
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Classification and Analysis of Malicious Code Detection Techniques Based on the APT Attack
Kyungroul Lee, Jaehyuk Lee, Kangbin Yim
Applied Sciences (2023) Vol. 13, Iss. 5, pp. 2894-2894
Open Access | Times Cited: 16
Kyungroul Lee, Jaehyuk Lee, Kangbin Yim
Applied Sciences (2023) Vol. 13, Iss. 5, pp. 2894-2894
Open Access | Times Cited: 16
Showing 16 citing articles:
AI-enabled approach for enhancing obfuscated malware detection: a hybrid ensemble learning with combined feature selection techniques
Md. Alamgir Hossain, Md. Alimul Haque, Sultan Ahmad, et al.
International Journal of Systems Assurance Engineering and Management (2024)
Closed Access | Times Cited: 17
Md. Alamgir Hossain, Md. Alimul Haque, Sultan Ahmad, et al.
International Journal of Systems Assurance Engineering and Management (2024)
Closed Access | Times Cited: 17
Enhanced Ransomware Detection Using Dual-Layer Random Forest on Opcode Sequences
Hanae Moritaka, Daichi Komuro
Authorea (Authorea) (2024)
Open Access | Times Cited: 9
Hanae Moritaka, Daichi Komuro
Authorea (Authorea) (2024)
Open Access | Times Cited: 9
Enhanced detection of obfuscated malware in memory dumps: a machine learning approach for advanced cybersecurity
Md. Alamgir Hossain, Md. Saiful Islam
Cybersecurity (2024) Vol. 7, Iss. 1
Open Access | Times Cited: 7
Md. Alamgir Hossain, Md. Saiful Islam
Cybersecurity (2024) Vol. 7, Iss. 1
Open Access | Times Cited: 7
Examining the Role of Artificial Intelligence in Cyber Security (CS): A Systematic Review for Preventing Prospective Solutions in Financial Transactions
Mahfujur Rahman Faraji, Fisan Shikder, Md. Hasibul Hasan, et al.
International Journal of Religion (2024) Vol. 5, Iss. 10, pp. 4766-4782
Open Access | Times Cited: 5
Mahfujur Rahman Faraji, Fisan Shikder, Md. Hasibul Hasan, et al.
International Journal of Religion (2024) Vol. 5, Iss. 10, pp. 4766-4782
Open Access | Times Cited: 5
Detection and prevention of spear phishing attacks: A comprehensive survey
Santosh Kumar Birthriya, Priyanka Ahlawat, Ankit Kumar Jain
Computers & Security (2025) Vol. 151, pp. 104317-104317
Closed Access
Santosh Kumar Birthriya, Priyanka Ahlawat, Ankit Kumar Jain
Computers & Security (2025) Vol. 151, pp. 104317-104317
Closed Access
Research on APT group classification method based on graph attention networks
Yazhou Du, Weiwu Ren, Xintong Song, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 4
Closed Access
Yazhou Du, Weiwu Ren, Xintong Song, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 4
Closed Access
Anomaly detection for early ransomware and spyware warning in nuclear power plant systems based on FusionGuard
Abdullah Almoqbil
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 2377-2394
Closed Access | Times Cited: 4
Abdullah Almoqbil
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 2377-2394
Closed Access | Times Cited: 4
Semantic lossless encoded image representation for malware classification
Yaoxiang Yu, Bo Cai, Kamran Aziz, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Yaoxiang Yu, Bo Cai, Kamran Aziz, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Combating phishing and script-based attacks: a novel machine learning framework for improved client-side security
Jiwon Hong, Hyeongmin Kim, Suhyeon Oh, et al.
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access | Times Cited: 1
Jiwon Hong, Hyeongmin Kim, Suhyeon Oh, et al.
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access | Times Cited: 1
Assessment of existing cyber-attack detection models for web-based systems
Odiaga Gloria Awuor
Global Journal of Engineering and Technology Advances (2023) Vol. 15, Iss. 1, pp. 070-089
Open Access | Times Cited: 4
Odiaga Gloria Awuor
Global Journal of Engineering and Technology Advances (2023) Vol. 15, Iss. 1, pp. 070-089
Open Access | Times Cited: 4
Prediction of Probability of Server Intrusion Using Machine Learning Techniques
Atul Kumar, Ishu Sharma
(2023), pp. 1-6
Closed Access | Times Cited: 2
Atul Kumar, Ishu Sharma
(2023), pp. 1-6
Closed Access | Times Cited: 2
Rethink prevalent machine learning attack detection methods from a generalization perspective
Mingjie Shi, Xiao Zhang, Chong Ruan, et al.
(2024)
Closed Access
Mingjie Shi, Xiao Zhang, Chong Ruan, et al.
(2024)
Closed Access
On the study of one way to detect anomalous program execution
Y. V. Kosolapov, Tatjyana A. Pavlova
Modeling and Analysis of Information Systems (2024) Vol. 31, Iss. 2, pp. 152-163
Open Access
Y. V. Kosolapov, Tatjyana A. Pavlova
Modeling and Analysis of Information Systems (2024) Vol. 31, Iss. 2, pp. 152-163
Open Access
From Fine-Grained to Refined: APT Malware Knowledge Graph Construction and Attribution Analysis Driven by Multi-stage Graph Computation
Rongqi Jing, Zhengwei Jiang, Qiuyun Wang, et al.
Lecture notes in computer science (2024), pp. 78-93
Closed Access
Rongqi Jing, Zhengwei Jiang, Qiuyun Wang, et al.
Lecture notes in computer science (2024), pp. 78-93
Closed Access
IoT Advancing Memory Dump Analysis: Integrating Machine Learning Techniques for Enhanced Malware Detection
Atul Kumar, Kalpna Guleria, Ishu Sharma, et al.
(2024), pp. 1-5
Closed Access
Atul Kumar, Kalpna Guleria, Ishu Sharma, et al.
(2024), pp. 1-5
Closed Access
SOFT COMPUTING IN PREVENTING RANSOMWARE RELYING ON LARGER-SCALE DATA AND ANALYSIS
Attila Máté Kovács
Strategic Impact (2023) Vol. 87, Iss. 2, pp. 66-84
Closed Access
Attila Máté Kovács
Strategic Impact (2023) Vol. 87, Iss. 2, pp. 66-84
Closed Access