OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Use of Data Visualisation for Zero-Day Malware Detection
Sitalakshmi Venkatraman, Mamoun Alazab
Security and Communication Networks (2018) Vol. 2018, pp. 1-13
Open Access | Times Cited: 125

Showing 1-25 of 125 citing articles:

Deep Learning Approach for Intelligent Intrusion Detection System
R. Vinayakumar, Mamoun Alazab, K. P. Soman, et al.
IEEE Access (2019) Vol. 7, pp. 41525-41550
Open Access | Times Cited: 1359

IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture
Danish Vasan, Mamoun Alazab, Sobia Wassan, et al.
Computer Networks (2020) Vol. 171, pp. 107138-107138
Closed Access | Times Cited: 381

Early Detection of Diabetic Retinopathy Using PCA-Firefly Based Deep Learning Model
Thippa Reddy Gadekallu, Neelu Khare, Sweta Bhattacharya, et al.
Electronics (2020) Vol. 9, Iss. 2, pp. 274-274
Open Access | Times Cited: 294

CANintelliIDS: Detecting In-Vehicle Intrusion Attacks on a Controller Area Network Using CNN and Attention-Based GRU
Abdul Rehman Javed, Saif Ur Rehman, Mohib Ullah Khan, et al.
IEEE Transactions on Network Science and Engineering (2021) Vol. 8, Iss. 2, pp. 1456-1466
Closed Access | Times Cited: 245

Intelligent mobile malware detection using permission requests and API calls
Moutaz Alazab, Mamoun Alazab, Andrii Shalaginov, et al.
Future Generation Computer Systems (2020) Vol. 107, pp. 509-521
Open Access | Times Cited: 214

A hybrid deep learning image-based analysis for effective malware detection
Sitalakshmi Venkatraman, Mamoun Alazab, R. Vinayakumar
Journal of Information Security and Applications (2019) Vol. 47, pp. 377-389
Closed Access | Times Cited: 209

A Review of Machine Learning Algorithms for Cloud Computing Security
Umer Ahmed Butt, Muhammad Mehmood, Syed Bilal Hussain Shah, et al.
Electronics (2020) Vol. 9, Iss. 9, pp. 1379-1379
Open Access | Times Cited: 152

Explainable Artificial Intelligence in CyberSecurity: A Survey
Nicola Capuano, Giuseppe Fenza, Vincenzo Loia, et al.
IEEE Access (2022) Vol. 10, pp. 93575-93600
Open Access | Times Cited: 139

Malware Detection Issues, Challenges, and Future Directions: A Survey
Faitouri A. Aboaoja, Anazida Zainal, Fuad A. Ghaleb, et al.
Applied Sciences (2022) Vol. 12, Iss. 17, pp. 8482-8482
Open Access | Times Cited: 102

Diabetic retinopathy detection using principal component analysis multi-label feature extraction and classification
Tiwalade Modupe Usman, Yakub Kayode Saheed, Ignace Djitog, et al.
International Journal of Cognitive Computing in Engineering (2023) Vol. 4, pp. 78-88
Open Access | Times Cited: 69

Intrusion Detection System to Advance Internet of Things Infrastructure‐Based Deep Learning Algorithms
Hasan Alkahtani, Theyazn H. H. Aldhyani
Complexity (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 91

Performance Comparison of Deep CNN Models for Detecting Driver’s Distraction
Kathiravan Srinivasan, Lalit Garg, Debajit Datta, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2021) Vol. 68, Iss. 3, pp. 4109-4124
Open Access | Times Cited: 84

MTHAEL: Cross-Architecture IoT Malware Detection Based on Neural Network Advanced Ensemble Learning
Danish Vasan, Mamoun Alazab, Sitalakshmi Venkatraman, et al.
IEEE Transactions on Computers (2020) Vol. 69, Iss. 11, pp. 1654-1667
Closed Access | Times Cited: 83

Authenticated Key Agreement Scheme With User Anonymity and Untraceability for 5G-Enabled Softwarized Industrial Cyber-Physical Systems
Anil Kumar Sutrala, Mohammad S. Obaidat, Sourav Saha, et al.
IEEE Transactions on Intelligent Transportation Systems (2021) Vol. 23, Iss. 3, pp. 2316-2330
Closed Access | Times Cited: 79

Multi-view deep learning for zero-day Android malware detection
Stuart Millar, Niall McLaughlin, Jesús Martínez del Rincón, et al.
Journal of Information Security and Applications (2021) Vol. 58, pp. 102718-102718
Open Access | Times Cited: 78

Identification of malnutrition and prediction of BMI from facial images using real‐time image processing and machine learning
C. Dhanamjayulu, U N Nizhal, Praveen Kumar Reddy Maddikunta, et al.
IET Image Processing (2021) Vol. 16, Iss. 3, pp. 647-658
Open Access | Times Cited: 70

TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network
Mohammad Sirajuddin, Ch. Rupa, Celestine Iwendi, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-9
Open Access | Times Cited: 66

Distance education tool selection using novel spherical fuzzy AHP EDAS
Akın Menekşe, Hatice Camgöz Akdağ
Soft Computing (2022) Vol. 26, Iss. 4, pp. 1617-1635
Open Access | Times Cited: 50

Lane detection in intelligent vehicle system using optimal 2- tier deep convolutional neural network
Deepak Kumar Dewangan, Satya Prakash Sahu
Multimedia Tools and Applications (2022) Vol. 82, Iss. 5, pp. 7293-7317
Closed Access | Times Cited: 38

An Ensemble Approach Based on Fuzzy Logic Using Machine Learning Classifiers for Android Malware Detection
İsmail Atacak
Applied Sciences (2023) Vol. 13, Iss. 3, pp. 1484-1484
Open Access | Times Cited: 24

Intrusion detection techniques in network environment: a systematic review
Maruthi Rohit Ayyagari, Nishtha Kesswani, Munish Kumar, et al.
Wireless Networks (2021) Vol. 27, Iss. 2, pp. 1269-1285
Closed Access | Times Cited: 48

BCFL logging: An approach to acquire and preserve admissible digital forensics evidence in cloud ecosystem
Kenny Awuson-David, Tawfik Al-Hadhrami, Mamoun Alazab, et al.
Future Generation Computer Systems (2021) Vol. 122, pp. 1-13
Open Access | Times Cited: 45

Secure crowd-sensing protocol for fog-based vehicular cloud
Lewis Nkenyereye, S. M. Riazul Islam, Muhammad Bilal, et al.
Future Generation Computer Systems (2021) Vol. 120, pp. 61-75
Closed Access | Times Cited: 41

TEA-EKHO-IDS: An intrusion detection system for industrial CPS with trustworthy explainable AI and enhanced krill herd optimization
S. Krishnaveni, S. Sridhar, S. Krishnaveni
Peer-to-Peer Networking and Applications (2023) Vol. 16, Iss. 4, pp. 1993-2021
Closed Access | Times Cited: 19

Page 1 - Next Page

Scroll to top