OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Image-Based Malware Classification Using VGG19 Network and Spatial Convolutional Attention
Mazhar Javed Awan, Osama Ahmed Masood, Mazin Abed Mohammed, et al.
Electronics (2021) Vol. 10, Iss. 19, pp. 2444-2444
Open Access | Times Cited: 102

Showing 1-25 of 102 citing articles:

A novel deep learning-based approach for malware detection
Kamran Shaukat, Suhuai Luo, Vijay Varadharajan
Engineering Applications of Artificial Intelligence (2023) Vol. 122, pp. 106030-106030
Closed Access | Times Cited: 105

Threat Analysis and Distributed Denial of Service (DDoS) Attack Recognition in the Internet of Things (IoT)
Mohammed Hasan Ali, Mustafa Musa Jaber, Sura Khalil, et al.
Electronics (2022) Vol. 11, Iss. 3, pp. 494-494
Open Access | Times Cited: 75

Blockchain-Based IoT Devices in Supply Chain Management: A Systematic Literature Review
Muzammil Hussain, Waheed Javed, Owais Hakeem, et al.
Sustainability (2021) Vol. 13, Iss. 24, pp. 13646-13646
Open Access | Times Cited: 85

A two‐stage deep learning framework for image‐based android malware detection and variant classification
Pooja Yadav, Neeraj Menon, Vinayakumar Ravi, et al.
Computational Intelligence (2022) Vol. 38, Iss. 5, pp. 1748-1771
Closed Access | Times Cited: 48

Malware Detection Using Memory Analysis Data in Big Data Environment
Murat Dener, Gökçe Ok, Abdullah Orman
Applied Sciences (2022) Vol. 12, Iss. 17, pp. 8604-8604
Open Access | Times Cited: 47

A Novel Detection and Multi-Classification Approach for IoT-Malware Using Random Forest Voting of Fine-Tuning Convolutional Neural Networks
Safa Ben Atitallah, Maha Driss, Iman Almomani
Sensors (2022) Vol. 22, Iss. 11, pp. 4302-4302
Open Access | Times Cited: 43

Quantum Mayfly Optimization with Encoder-Decoder Driven LSTM Networks for Malware Detection and Classification Model
Omar A. Alzubi, Jafar A. Alzubi, Tareq Mahmod Alzubi, et al.
Mobile Networks and Applications (2023) Vol. 28, Iss. 2, pp. 795-807
Closed Access | Times Cited: 34

Weed Identification in Soybean Seedling Stage Based on Optimized Faster R-CNN Algorithm
Xinle Zhang, Jian Cui, Huanjun Liu, et al.
Agriculture (2023) Vol. 13, Iss. 1, pp. 175-175
Open Access | Times Cited: 26

Automated Knee MR Images Segmentation of Anterior Cruciate Ligament Tears
Mazhar Javed Awan, Mohd Shafry Mohd Rahim, Naomie Salim, et al.
Sensors (2022) Vol. 22, Iss. 4, pp. 1552-1552
Open Access | Times Cited: 33

Harris Hawks Sparse Auto-Encoder Networks for Automatic Speech Recognition System
Mohammed Hasan Ali, Mustafa Musa Jaber, Sura Khalil, et al.
Applied Sciences (2022) Vol. 12, Iss. 3, pp. 1091-1091
Open Access | Times Cited: 32

SDIF-CNN: Stacking deep image features using fine-tuned convolution neural network models for real-world malware detection and classification
Sanjeev Kumar, Kajal Panda
Applied Soft Computing (2023) Vol. 146, pp. 110676-110676
Closed Access | Times Cited: 16

An Advanced Ensemble Framework for defending against obfuscated Windows, Android, and IoT malware
Danish Vasan, Junaid Akram, Mohammad Hammoudeh, et al.
Applied Soft Computing (2025), pp. 112908-112908
Closed Access

Enhancing the performance in detecting bone fracture using convolutional neural network in comparison with visual geometry group (VGG 19)
Natesh Reddy, Rashmita Khilar
AIP conference proceedings (2025) Vol. 3252, pp. 020123-020123
Closed Access

Detection of Leaf Diseases in Banana Crops Using Deep Learning Techniques
N. Jiménez, Stefany Orellana, Bertha Mazón-Olivo, et al.
AI (2025) Vol. 6, Iss. 3, pp. 61-61
Open Access

Big Data COVID-19 Systematic Literature Review: Pandemic Crisis
Laraib Aslam Haafza, Mazhar Javed Awan, Adnan Abid, et al.
Electronics (2021) Vol. 10, Iss. 24, pp. 3125-3125
Open Access | Times Cited: 33

Performance Analysis for COVID-19 Diagnosis Using Custom and State-of-the-Art Deep Learning Models
Ali Tariq Nagi, Mazhar Javed Awan, Mazin Abed Mohammed, et al.
Applied Sciences (2022) Vol. 12, Iss. 13, pp. 6364-6364
Open Access | Times Cited: 25

IIoT Malware Detection Using Edge Computing and Deep Learning for Cybersecurity in Smart Factories
Ho-myung Kim, Kyungho Lee
Applied Sciences (2022) Vol. 12, Iss. 15, pp. 7679-7679
Open Access | Times Cited: 25

A Novel Android Botnet Detection System Using Image-Based and Manifest File Features
Suleiman Y. Yerima, Abul Bashar
Electronics (2022) Vol. 11, Iss. 3, pp. 486-486
Open Access | Times Cited: 24

Short range correlation transformer for occluded person re-identification
Yun-Bin Zhao, Songhao Zhu, Dongsheng Wang, et al.
Neural Computing and Applications (2022) Vol. 34, Iss. 20, pp. 17633-17645
Closed Access | Times Cited: 24

Obfuscated Malware Detection in IoT Android Applications Using Markov Images and CNN
K. A. Dhanya, P. Vinod, Suleiman Y. Yerima, et al.
IEEE Systems Journal (2023) Vol. 17, Iss. 2, pp. 2756-2766
Open Access | Times Cited: 12

Robust Malware Family Classification Using Effective Features and Classifiers
Baraa Tareq Hammad, Norziana Jamil, Ismail Taha Ahmed, et al.
Applied Sciences (2022) Vol. 12, Iss. 15, pp. 7877-7877
Open Access | Times Cited: 18

Analyzing and Explaining Black-Box Models for Online Malware Detection
Harikha Manthena, Jeffrey C. Kimmel, Mahmoud Abdelsalam, et al.
IEEE Access (2023) Vol. 11, pp. 25237-25252
Open Access | Times Cited: 10

ResNeXt+: Attention Mechanisms Based on ResNeXt for Malware Detection and Classification
Yuewang He, Xiangui Kang, Qiben Yan, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 19, pp. 1142-1155
Closed Access | Times Cited: 10

Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat
Isabel Herrera Montano, José Javier García Aranda, Juan Ramos Diaz, et al.
Cluster Computing (2022) Vol. 25, Iss. 6, pp. 4289-4302
Open Access | Times Cited: 18

Phishing Detection in Blockchain Transaction Networks Using Ensemble Learning
Roseline Oluwaseun Ogundokun, Micheal Olaolu Arowolo, Robertas Damaševičius, et al.
Telecom (2023) Vol. 4, Iss. 2, pp. 279-297
Open Access | Times Cited: 9

Page 1 - Next Page

Scroll to top