OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Fuzzy Hashing Aided Enhanced YARA Rules for Malware Triaging
Nitin Naik, Paul Jenkins, Nick Savage, et al.
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2020), pp. 1138-1145
Open Access | Times Cited: 14

Showing 14 citing articles:

FLSH: A Framework Leveraging Similarity Hashing for Android Malware and Variant Detection
Hassan Jalil Hadi, Aqsa Khalid, Faisal Bashir Hussain, et al.
IEEE Access (2025) Vol. 13, pp. 26142-26156
Open Access

YAMME: a YAra-byte-signatures Metamorphic Mutation Engine
Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 4530-4545
Open Access | Times Cited: 13

Improving Uncertainty in Chain of Custody for Image Forensics Investigation Applications
Hany M. Elgohary, Saad M. Darwish, Saleh Mesbah Elkaffas
IEEE Access (2022) Vol. 10, pp. 14669-14679
Open Access | Times Cited: 17

Fuzzy-import hashing: A static analysis technique for malware detection
Nitin Naik, Paul Jenkins, Nick Savage, et al.
Forensic Science International Digital Investigation (2021) Vol. 37, pp. 301139-301139
Open Access | Times Cited: 20

A Procedure for Tracing Chain of Custody in Digital Image Forensics: A Paradigm Based on Grey Hash and Blockchain
Mohamed Al Ali, Ahmed Adel Ismail, Hany M. Elgohary, et al.
Symmetry (2022) Vol. 14, Iss. 2, pp. 334-334
Open Access | Times Cited: 14

Embedded YARA rules: strengthening YARA rules utilising fuzzy hashing and fuzzy rules for malware analysis
Nitin Naik, Paul Jenkins, Nick Savage, et al.
Complex & Intelligent Systems (2020) Vol. 7, Iss. 2, pp. 687-702
Open Access | Times Cited: 23

Evaluating Automatically Generated YARA Rules and Enhancing Their Effectiveness
Nitin Naik, Paul Jenkins, Roger Cooke, et al.
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2020), pp. 1146-1153
Open Access | Times Cited: 20

A YARA-based approach for detecting cyber security attack types
Kübra Yıldırım, Mustafa Demir, Tuğçe Keleş, et al.
Firat University Journal of Experimental and Computational Engineering (2023) Vol. 2, Iss. 2, pp. 55-68
Open Access | Times Cited: 3

Innovating Threat Detection: Behavioral Rule Generators for Malware Families
Pavan R. Kashyap, Phaneesh R. Katti, Bhat P. Hrishikesh, et al.
Lecture notes in networks and systems (2024), pp. 335-348
Closed Access

Comparison of Genetic Operators for the Multiobjective Pickup and Delivery Problem
Connor Little, Salimur Choudhury, Ting Hu, et al.
Mathematics (2022) Vol. 10, Iss. 22, pp. 4308-4308
Open Access | Times Cited: 3

Cross-Temporal Detection of Novel Ransomware Campaigns: A Multi-Modal Alert Approach
Sathvik Murli, Dhruv Nandakumar, Prabhat Kushwaha, et al.
2016 International Conference on Computing, Networking and Communications (ICNC) (2024), pp. 423-429
Open Access

CAP - A Context-Aware Framework for Detection and Analysis of Packed Malware
Muhammad Nouman Ahmed, Zafar Iqbal, Hasan Mahmood, et al.
(2024), pp. 1-6
Closed Access

Implementation of Yara Rules in Android
Pragya Bharti, Shreya Saha Roy, A. Suresh
2022 International Conference on Computer Communication and Informatics (ICCCI) (2023)
Closed Access

Page 1

Scroll to top