
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Optimal Graph Convolutional Neural Network-Based Ransomware Detection for Cybersecurity in IoT Environment
Hend Khalid Alkahtani, Khalid Mahmood, Majdi Khalid, et al.
Applied Sciences (2023) Vol. 13, Iss. 8, pp. 5167-5167
Open Access | Times Cited: 13
Hend Khalid Alkahtani, Khalid Mahmood, Majdi Khalid, et al.
Applied Sciences (2023) Vol. 13, Iss. 8, pp. 5167-5167
Open Access | Times Cited: 13
Showing 13 citing articles:
Analyzing Data Theft Ransomware Traffic Patterns Using BERT
Gabriela Almeida, Felipe Mendes de Vasconcelos
(2023)
Open Access | Times Cited: 16
Gabriela Almeida, Felipe Mendes de Vasconcelos
(2023)
Open Access | Times Cited: 16
La inteligencia artificial en la seguridad informática: Una revisión literaria
Bernabé Ortega-Tenezaca, Lady Rodriguez Carmona, Edgar Macías Farias, et al.
Arandu-UTIC. (2025) Vol. 11, Iss. 2, pp. 2798-2819
Closed Access
Bernabé Ortega-Tenezaca, Lady Rodriguez Carmona, Edgar Macías Farias, et al.
Arandu-UTIC. (2025) Vol. 11, Iss. 2, pp. 2798-2819
Closed Access
Modelo de gestión para la atención y respuesta ante ataques de ransomware en el área de networking
Vanessa García Pineda, Edison Andrés Zapata Ochoa, Juan Camilo Gallego Gómez, et al.
Revista Sapientía (2025) Vol. 17, Iss. 33
Closed Access
Vanessa García Pineda, Edison Andrés Zapata Ochoa, Juan Camilo Gallego Gómez, et al.
Revista Sapientía (2025) Vol. 17, Iss. 33
Closed Access
An intelligent ransomware based cyberthreat detection model using multi head attention-based recurrent neural networks with optimization algorithm in IoT environment
Sarah A. Alzakari, Mohammed Aljebreen, Naz̲īr Aḥmad, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Sarah A. Alzakari, Mohammed Aljebreen, Naz̲īr Aḥmad, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Mitigating Data Exfiltration Ransomware through Advanced Decoy File Strategies
Shishi Liu, Xin Chen
Research Square (Research Square) (2023)
Open Access | Times Cited: 11
Shishi Liu, Xin Chen
Research Square (Research Square) (2023)
Open Access | Times Cited: 11
LLaMa Assisted Reverse Engineering of Modern Ransomware: A Comparative Analysis with Early Crypto-Ransomware
Felipe Eduardo Vasconcelos, Gabriela Almeida
Research Square (Research Square) (2023)
Open Access | Times Cited: 10
Felipe Eduardo Vasconcelos, Gabriela Almeida
Research Square (Research Square) (2023)
Open Access | Times Cited: 10
A Fine-Grained System Driven of Attacks Over Several New Representation Techniques Using Machine Learning
Mohammed A. Al Ghamdi
IEEE Access (2023) Vol. 11, pp. 96615-96625
Open Access | Times Cited: 7
Mohammed A. Al Ghamdi
IEEE Access (2023) Vol. 11, pp. 96615-96625
Open Access | Times Cited: 7
Integrating Ebola optimization search algorithm for enhanced deep learning-based ransomware detection in Internet of Things security
Ibrahim R. Alzahrani, Randa Allafi
AIMS Mathematics (2024) Vol. 9, Iss. 3, pp. 6784-6802
Open Access | Times Cited: 2
Ibrahim R. Alzahrani, Randa Allafi
AIMS Mathematics (2024) Vol. 9, Iss. 3, pp. 6784-6802
Open Access | Times Cited: 2
Multiple instance learning method based on convolutional neural network and self-attention for early cancer detection
Junjiang Liu, Shusen Zhou, Mujun Zang, et al.
Computer Methods in Biomechanics & Biomedical Engineering (2024), pp. 1-16
Closed Access
Junjiang Liu, Shusen Zhou, Mujun Zang, et al.
Computer Methods in Biomechanics & Biomedical Engineering (2024), pp. 1-16
Closed Access
Hybridization of synergistic swarm and differential evolution with graph convolutional network for distributed denial of service detection and mitigation in IoT environment
C. Naveeth Babu, Suneetha Manne, Mohammed Altaf Ahmed, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
C. Naveeth Babu, Suneetha Manne, Mohammed Altaf Ahmed, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
Analyze textual data: deep neural network for adversarial inversion attack in wireless networks
Mohammed A. Al Ghamdi
SN Applied Sciences (2023) Vol. 5, Iss. 12
Open Access | Times Cited: 1
Mohammed A. Al Ghamdi
SN Applied Sciences (2023) Vol. 5, Iss. 12
Open Access | Times Cited: 1
Laundry Cluster Management Using Cloud
Mateusz Salach, Bartosz Trybuś, Bartosz Pawłowicz, et al.
Annals of Computer Science and Information Systems (2023) Vol. 35, pp. 1125-1129
Open Access
Mateusz Salach, Bartosz Trybuś, Bartosz Pawłowicz, et al.
Annals of Computer Science and Information Systems (2023) Vol. 35, pp. 1125-1129
Open Access
A Study on the Multi-Cyber Range Application of Mission-Based Cybersecurity Testing and Evaluation in Association with the Risk Management Framework
Ikjae Kim, Moosung Park, Hyunjin Lee, et al.
Information (2023) Vol. 15, Iss. 1, pp. 18-18
Open Access
Ikjae Kim, Moosung Park, Hyunjin Lee, et al.
Information (2023) Vol. 15, Iss. 1, pp. 18-18
Open Access
Internet of Things Assisted Automated Ransomware Recognition using Harmony Search Algorithm with Deep Learning
S. Karunakaran, M. Manimaraboopathy, M. Maharajothi, et al.
(2023), pp. 475-480
Closed Access
S. Karunakaran, M. Manimaraboopathy, M. Maharajothi, et al.
(2023), pp. 475-480
Closed Access