
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Software Vulnerability Analysis and Discovery Using Machine-Learning and Data-Mining Techniques
Seyed Mohammad Ghaffarian, Hamid Reza Shahriari
ACM Computing Surveys (2017) Vol. 50, Iss. 4, pp. 1-36
Closed Access | Times Cited: 298
Seyed Mohammad Ghaffarian, Hamid Reza Shahriari
ACM Computing Surveys (2017) Vol. 50, Iss. 4, pp. 1-36
Closed Access | Times Cited: 298
Showing 1-25 of 298 citing articles:
Software Vulnerability Detection Using Deep Neural Networks: A Survey
Guanjun Lin, Sheng Wen, Qing‐Long Han, et al.
Proceedings of the IEEE (2020) Vol. 108, Iss. 10, pp. 1825-1848
Closed Access | Times Cited: 342
Guanjun Lin, Sheng Wen, Qing‐Long Han, et al.
Proceedings of the IEEE (2020) Vol. 108, Iss. 10, pp. 1825-1848
Closed Access | Times Cited: 342
A Survey of Android Malware Detection with Deep Neural Models
Junyang Qiu, Jun Zhang, Wei Luo, et al.
ACM Computing Surveys (2020) Vol. 53, Iss. 6, pp. 1-36
Closed Access | Times Cited: 242
Junyang Qiu, Jun Zhang, Wei Luo, et al.
ACM Computing Surveys (2020) Vol. 53, Iss. 6, pp. 1-36
Closed Access | Times Cited: 242
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities
Zhen Li, Deqing Zou, Shouhuai Xu, et al.
IEEE Transactions on Dependable and Secure Computing (2021) Vol. 19, Iss. 4, pp. 2244-2258
Open Access | Times Cited: 201
Zhen Li, Deqing Zou, Shouhuai Xu, et al.
IEEE Transactions on Dependable and Secure Computing (2021) Vol. 19, Iss. 4, pp. 2244-2258
Open Access | Times Cited: 201
Survey on software defect prediction techniques
Mahesh Kumar Thota, Francis H. Shajin, P. Rajesh
International Journal of Applied Science and Engineering (2020) Vol. 17, Iss. 4, pp. 331-344
Closed Access | Times Cited: 194
Mahesh Kumar Thota, Francis H. Shajin, P. Rajesh
International Journal of Applied Science and Engineering (2020) Vol. 17, Iss. 4, pp. 331-344
Closed Access | Times Cited: 194
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain
Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, et al.
ACM Computing Surveys (2021) Vol. 54, Iss. 5, pp. 1-36
Open Access | Times Cited: 176
Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, et al.
ACM Computing Surveys (2021) Vol. 54, Iss. 5, pp. 1-36
Open Access | Times Cited: 176
A Taxonomy of Network Threats and the Effect of Current Datasets on Intrusion Detection Systems
Hanan Hindy, David Brosset, Ethan Bayne, et al.
IEEE Access (2020) Vol. 8, pp. 104650-104675
Open Access | Times Cited: 174
Hanan Hindy, David Brosset, Ethan Bayne, et al.
IEEE Access (2020) Vol. 8, pp. 104650-104675
Open Access | Times Cited: 174
Attacks and defences on intelligent connected vehicles: a survey
Mahdi Dibaei, Xi Zheng, Kun Jiang, et al.
Digital Communications and Networks (2020) Vol. 6, Iss. 4, pp. 399-421
Open Access | Times Cited: 158
Mahdi Dibaei, Xi Zheng, Kun Jiang, et al.
Digital Communications and Networks (2020) Vol. 6, Iss. 4, pp. 399-421
Open Access | Times Cited: 158
Data Quality for Software Vulnerability Datasets
Roland Croft, M. Ali Babar, M. Mehdi Kholoosi
(2023), pp. 121-133
Open Access | Times Cited: 57
Roland Croft, M. Ali Babar, M. Mehdi Kholoosi
(2023), pp. 121-133
Open Access | Times Cited: 57
Detection of cross-site scripting (XSS) attacks using machine learning techniques: a review
Jasleen Kaur, Urvashi Garg, Gourav Bathla
Artificial Intelligence Review (2023) Vol. 56, Iss. 11, pp. 12725-12769
Closed Access | Times Cited: 42
Jasleen Kaur, Urvashi Garg, Gourav Bathla
Artificial Intelligence Review (2023) Vol. 56, Iss. 11, pp. 12725-12769
Closed Access | Times Cited: 42
Deep Learning for Source Code Modeling and Generation
Triet Huynh Minh Le, Hao Chen, Muhammad Ali Babar
ACM Computing Surveys (2020) Vol. 53, Iss. 3, pp. 1-38
Open Access | Times Cited: 103
Triet Huynh Minh Le, Hao Chen, Muhammad Ali Babar
ACM Computing Surveys (2020) Vol. 53, Iss. 3, pp. 1-38
Open Access | Times Cited: 103
DeepBalance: Deep-Learning and Fuzzy Oversampling for Vulnerability Detection
Shigang Liu, Guanjun Lin, Qing‐Long Han, et al.
IEEE Transactions on Fuzzy Systems (2019), pp. 1-1
Closed Access | Times Cited: 100
Shigang Liu, Guanjun Lin, Qing‐Long Han, et al.
IEEE Transactions on Fuzzy Systems (2019), pp. 1-1
Closed Access | Times Cited: 100
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches
Hazim Hanif, Mohd Hairul Nizam Md Nasir, Mohd Faizal Ab Razak, et al.
Journal of Network and Computer Applications (2021) Vol. 179, pp. 103009-103009
Closed Access | Times Cited: 97
Hazim Hanif, Mohd Hairul Nizam Md Nasir, Mohd Faizal Ab Razak, et al.
Journal of Network and Computer Applications (2021) Vol. 179, pp. 103009-103009
Closed Access | Times Cited: 97
A taxonomy and survey of intrusion detection system design techniques, network threats and datasets
Hanan Hindy, David Brosset, Ethan Bayne, et al.
arXiv (Cornell University) (2018)
Closed Access | Times Cited: 86
Hanan Hindy, David Brosset, Ethan Bayne, et al.
arXiv (Cornell University) (2018)
Closed Access | Times Cited: 86
A Comparative Study of Deep Learning-Based Vulnerability Detection System
Zhen Li, Deqing Zou, Jing Tang, et al.
IEEE Access (2019) Vol. 7, pp. 103184-103197
Open Access | Times Cited: 84
Zhen Li, Deqing Zou, Jing Tang, et al.
IEEE Access (2019) Vol. 7, pp. 103184-103197
Open Access | Times Cited: 84
Android Mobile Malware Detection Using Machine Learning: A Systematic Review
Janaka Senanayake, Harsha Kalutarage, M. Omar Al-Kadri
Electronics (2021) Vol. 10, Iss. 13, pp. 1606-1606
Open Access | Times Cited: 76
Janaka Senanayake, Harsha Kalutarage, M. Omar Al-Kadri
Electronics (2021) Vol. 10, Iss. 13, pp. 1606-1606
Open Access | Times Cited: 76
Automated Vulnerability Detection in Source Code Using Minimum Intermediate Representation Learning
Xin Li, Lu Wang, Yang Xin, et al.
Applied Sciences (2020) Vol. 10, Iss. 5, pp. 1692-1692
Open Access | Times Cited: 72
Xin Li, Lu Wang, Yang Xin, et al.
Applied Sciences (2020) Vol. 10, Iss. 5, pp. 1692-1692
Open Access | Times Cited: 72
A Survey on Data-driven Software Vulnerability Assessment and Prioritization
Triet Huynh Minh Le, Huaming Chen, Muhammad Ali Babar
ACM Computing Surveys (2022) Vol. 55, Iss. 5, pp. 1-39
Open Access | Times Cited: 56
Triet Huynh Minh Le, Huaming Chen, Muhammad Ali Babar
ACM Computing Surveys (2022) Vol. 55, Iss. 5, pp. 1-39
Open Access | Times Cited: 56
Android Source Code Vulnerability Detection: A Systematic Literature Review
Janaka Senanayake, Harsha Kalutarage, M. Omar Al-Kadri, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 9, pp. 1-37
Open Access | Times Cited: 42
Janaka Senanayake, Harsha Kalutarage, M. Omar Al-Kadri, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 9, pp. 1-37
Open Access | Times Cited: 42
Software defects prediction by metaheuristics tuned extreme gradient boosting and analysis based on Shapley Additive Explanations
Tamara Živković, Boško Nikolić, Vladimir Šimić, et al.
Applied Soft Computing (2023) Vol. 146, pp. 110659-110659
Closed Access | Times Cited: 40
Tamara Živković, Boško Nikolić, Vladimir Šimić, et al.
Applied Soft Computing (2023) Vol. 146, pp. 110659-110659
Closed Access | Times Cited: 40
Static Analysis of Information Systems for IoT Cyber Security: A Survey of Machine Learning Approaches
Igor Kotenko, Konstantin Izrailov, Mikhail Buinevich
Sensors (2022) Vol. 22, Iss. 4, pp. 1335-1335
Open Access | Times Cited: 39
Igor Kotenko, Konstantin Izrailov, Mikhail Buinevich
Sensors (2022) Vol. 22, Iss. 4, pp. 1335-1335
Open Access | Times Cited: 39
Just-in-time software vulnerability detection: Are we there yet?
Francesco Lomio, Emanuele Iannone, Andrea De Lucia, et al.
Journal of Systems and Software (2022) Vol. 188, pp. 111283-111283
Open Access | Times Cited: 39
Francesco Lomio, Emanuele Iannone, Andrea De Lucia, et al.
Journal of Systems and Software (2022) Vol. 188, pp. 111283-111283
Open Access | Times Cited: 39
An empirical assessment of ensemble methods and traditional machine learning techniques for web-based attack detection in industry 5.0
Oumaima Chakir, Abdeslam Rehaimi, Yassine Sadqi, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 3, pp. 103-119
Open Access | Times Cited: 30
Oumaima Chakir, Abdeslam Rehaimi, Yassine Sadqi, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 3, pp. 103-119
Open Access | Times Cited: 30
Manipulating Recommender Systems: A Survey of Poisoning Attacks and Countermeasures
Thanh Toan Nguyen, Quoc Viet Hung Nguyen, Thành Tâm Nguyên, et al.
ACM Computing Surveys (2024) Vol. 57, Iss. 1, pp. 1-39
Open Access | Times Cited: 8
Thanh Toan Nguyen, Quoc Viet Hung Nguyen, Thành Tâm Nguyên, et al.
ACM Computing Surveys (2024) Vol. 57, Iss. 1, pp. 1-39
Open Access | Times Cited: 8
The empirical analysis of multi-objective hyperparameter optimization in software vulnerability prediction
Deepali Bassi, Hardeep Singh
International Journal of Computers and Applications (2025), pp. 1-19
Closed Access | Times Cited: 1
Deepali Bassi, Hardeep Singh
International Journal of Computers and Applications (2025), pp. 1-19
Closed Access | Times Cited: 1