Retraction

Analysis of Malware Detection and Signature Generation Using a Novel Hybrid Approach

Citations (12)

12
Total Citations
8
Post-Retraction
(66.7%)
4
Pre-Retraction
0
Same Day
Post-Retraction Citation Analysis
0 Within 30 days
6 Within 1 year
0 After 2+ years
443 Days since retraction (latest)
Study on Feature Extraction and Classification Optimization Methods for Malware Detection Models
Xinyu Xiang
Unknown Journal
Published: Dec 2024
443 days after retraction
Advanced Malware Analysis Methods: Behaviour-Based Detection and Reverse Engineering
Nur Widiyasono, Siti Rahayu Selamat, Randi Rizal et al. (6 authors)
Unknown Journal
Published: Oct 2024
379 days after retraction
The Crucial Significance of Cyber Threat Intelligence in Mitigating Cyber Attacks
Omer Eltayeb Omer Eltayeb
Journal of Ecohumanism Open Access
Published: Aug 2024
320 days after retraction
The revolution and vision of explainable AI for Android malware detection and protection
Shamsher Ullah, Jianqiang Li, Farhan Ullah et al. (8 authors)
Internet of Things
Published: Aug 2024
4 citations
307 days after retraction
An Approach for Malware Detection by Analyzing its Functionalities
Bharathi Sadhu, D. Jaya Shankar Kumar
Unknown Journal
Published: Apr 2024
204 days after retraction
AI-enabled approach for enhancing obfuscated malware detection: a hybrid ensemble learning with combined feature selection techniques
Md. Alamgir Hossain, Md. Alimul Haque, Sultan Ahmad et al. (9 authors)
International Journal of Systems Assurance Engineering and Management
Published: Mar 2024
17 citations
176 days after retraction
Enhanced detection of obfuscated malware in memory dumps: a machine learning approach for advanced cybersecurity
Md. Alamgir Hossain, Md. Saiful Islam
Cybersecurity Open Access
Published: Jan 2024
9 citations
113 days after retraction
Malware Detection and Classification: A Comprehensive Review
Vikas Verma, Arun Malik
SSRN Electronic Journal
Published: Jan 2024
89 days after retraction
Android Malware Detection by Correlated Real Permission Couples Using FP Growth Algorithm and Neural Networks
Abhinandan Banik, Jyoti Prakash Singh
IEEE Access Open Access
Published: Jan 2023
6 citations
276 days before retraction
Intelligent Intrusion Detection Algorithm Based on Multi-Attack for Edge-Assisted Internet of Things
Shitharth Selvarajan, Gouse Baig Mohammed, Jayaraj Ramasamy et al. (4 authors)
Advances in information security
Published: Jan 2023
17 citations
276 days before retraction
Retracted: Analysis of Malware Detection and Signature Generation Using a Novel Hybrid Approach
Mathematical Problems in Engineering
Mathematical Problems in Engineering Open Access
Published: Jan 2023
276 days before retraction
Mechanism of Internet of Things (IoT) Integrated with Radio Frequency Identification (RFID) Technology for Healthcare System
Gouse Baig Mohammad, Shitharth Shitharth, Salman Ali Syed et al. (8 authors)
Mathematical Problems in Engineering Open Access
Published: Mar 2022
24 citations
561 days before retraction
Quick Stats
Total Citations: 12
Years Since Retraction: 2.1 years
Open Access: Yes
Last Checked: Jul 24, 2025
Related Papers
Model for software quality evaluation with hesitant fuzzy u…
Journal of Intelligent & Fuzzy Systems • 57 citations
A consensus approach to multi-granular linguistic MCGDM wit…
Journal of Intelligent & Fuzzy Systems • 24 citations
Independent hesitant fuzzy group decision making methods wi…
Journal of Intelligent & Fuzzy Systems • 7 citations
HGPSO: An efficient scientific workflow scheduling in cloud…
Journal of Intelligent & Fuzzy Systems • 5 citations
A novel hash based feature descriptors for content based im…
Journal of Intelligent & Fuzzy Systems • 4 citations