OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A New Scheme for Ransomware Classification and Clustering Using Static Features
Bahaa Yamany, Mahmoud Said Elsayed, Anca Delia Jurcut, et al.
Electronics (2022) Vol. 11, Iss. 20, pp. 3307-3307
Open Access | Times Cited: 27

Showing 1-25 of 27 citing articles:

Ransomware Detection Using Machine Learning: A Survey
Amjad Alraizza, Abdulmohsen Algarni
Big Data and Cognitive Computing (2023) Vol. 7, Iss. 3, pp. 143-143
Open Access | Times Cited: 44

Enhancing Ransomware Attack Detection Using Transfer Learning and Deep Learning Ensemble Models on Cloud-Encrypted Data
Amardeep Singh, Zohaib Mushtaq, Hamad Ali Abosaq, et al.
Electronics (2023) Vol. 12, Iss. 18, pp. 3899-3899
Open Access | Times Cited: 26

Ransomware Reloaded: Re-examining Its Trend, Research and Mitigation in the Era of Data Exfiltration
Timothy R. McIntosh, Teo Sušnjak, Tong Liu, et al.
ACM Computing Surveys (2024)
Open Access | Times Cited: 12

A Holistic Approach to Ransomware Classification: Leveraging Static and Dynamic Analysis with Visualization
Bahaa Yamany, Mahmoud Said Elsayed, Anca Delia Jurcut, et al.
Information (2024) Vol. 15, Iss. 1, pp. 46-46
Open Access | Times Cited: 7

Evolving Trends in Ransomware: Inherent Advanced Persistent Threat
Sandhya Addetla, P. Rajalakshmi
Lecture notes in electrical engineering (2025), pp. 439-451
Closed Access

Majority Voting Ransomware Detection System
Simon Davies, Richard Macfarlane, William J. Buchanan
Journal of Information Security (2023) Vol. 14, Iss. 04, pp. 264-293
Open Access | Times Cited: 10

LLaMa Assisted Reverse Engineering of Modern Ransomware: A Comparative Analysis with Early Crypto-Ransomware
Felipe Eduardo Vasconcelos, Gabriela Almeida
Research Square (Research Square) (2023)
Open Access | Times Cited: 10

Hiding in the Crowd: Ransomware Protection by Adopting Camouflage and Hiding Strategy With the Link File
Soohan Lee, Suhyeon Lee, Jiwon Park, et al.
IEEE Access (2023) Vol. 11, pp. 92693-92704
Open Access | Times Cited: 9

Cybersecurity for autonomous vehicles against malware attacks in smart-cities
Sana Aurangzeb, Muhammad Aleem, Muhammad Taimoor Khan, et al.
Cluster Computing (2023) Vol. 27, Iss. 3, pp. 3363-3378
Open Access | Times Cited: 6

Advance Model For Ransomware Attacking Data Classification And Prediction Using Ai
Vijaya Kumbhar, Ashwini P. Shende, Yudhishthir Raut
(2023), pp. 369-373
Closed Access | Times Cited: 5

Retaliation against Ransomware in Cloud-Enabled PureOS System
Atef Ibrahim, Usman Tariq, Tariq Ahamed Ahanger, et al.
Mathematics (2023) Vol. 11, Iss. 1, pp. 249-249
Open Access | Times Cited: 4

Optimal Deep Learning Based Ransomware Detection and Classification in the Internet of Things Environment
Manal Abdullah Alohali, Muna Elsadig, Fahd N. Al‐Wesabi, et al.
Computer Systems Science and Engineering (2023) Vol. 46, Iss. 3, pp. 3087-3102
Open Access | Times Cited: 4

DECEPTION BASED TECHNIQUES AGAINST RANSOMWARES: A SYSTEMATIC REVIEW
Canny Siska Georgina, Farroh Sakinah, M. Ryan Fadholi, et al.
Jurnal Teknik Informatika (Jutif) (2023) Vol. 4, Iss. 3, pp. 529-553
Open Access | Times Cited: 2

Clop Ransomware in Action: A Comprehensive Analysis of Its Multi-Stage Tactics
Yong-Joon Lee, Jaeil Lee, Dojin Ryu, et al.
Electronics (2024) Vol. 13, Iss. 18, pp. 3689-3689
Open Access

Ransomware Detection using Machine Learning: Survey
Amjad Raizza, Abdulmohsen Algarni
(2023)
Open Access | Times Cited: 1

Cyber Security
Priyatosh Jana, Debjit Banerjee, Krishnashis Das, et al.
Advances in business information systems and analytics book series (2023), pp. 135-155
Closed Access

Significance of Cyber Security in Healthcare Systems
Anuj Singh, Somjit Mandal, Kamlesh Chandra Purohit
Advances in information security, privacy, and ethics book series (2023), pp. 51-71
Closed Access

Page 1 - Next Page

Scroll to top