OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Malware Detection Using Memory Analysis Data in Big Data Environment
Murat Dener, Gökçe Ok, Abdullah Orman
Applied Sciences (2022) Vol. 12, Iss. 17, pp. 8604-8604
Open Access | Times Cited: 47

Showing 1-25 of 47 citing articles:

A dependable hybrid machine learning model for network intrusion detection
Md. Alamin Talukder, Khondokar Fida Hasan, Md. Manowarul Islam, et al.
Journal of Information Security and Applications (2022) Vol. 72, pp. 103405-103405
Open Access | Times Cited: 95

AI-enabled approach for enhancing obfuscated malware detection: a hybrid ensemble learning with combined feature selection techniques
Md. Alamgir Hossain, Md. Alimul Haque, Sultan Ahmad, et al.
International Journal of Systems Assurance Engineering and Management (2024)
Closed Access | Times Cited: 16

Obfuscated Memory Malware Detection in Resource-Constrained IoT Devices for Smart City Applications
Sakib Shahriar Shafin, Gour Karmakar, Iven Mareels
Sensors (2023) Vol. 23, Iss. 11, pp. 5348-5348
Open Access | Times Cited: 32

Dynamic Malware Classification and API Categorisation of Windows Portable Executable Files Using Machine Learning
Durre Zehra Syeda, Mamoona Naveed Asghar
Applied Sciences (2024) Vol. 14, Iss. 3, pp. 1015-1015
Open Access | Times Cited: 12

MeMalDet: A memory analysis-based malware detection framework using deep autoencoders and stacked ensemble under temporal evaluations
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
Computers & Security (2024) Vol. 142, pp. 103864-103864
Open Access | Times Cited: 9

MalHyStack: A hybrid stacked ensemble learning framework with feature engineering schemes for obfuscated malware analysis
Kowshik Sankar Roy, Tanim Ahmed, Pritom Biswas Udas, et al.
Intelligent Systems with Applications (2023) Vol. 20, pp. 200283-200283
Open Access | Times Cited: 20

Obfuscated Privacy Malware Classifiers Based on Memory Dumping Analysis
David Fabián Cevallos Salas, Felipe Grijalva, José Antonio Estrada, et al.
IEEE Access (2024) Vol. 12, pp. 17481-17498
Open Access | Times Cited: 6

Ransomware detection based on machine learning using memory features
Malak Aljabri, Fahd Alhaidari, Aminah Albuainain, et al.
Egyptian Informatics Journal (2024) Vol. 25, pp. 100445-100445
Open Access | Times Cited: 6

Detecting Malicious .NET Executables Using Extracted Methods Names
Hamdan Thabit, Rami Ahmad, Ahmad Fadzil Abdullah, et al.
AI (2025) Vol. 6, Iss. 2, pp. 20-20
Open Access

Leveraging Memory Forensic Features for Explainable Obfuscated Malware Detection with Isolated Family Distinction Paradigm
S. Sharmila, Shubham Gupta, Aruna Tiwari, et al.
Computers & Electrical Engineering (2025) Vol. 123, pp. 110107-110107
Closed Access

Comparing Ensemble Learning and Deep Neural Networks for Malware Detection
Hajar Ouazza, Fadoua Khennou, Abderrahim Abdellaoui
Communications in computer and information science (2025), pp. 105-119
Closed Access

FEDetect: A Federated Learning-Based Malware Detection and Classification Using Deep Neural Network Algorithms
Zeki Çıplak, Kazım Yıldız, Şahsene Altınkaya
Arabian Journal for Science and Engineering (2025)
Open Access

Tree-Based Classifier Ensembles for PE Malware Analysis: A Performance Revisit
Maya Hilda Lestari Louk, Bayu Adhi Tama
Algorithms (2022) Vol. 15, Iss. 9, pp. 332-332
Open Access | Times Cited: 26

An Enhanced Model of Whale Optimization Algorithm and K-nearest Neighbors for Malware Detection
Rami Sihwail, Mariam Al Ghamri, Dyala R. Ibrahim
International journal of intelligent engineering and systems (2024) Vol. 17, Iss. 3, pp. 606-621
Open Access | Times Cited: 3

A Hybrid Optimization Model for Efficient Detection and Classification of Malware in the Internet of Things
Ijaz Ahmad, Zhong Wan, Ashfaq Ahmad, et al.
Mathematics (2024) Vol. 12, Iss. 10, pp. 1437-1437
Open Access | Times Cited: 3

Using decision tree classifier to detect Trojan Horse based on memory data
Mosleh M. Abualhaj, Sumaya N. Al-Khatib
TELKOMNIKA (Telecommunication Computing Electronics and Control) (2024) Vol. 22, Iss. 2, pp. 393-393
Open Access | Times Cited: 2

volGPT: Evaluation on triaging ransomware process in memory forensics with Large Language Model
Dong Bin Oh, Donghyun Kim, Donghyun Kim, et al.
Forensic Science International Digital Investigation (2024) Vol. 49, pp. 301756-301756
Open Access | Times Cited: 2

SecuSCADA: Building Secure SCADA Network with Obfuscated Malware Detection Technique
Atul Kumar, Ishu Sharma
(2023), pp. 1-6
Closed Access | Times Cited: 4

Deep Neural Network Binary Classification for Malware Detection: A Parametric Study
Mahmoud Fahsi, Nadir Mahammed, Mohamed Benhammouda, et al.
Lecture notes in networks and systems (2024), pp. 20-25
Closed Access | Times Cited: 1

Immune-Based System to Enhance Malware Detection
Manel Jerbi, Zaineb Chelly Dagdia, Slim Bechikh, et al.
2022 IEEE Congress on Evolutionary Computation (CEC) (2023), pp. 1-8
Open Access | Times Cited: 3

An optimized Bi-LSTM with random synthetic over-sampling strategy for network intrusion detection
B. Padmavathi, A. Bhagyalakshmi, D. Kavitha, et al.
Soft Computing (2023) Vol. 28, Iss. 1, pp. 777-790
Closed Access | Times Cited: 3

ECMT Framework for Internet of Things: An Integrative Approach Employing In-Memory Attribute Examination and Sophisticated Neural Network Architectures in Conjunction With Hybridized Machine Learning Methodologies
Yawar Abbas Abid, Jinsong Wu, Muhammad Farhan, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 4, pp. 5867-5886
Closed Access | Times Cited: 2

Detecting new obfuscated malware variants: A lightweight and interpretable machine learning approach
Oladipo A. Madamidola, Felix Ngobigha, Adnane Ez‐zizi
Intelligent Systems with Applications (2024), pp. 200472-200472
Open Access

Malware Detection Model-based on Natural Language Processing with Simplified Data Preprocessing
Donghwan Shin, Han-Seok Kim, Soojin Lee
The Journal of Korean Institute of Information Technology (2024) Vol. 22, Iss. 2, pp. 1-8
Closed Access

Page 1 - Next Page

Scroll to top