
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
DURLD: Malicious URL Detection Using Deep Learning-Based Character Level Representations
Sriram Srinivasan, R. Vinayakumar, Ajay Arunachalam, et al.
Springer eBooks (2020), pp. 535-554
Closed Access | Times Cited: 33
Sriram Srinivasan, R. Vinayakumar, Ajay Arunachalam, et al.
Springer eBooks (2020), pp. 535-554
Closed Access | Times Cited: 33
Showing 1-25 of 33 citing articles:
Deep Learning for Phishing Detection: Taxonomy, Current Challenges and Future Directions
Nguyet Quang, Ali Selamat, Ondřej Krejcar, et al.
IEEE Access (2022) Vol. 10, pp. 36429-36463
Open Access | Times Cited: 87
Nguyet Quang, Ali Selamat, Ondřej Krejcar, et al.
IEEE Access (2022) Vol. 10, pp. 36429-36463
Open Access | Times Cited: 87
Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning
Mohammed Alsaedi, Fuad A. Ghaleb, Faisal Saeed, et al.
Sensors (2022) Vol. 22, Iss. 9, pp. 3373-3373
Open Access | Times Cited: 56
Mohammed Alsaedi, Fuad A. Ghaleb, Faisal Saeed, et al.
Sensors (2022) Vol. 22, Iss. 9, pp. 3373-3373
Open Access | Times Cited: 56
Malware Analysis Using Artificial Intelligence and Deep Learning
Mark Stamp, Mamoun Alazab, Andrii Shalaginov
Springer eBooks (2020)
Closed Access | Times Cited: 46
Mark Stamp, Mamoun Alazab, Andrii Shalaginov
Springer eBooks (2020)
Closed Access | Times Cited: 46
Phishing Webpage Classification via Deep Learning-Based Algorithms: An Empirical Study
Nguyet Quang, Ali Selamat, Ondřej Krejcar, et al.
Applied Sciences (2021) Vol. 11, Iss. 19, pp. 9210-9210
Open Access | Times Cited: 34
Nguyet Quang, Ali Selamat, Ondřej Krejcar, et al.
Applied Sciences (2021) Vol. 11, Iss. 19, pp. 9210-9210
Open Access | Times Cited: 34
Character-level word encoding deep learning model for combating cyber threats in phishing URL detection
Mohammed Alshehri, Ahed Abugabah, Abdullah Algarni, et al.
Computers & Electrical Engineering (2022) Vol. 100, pp. 107868-107868
Closed Access | Times Cited: 27
Mohammed Alshehri, Ahed Abugabah, Abdullah Algarni, et al.
Computers & Electrical Engineering (2022) Vol. 100, pp. 107868-107868
Closed Access | Times Cited: 27
An enhanced mechanism for malicious URL detection using deep learning and DistilBERT-based feature extraction
Rania Zaimi, Khouloud Safi Eljil, Mohamed Hafidi, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 2
Closed Access
Rania Zaimi, Khouloud Safi Eljil, Mohamed Hafidi, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 2
Closed Access
Comprehensive phishing detection: A multi-channel approach with variants TCN fusion leveraging URL and HTML features
Ali Aljofey, Saifullahi Aminu Bello, Jian Lü, et al.
Journal of Network and Computer Applications (2025), pp. 104170-104170
Closed Access
Ali Aljofey, Saifullahi Aminu Bello, Jian Lü, et al.
Journal of Network and Computer Applications (2025), pp. 104170-104170
Closed Access
Review of NLP-based Systems in Digital Forensics and Cybersecurity
David Okore Ukwen, Murat Karabatak
(2021) Vol. 7, pp. 1-9
Closed Access | Times Cited: 25
David Okore Ukwen, Murat Karabatak
(2021) Vol. 7, pp. 1-9
Closed Access | Times Cited: 25
A comprehensive survey on online social networks security and privacy issues: Threats, machine learning‐based solutions, and open challenges
Munmun Bhattacharya, Sandip Roy, Samiran Chattopadhyay, et al.
Security and Privacy (2022) Vol. 6, Iss. 1
Closed Access | Times Cited: 16
Munmun Bhattacharya, Sandip Roy, Samiran Chattopadhyay, et al.
Security and Privacy (2022) Vol. 6, Iss. 1
Closed Access | Times Cited: 16
Innovative Research on English Teaching Model Based on Artificial Intelligence and Wireless Communication
Yuan Wang, Si Na Kew
International Journal of Reliability Quality and Safety Engineering (2022) Vol. 29, Iss. 05
Closed Access | Times Cited: 13
Yuan Wang, Si Na Kew
International Journal of Reliability Quality and Safety Engineering (2022) Vol. 29, Iss. 05
Closed Access | Times Cited: 13
Less Is More: Robust and Novel Features for Malicious Domain Detection
Chen Hajaj, Nitay Hason, Amit Dvir
Electronics (2022) Vol. 11, Iss. 6, pp. 969-969
Open Access | Times Cited: 13
Chen Hajaj, Nitay Hason, Amit Dvir
Electronics (2022) Vol. 11, Iss. 6, pp. 969-969
Open Access | Times Cited: 13
Graph-based phishing detection: URLGBM model driven by machine learning
Abdelali Elkouay, Najem Moussa, Abdallah Madani
International Journal of Computers and Applications (2024) Vol. 46, Iss. 7, pp. 481-495
Closed Access | Times Cited: 2
Abdelali Elkouay, Najem Moussa, Abdallah Madani
International Journal of Computers and Applications (2024) Vol. 46, Iss. 7, pp. 481-495
Closed Access | Times Cited: 2
Motion capture and evaluation system of football special teaching in colleges and universities based on deep learning
Xiaohui Yin, C. Chandru Vignesh, Thanjai Vadivel
International Journal of Systems Assurance Engineering and Management (2022) Vol. 13, Iss. 6, pp. 3092-3107
Closed Access | Times Cited: 9
Xiaohui Yin, C. Chandru Vignesh, Thanjai Vadivel
International Journal of Systems Assurance Engineering and Management (2022) Vol. 13, Iss. 6, pp. 3092-3107
Closed Access | Times Cited: 9
URL Based Malicious Activity Detection Using Machine Learning
Tagba Zoukarneini Difaizi, Ouedraogo Pengd-Wende Leonel Camille, Tadiwanashe Caleb Benhura, et al.
(2023), pp. 414-418
Closed Access | Times Cited: 3
Tagba Zoukarneini Difaizi, Ouedraogo Pengd-Wende Leonel Camille, Tadiwanashe Caleb Benhura, et al.
(2023), pp. 414-418
Closed Access | Times Cited: 3
GBJOF: Gradient Boosting Integrated with Jaya Algorithm to Optimize the Features in Malware Analysis
Deepa Rani, G. Bala Krishna, M. Radha, et al.
International Journal on Recent and Innovation Trends in Computing and Communication (2023) Vol. 11, Iss. 8s, pp. 538-548
Open Access | Times Cited: 3
Deepa Rani, G. Bala Krishna, M. Radha, et al.
International Journal on Recent and Innovation Trends in Computing and Communication (2023) Vol. 11, Iss. 8s, pp. 538-548
Open Access | Times Cited: 3
Multi-Modal Features Representation-Based Convolutional Neural Network Model for Malicious Website Detection
Mohammed Alsaedi, Fuad A. Ghaleb, Faisal Saeed, et al.
IEEE Access (2023) Vol. 12, pp. 7271-7284
Open Access | Times Cited: 3
Mohammed Alsaedi, Fuad A. Ghaleb, Faisal Saeed, et al.
IEEE Access (2023) Vol. 12, pp. 7271-7284
Open Access | Times Cited: 3
Using a Machine Learning Model for Malicious URL Type Detection
Suet Ping Tung, Ka Yan Wong, Ievgeniia Kuzminykh, et al.
Lecture notes in computer science (2022), pp. 493-505
Closed Access | Times Cited: 5
Suet Ping Tung, Ka Yan Wong, Ievgeniia Kuzminykh, et al.
Lecture notes in computer science (2022), pp. 493-505
Closed Access | Times Cited: 5
Malicious URL Detection Using Machine Learning
Mayank Swarnkar, Neha Sharma, Hiren Kumar Thakkar
Studies in computational intelligence (2022), pp. 199-216
Closed Access | Times Cited: 5
Mayank Swarnkar, Neha Sharma, Hiren Kumar Thakkar
Studies in computational intelligence (2022), pp. 199-216
Closed Access | Times Cited: 5
Investigation on Malware Detection Using Deep Learning Methods for Sustainable Development
M. Anusha, M. Karthika
Lecture notes in networks and systems (2022), pp. 581-592
Closed Access | Times Cited: 3
M. Anusha, M. Karthika
Lecture notes in networks and systems (2022), pp. 581-592
Closed Access | Times Cited: 3
Malicious URL Classification Using Artificial Fish Swarm Optimization and Deep Learning
Anwer Mustafa Hilal, Aisha Hassan Abdalla Hashim, Heba G. Mohamed, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 74, Iss. 1, pp. 607-621
Open Access | Times Cited: 3
Anwer Mustafa Hilal, Aisha Hassan Abdalla Hashim, Heba G. Mohamed, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 74, Iss. 1, pp. 607-621
Open Access | Times Cited: 3
AN INTELLIGENT IDENTIFICATION AND CLASSIFICATION SYSTEM FOR PHISHING UNIFORM RESOURCE LOCATORS (URLs)
Boddupally Kumar, N. V. Keerthana, S. Kevin Andrews
International Research Journal of Modernization in Engineering Technology and Science (2024)
Open Access
Boddupally Kumar, N. V. Keerthana, S. Kevin Andrews
International Research Journal of Modernization in Engineering Technology and Science (2024)
Open Access
A Systemic Review of Machine Learning Approaches for Malicious URL Detection
Sonali Kothari, Ishaan Tidke
Lecture notes in networks and systems (2024), pp. 177-187
Closed Access
Sonali Kothari, Ishaan Tidke
Lecture notes in networks and systems (2024), pp. 177-187
Closed Access
Detection of malicious URLs using Temporal Convolutional Network and Multi-Head Self-Attention mechanism
Nguyet Quang, Ali Selamat, Ondřej Krejcar, et al.
Applied Soft Computing (2024) Vol. 169, pp. 112540-112540
Closed Access
Nguyet Quang, Ali Selamat, Ondřej Krejcar, et al.
Applied Soft Computing (2024) Vol. 169, pp. 112540-112540
Closed Access
Detection of Malicious URLs using Ensemble learning techniques
D Arjun, D Sai Samhitha, A Padmavathi, et al.
(2023), pp. 1-5
Closed Access | Times Cited: 1
D Arjun, D Sai Samhitha, A Padmavathi, et al.
(2023), pp. 1-5
Closed Access | Times Cited: 1
Secure Suite: An Open-Source Service for Internet Security
Oliver Haney, Hala ElAarag
SoutheastCon (2021), pp. 1-7
Closed Access | Times Cited: 2
Oliver Haney, Hala ElAarag
SoutheastCon (2021), pp. 1-7
Closed Access | Times Cited: 2