OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Optimal Graph Convolutional Neural Network-Based Ransomware Detection for Cybersecurity in IoT Environment
Hend Khalid Alkahtani, Khalid Mahmood, Majdi Khalid, et al.
Applied Sciences (2023) Vol. 13, Iss. 8, pp. 5167-5167
Open Access | Times Cited: 13

Showing 13 citing articles:

Analyzing Data Theft Ransomware Traffic Patterns Using BERT
Gabriela Almeida, Felipe Mendes de Vasconcelos
(2023)
Open Access | Times Cited: 16

La inteligencia artificial en la seguridad informática: Una revisión literaria
Bernabé Ortega-Tenezaca, Lady Rodriguez Carmona, Edgar Macías Farias, et al.
Arandu-UTIC. (2025) Vol. 11, Iss. 2, pp. 2798-2819
Closed Access

Modelo de gestión para la atención y respuesta ante ataques de ransomware en el área de networking
Vanessa García Pineda, Edison Andrés Zapata Ochoa, Juan Camilo Gallego Gómez, et al.
Revista Sapientía (2025) Vol. 17, Iss. 33
Closed Access

Mitigating Data Exfiltration Ransomware through Advanced Decoy File Strategies
Shishi Liu, Xin Chen
Research Square (Research Square) (2023)
Open Access | Times Cited: 11

LLaMa Assisted Reverse Engineering of Modern Ransomware: A Comparative Analysis with Early Crypto-Ransomware
Felipe Eduardo Vasconcelos, Gabriela Almeida
Research Square (Research Square) (2023)
Open Access | Times Cited: 10

A Fine-Grained System Driven of Attacks Over Several New Representation Techniques Using Machine Learning
Mohammed A. Al Ghamdi
IEEE Access (2023) Vol. 11, pp. 96615-96625
Open Access | Times Cited: 7

Integrating Ebola optimization search algorithm for enhanced deep learning-based ransomware detection in Internet of Things security
Ibrahim R. Alzahrani, Randa Allafi
AIMS Mathematics (2024) Vol. 9, Iss. 3, pp. 6784-6802
Open Access | Times Cited: 2

Multiple instance learning method based on convolutional neural network and self-attention for early cancer detection
Junjiang Liu, Shusen Zhou, Mujun Zang, et al.
Computer Methods in Biomechanics & Biomedical Engineering (2024), pp. 1-16
Closed Access

Analyze textual data: deep neural network for adversarial inversion attack in wireless networks
Mohammed A. Al Ghamdi
SN Applied Sciences (2023) Vol. 5, Iss. 12
Open Access | Times Cited: 1

Laundry Cluster Management Using Cloud
Mateusz Salach, Bartosz Trybuś, Bartosz Pawłowicz, et al.
Annals of Computer Science and Information Systems (2023) Vol. 35, pp. 1125-1129
Open Access

Internet of Things Assisted Automated Ransomware Recognition using Harmony Search Algorithm with Deep Learning
S. Karunakaran, M. Manimaraboopathy, M. Maharajothi, et al.
(2023), pp. 475-480
Closed Access

Page 1

Scroll to top