OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Comparison of Adaboost with MultiBoosting for Phishing Website Detection
Abdülhamit Subaşı, Emir Kremić
Procedia Computer Science (2020) Vol. 168, pp. 272-278
Open Access | Times Cited: 71

Showing 26-50 of 71 citing articles:

Prevention of Phishing attacks using AI Algorithm
Meraj Farheen Ansari, Amrutanshu Panigrahi, Geethamanikanta Jakka, et al.
(2022), pp. 1-5
Closed Access | Times Cited: 11

Enhancement of Pre-Trained Deep Learning Models to Improve Brain Tumor
Zaka Ullah, Ayman Odeh, Ihtisham Khattak, et al.
Informatica (2023) Vol. 47, Iss. 6
Open Access | Times Cited: 6

Single and Hybrid-Ensemble Learning-Based Phishing Website Detection: Examining Impacts of Varied Nature Datasets and Informative Feature Selection Technique
Kibreab Adane, Berhanu Beyene, Mohammed Abebe
Digital Threats Research and Practice (2023) Vol. 4, Iss. 3, pp. 1-27
Open Access | Times Cited: 6

Online Phishing Detection Using Machine Learning
Rabab Alayham Abbas Helmi, Md Gapar Md Johar, Muhammad Alif Sazwan Bin Mohd. Hafiz
(2023), pp. 1-4
Closed Access | Times Cited: 5

URL based Phishing Detection using Machine Learning
Mohd Shoaib, M. Sarosh Umar
2021 5th International Conference on Information Systems and Computer Networks (ISCON) (2023), pp. 1-7
Closed Access | Times Cited: 5

Identification and Analysis of Phishing Website based on Machine Learning Methods
Mohammed Hazim Alkawaz, Stephanie Joanne Steven, Omar Farook Mohammad, et al.
(2022) Vol. 2018, pp. 246-251
Closed Access | Times Cited: 8

An improved anti‐phishing model utilizing TF‐IDF and AdaBoost
Bhawna Sharma, Parvinder Singh
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 26
Closed Access | Times Cited: 8

Website Phishing Detection Using Machine Learning Classification Algorithms
Mukta Mithra Raj, J. Angel Arul Jothi
Communications in computer and information science (2022), pp. 219-233
Closed Access | Times Cited: 7

Detecting phishing attacks using Convolutional Neural Network and LSTM
S Jesmithaa, Sherin Eliyas
(2023), pp. 2789-2792
Closed Access | Times Cited: 4

Detection of Phishing Websites
C S Avaneesh, Varun Ganapathy S, E Vasanth, et al.
International Journal of Innovative Science and Research Technology (IJISRT) (2024), pp. 2647-2652
Open Access | Times Cited: 1

Detection of adversarial phishing attack using machine learning techniques
K. Muthamil Sudar, M Rohan, K. Vignesh
Sadhana (2024) Vol. 49, Iss. 3
Closed Access | Times Cited: 1

Stack Ensemble Model For Detection Of Phishing Website
Hussaini Abdullahi Wabi, Joseph A. Ojeniyi, Ismaila Idris, et al.
(2024), pp. 1-6
Closed Access | Times Cited: 1

Enhanced Phishing Website Detection Using Dual-Layer CNN and GRU with Attention Mechanism and Lexical NLP Features
Santosh Kumar Birthriya, Priyanka Ahlawat, Ankit Kumar Jain
SN Computer Science (2024) Vol. 5, Iss. 7
Closed Access | Times Cited: 1

A Comprehensive Survey of Automated Website Phishing Detection Techniques: A Perspective of Artificial Intelligence and Human Behaviors
C. Rajeswary, M. Thirumaran
2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS) (2023), pp. 420-427
Closed Access | Times Cited: 3

Performance Investigation of Phishing Website Detection by Improved Deep Learning Techniques
Bader Hamad AlOwaimer, Deepak Dahiya
Wireless Personal Communications (2023) Vol. 132, Iss. 4, pp. 2625-2644
Closed Access | Times Cited: 3

A Face Detection Method Based on Image Processing and Improved Adaptive Boosting Algorithm
Wanli Zhang, Xianwei Li, Qixiang Song, et al.
Traitement du signal (2020) Vol. 37, Iss. 3, pp. 395-403
Open Access | Times Cited: 7

Evolutionary Optimization of Neuro-Symbolic Integration for Phishing URL Detection
Kyoung-Won Park, Seok-Jun Bu, Sung‐Bae Cho
Lecture notes in computer science (2021), pp. 88-100
Closed Access | Times Cited: 7

Detecting Cloud-Based Phishing Attacks by Combining Deep Learning Models
Birendra Jha, Medha Atre, Ashwini K. Rao
(2022), pp. 130-139
Open Access | Times Cited: 5

AntiPhiMBS-Auth: A New Anti-phishing Model to Mitigate Phishing Attacks in Mobile Banking System at Authentication Level
Tej Narayan Thakur, Noriaki Yoshiura
Lecture notes in computer science (2021), pp. 365-380
Closed Access | Times Cited: 6

Analysis of uniform resource locator using boosting algorithms for forensic purpose
K. A. Apoorva, S. Sangeetha
Computer Communications (2022) Vol. 190, pp. 69-77
Closed Access | Times Cited: 4

Hybrid Approach for Phishing Website Detection Using Classification Algorithms
Mukta Mithra Raj, J. Angel Arul Jothi
ParadigmPlus (2022) Vol. 3, Iss. 3, pp. 16-29
Open Access | Times Cited: 4

RoBERTa for URL Classification: Enhancing Web Security and Content Filtering
Joana Ilievska, Hristina Mihajloska Trpcheska, Jovana Dobreva, et al.
(2023), pp. 1-4
Closed Access | Times Cited: 2

Feature Engineering Framework to detect Phishing Websites using URL Analysis
N. Swapna Goud, Anjali Mathur
International Journal of Advanced Computer Science and Applications (2021) Vol. 12, Iss. 7
Open Access | Times Cited: 4

Phishing Website Detection Using Several Machine Learning Algorithms: A Review Paper
Alexander Veach, Munther Abualkibash
International Journal of Informatics Information System and Computer Engineering (INJIISCOM) (2022) Vol. 3, Iss. 2, pp. 219-230
Open Access | Times Cited: 3

Visualisation and Classification of Phishing URL using Ensemble Learning Algorithms and Hyper-Parameter Tuning
Govind Agarwal, Chirag Goel, Kritika Jindal, et al.
(2023), pp. 13-18
Closed Access | Times Cited: 1

Scroll to top