OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Survey of Malware Analysis Using Community Detection Algorithms
Abdelouahab Amira, Abdelouahid Derhab, ElMouatez Billah Karbab, et al.
ACM Computing Surveys (2023) Vol. 56, Iss. 2, pp. 1-29
Closed Access | Times Cited: 11

Showing 11 citing articles:

Exploring the Landscape of IoT Ransomware Prediction Through Machine Learning Techniques: A Comprehensive Survey
Ines Gharbi, Mohamed Belaoued, Abdelouahid Derhab, et al.
SN Computer Science (2025) Vol. 6, Iss. 3
Closed Access

An Intelligent Technique for Android Malware Identification Using Fuzzy Rank-Based Fusion
Altyeb Taha, Ahmed Hamza Osman, Yakubu S. Baguda
Technologies (2025) Vol. 13, Iss. 2, pp. 45-45
Open Access

Community detection in multi-layer networks by regularized debiased spectral clustering
Huan Qing
Engineering Applications of Artificial Intelligence (2025) Vol. 152, pp. 110627-110627
Closed Access

Deep learning-powered malware detection in cyberspace: a contemporary review
Ananya Redhu, Prince Choudhary, Kathiravan Srinivasan, et al.
Frontiers in Physics (2024) Vol. 12
Open Access | Times Cited: 3

FCG-MFD: Benchmark function call graph-based dataset for malware family detection
Hassan Jalil Hadi, Yue Cao, S. Z. Li, et al.
Journal of Network and Computer Applications (2024) Vol. 233, pp. 104050-104050
Closed Access | Times Cited: 2

Efficient Deep Learning Method for Detection of Malware Attacks in Internet of Things Networks
Ikbel Haouas, Mouna Attia, Lazhar Hamel, et al.
Communications in computer and information science (2024), pp. 15-26
Closed Access | Times Cited: 1

Bulut Bilişim Mimarisi ve Güvenliği
Kemal Yigit, Faruk Ayata
Computer Science (2024)
Open Access

Enhancing Malware Detection by Integrating Machine Learning with Cuckoo Sandbox
Amaal F. Alshmarni, Mohammed Alliheedi
Journal of Information Security and Cybercrimes Research (2024) Vol. 7, Iss. 1, pp. 85-92
Open Access

Software Installation Threat Detection Based on Attention Mechanism and Improved Convolutional Neural Network in IOT Platform
Chongwei Liu, J. Pang
Engineering Research Express (2024) Vol. 6, Iss. 3, pp. 035210-035210
Closed Access

A Novel Dynamic Community Detection Model in Social Networks
Yingkui Wang, Dingbo Hou, Yuting Xia, et al.
(2023), pp. 1-7
Closed Access

Zero-Click Exploits and Malware: An In-Depth Analysis and Case Studies
Prabith GS, S Abhishek, T Anjali, et al.
(2023)
Closed Access

Page 1

Scroll to top