
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Malware Detection Scheme via Smart Memory Forensics for Windows Devices
Muhammad Rashid Naeem, Mansoor Khan, Ako Muhammad Abdullah, et al.
Mobile Information Systems (2022) Vol. 2022, pp. 1-16
Open Access | Times Cited: 8
Muhammad Rashid Naeem, Mansoor Khan, Ako Muhammad Abdullah, et al.
Mobile Information Systems (2022) Vol. 2022, pp. 1-16
Open Access | Times Cited: 8
Showing 8 citing articles:
MeMalDet: A memory analysis-based malware detection framework using deep autoencoders and stacked ensemble under temporal evaluations
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
Computers & Security (2024) Vol. 142, pp. 103864-103864
Open Access | Times Cited: 9
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
Computers & Security (2024) Vol. 142, pp. 103864-103864
Open Access | Times Cited: 9
Enhanced detection of obfuscated malware in memory dumps: a machine learning approach for advanced cybersecurity
Md. Alamgir Hossain, Md. Saiful Islam
Cybersecurity (2024) Vol. 7, Iss. 1
Open Access | Times Cited: 8
Md. Alamgir Hossain, Md. Saiful Islam
Cybersecurity (2024) Vol. 7, Iss. 1
Open Access | Times Cited: 8
Ransomware detection based on machine learning using memory features
Malak Aljabri, Fahd Alhaidari, Aminah Albuainain, et al.
Egyptian Informatics Journal (2024) Vol. 25, pp. 100445-100445
Open Access | Times Cited: 7
Malak Aljabri, Fahd Alhaidari, Aminah Albuainain, et al.
Egyptian Informatics Journal (2024) Vol. 25, pp. 100445-100445
Open Access | Times Cited: 7
Transformer-based malware detection using process resource utilization metrics
Dimosthenis Natsos, Andreas L. Symeonidis
Results in Engineering (2025) Vol. 25, pp. 104250-104250
Open Access
Dimosthenis Natsos, Andreas L. Symeonidis
Results in Engineering (2025) Vol. 25, pp. 104250-104250
Open Access
A Survey on ML Techniques for Multi-Platform Malware Detection: Securing PC, Mobile Devices, IoT, and Cloud Environments
Jannatul Ferdous, Rafiqul Islam, Arash Mahboubi, et al.
Sensors (2025) Vol. 25, Iss. 4, pp. 1153-1153
Open Access
Jannatul Ferdous, Rafiqul Islam, Arash Mahboubi, et al.
Sensors (2025) Vol. 25, Iss. 4, pp. 1153-1153
Open Access
A Survey of Recent Advances in Deep Learning Models for Detecting Malware in Desktop and Mobile Platforms
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
ACM Computing Surveys (2023) Vol. 56, Iss. 6, pp. 1-41
Closed Access | Times Cited: 12
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
ACM Computing Surveys (2023) Vol. 56, Iss. 6, pp. 1-41
Closed Access | Times Cited: 12
Insights into Cybercrime Detection and Response: A Review of Time Factor
Hamed Taherdoost
Information (2024) Vol. 15, Iss. 5, pp. 273-273
Open Access | Times Cited: 3
Hamed Taherdoost
Information (2024) Vol. 15, Iss. 5, pp. 273-273
Open Access | Times Cited: 3
A Systematic Literature Review of Ransomware Detection Methods and Tools for Mitigating Potential Attacks
Mujeeb ur Rehman, Rehan Akbar, Mazni Omar, et al.
Communications in computer and information science (2024), pp. 80-95
Closed Access | Times Cited: 1
Mujeeb ur Rehman, Rehan Akbar, Mazni Omar, et al.
Communications in computer and information science (2024), pp. 80-95
Closed Access | Times Cited: 1