call Graphs
Hsiang‐Yu Chuang, Jiann-Liang Chen, Yi‐Wei Ma
IT Professional (2023) Vol. 25, Iss. 3, pp. 43-53
Closed Access
Hsiang‐Yu Chuang, Jiann-Liang Chen, Yi‐Wei Ma
IT Professional (2023) Vol. 25, Iss. 3, pp. 43-53
Closed Access
Detection and Prevention of Malware and Ransomware Threats Using Malicious String Analysis
Md Nahidul Alam, Abishek Singh, Mayuri Kumari, et al.
(2023), pp. 93-98
Closed Access
Md Nahidul Alam, Abishek Singh, Mayuri Kumari, et al.
(2023), pp. 93-98
Closed Access
GenRex: Leveraging Regular Expressions for Dynamic Malware Detection
Dominika Regéciová, Dušan Kolář
(2023), pp. 857-864
Closed Access
Dominika Regéciová, Dušan Kolář
(2023), pp. 857-864
Closed Access
Survivability Using Artificial Intelligence Assisted Cyber Risk Warning
Nikolaos Doukas, Peter Stavroulakis, Vyacheslav Kharchenko, et al.
Advances in information security (2022), pp. 285-308
Closed Access
Nikolaos Doukas, Peter Stavroulakis, Vyacheslav Kharchenko, et al.
Advances in information security (2022), pp. 285-308
Closed Access
Role of YARA Tool in Intrusion Detection Systems (IDS): Review
Reyadh Hazim Mahdi, Hafedh Trabelsi
(2022), pp. 185-190
Closed Access
Reyadh Hazim Mahdi, Hafedh Trabelsi
(2022), pp. 185-190
Closed Access