OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Obfuscated Memory Malware Detection in Resource-Constrained IoT Devices for Smart City Applications
Sakib Shahriar Shafin, Gour Karmakar, Iven Mareels
Sensors (2023) Vol. 23, Iss. 11, pp. 5348-5348
Open Access | Times Cited: 32

Showing 1-25 of 32 citing articles:

Advancing cybersecurity: a comprehensive review of AI-driven detection techniques
A Salem, Safaa M. Azzam, O. E. Emam, et al.
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 32

AI-enabled approach for enhancing obfuscated malware detection: a hybrid ensemble learning with combined feature selection techniques
Md. Alamgir Hossain, Md. Alimul Haque, Sultan Ahmad, et al.
International Journal of Systems Assurance Engineering and Management (2024)
Closed Access | Times Cited: 17

Machine-Learning-Based Traffic Classification in Software-Defined Networks
Rehab H. Serag, Mohamed S. Abdalzaher, Hussein A. Elsayed, et al.
Electronics (2024) Vol. 13, Iss. 6, pp. 1108-1108
Open Access | Times Cited: 11

ELIDS: Ensemble Feature Selection for Lightweight IDS against DDoS attacks in resource-constrained IoT environment
Mahawish Fatima, Osama Rehman, Saqib Ali, et al.
Future Generation Computer Systems (2024) Vol. 159, pp. 172-187
Closed Access | Times Cited: 9

Enhanced detection of obfuscated malware in memory dumps: a machine learning approach for advanced cybersecurity
Md. Alamgir Hossain, Md. Saiful Islam
Cybersecurity (2024) Vol. 7, Iss. 1
Open Access | Times Cited: 8

Obfuscated Privacy Malware Classifiers Based on Memory Dumping Analysis
David Cevallos-Salas, Felipe Grijalva, José Antonio Estrada, et al.
IEEE Access (2024) Vol. 12, pp. 17481-17498
Open Access | Times Cited: 7

A Novel Hybrid Unsupervised Learning Approach for Enhanced Cybersecurity in the IoT
K. Prabu, Sudhakar Periyasamy, T. Manikandan, et al.
Future Internet (2024) Vol. 16, Iss. 7, pp. 253-253
Open Access | Times Cited: 4

A new method for tuning the CNN pre-trained models as a feature extractor for malware detection
Halit Bakır
Pattern Analysis and Applications (2025) Vol. 28, Iss. 1
Closed Access

Leveraging Memory Forensic Features for Explainable Obfuscated Malware Detection with Isolated Family Distinction Paradigm
S. Sharmila, Shubham Gupta, Aruna Tiwari, et al.
Computers & Electrical Engineering (2025) Vol. 123, pp. 110107-110107
Closed Access

An Enhanced Model of Whale Optimization Algorithm and K-nearest Neighbors for Malware Detection
Rami Sihwail, Mariam Al Ghamri, Dyala R. Ibrahim
International journal of intelligent engineering and systems (2024) Vol. 17, Iss. 3, pp. 606-621
Open Access | Times Cited: 3

Hybrid feature extraction and integrated deep learning for cloud-based malware detection
Pham Sy Nguyen, Tran Nhat Huy, Tong Anh Tuan, et al.
Computers & Security (2024), pp. 104233-104233
Closed Access | Times Cited: 3

A Malicious Code Detection Method Based on Stacked Depthwise Separable Convolutions and Attention Mechanism
Hong Huang, Rui Du, Zhaolian Wang, et al.
Sensors (2023) Vol. 23, Iss. 16, pp. 7084-7084
Open Access | Times Cited: 8

Low-Carbon Design of Green Packaging Based on Deep Learning Perspective for Smart City
Xue Yu
IEEE Access (2023) Vol. 11, pp. 117423-117433
Open Access | Times Cited: 4

The use of multi-task learning in cybersecurity applications: a systematic literature review
Shimaa Ibrahim, Cagatay Catal, Thabet Kacem
Neural Computing and Applications (2024)
Open Access | Times Cited: 1

Comprehensive Ransomware Detection: Optimization of Feature Selection through Machine Learning Algorithms and Explainable AI on Memory Analysis
Lucas Leonel, Diego Nunes Molinos, Rodrigo Sanches Miani
(2024), pp. 123-138
Closed Access | Times Cited: 1

A Novel Light-Weight Machine Learning Classifier for Intrusion Detection in Controller Area Network in Smart Cars
Anila Kousar, Saeed Ahmed, Abdullah Altamimi, et al.
Smart Cities (2024) Vol. 7, Iss. 6, pp. 3289-3314
Open Access | Times Cited: 1

Gas Leakage Detection Using Tiny Machine Learning
Majda El Barkani, Nabil Benamar, Hanaa Talei, et al.
Electronics (2024) Vol. 13, Iss. 23, pp. 4768-4768
Open Access | Times Cited: 1

A contrastive learning approach for enhanced robustness for strengthening federated intelligence in internet of visual things
Ibrahim Alrashdi, Karam M. Sallam, Ali Alqazzaz, et al.
Internet of Things (2024) Vol. 26, pp. 101206-101206
Closed Access | Times Cited: 1

A taxonomy for cybersecurity standards
Eleni-Maria Kalogeraki, Nineta Polemi
Journal of Surveillance Security and Safety (2024) Vol. 5, Iss. 2, pp. 95-115
Open Access | Times Cited: 1

Federated Learning for Enhanced Malware Threat Detection to Secure Smart Power Grids
S. Shafi, Noshina Tariq, Farrukh Aslam Khan, et al.
Lecture notes in networks and systems (2024), pp. 692-703
Closed Access | Times Cited: 1

A Lightweight Obfuscated Malware Multi-class Classifier for IoT Using Machine Learning
William Cassel, Nahid Ebrahimi Majd
2016 International Conference on Computing, Networking and Communications (ICNC) (2024), pp. 239-243
Closed Access

Malware Classification in Cloud Computing Using Transfer Learning
Meryem Ec-Sabery, Adil Ben Abbou, Abdelali Boushaba, et al.
Studies in computational intelligence (2024), pp. 429-440
Closed Access

Enhancing ransomware defense: deep learning-based detection and family-wise classification of evolving threats
Amjad Hussain, Ayesha Saadia, Musaed Alhussein, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2546-e2546
Open Access

Detecting new obfuscated malware variants: A lightweight and interpretable machine learning approach
Oladipo A. Madamidola, Felix Ngobigha, Adnane Ez‐zizi
Intelligent Systems with Applications (2024), pp. 200472-200472
Open Access

Page 1 - Next Page

Scroll to top