
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A hybrid DNN–LSTM model for detecting phishing URLs
Alper Özcan, Cagatay Catal, Emrah Dönmez, et al.
Neural Computing and Applications (2021) Vol. 35, Iss. 7, pp. 4957-4973
Open Access | Times Cited: 79
Alper Özcan, Cagatay Catal, Emrah Dönmez, et al.
Neural Computing and Applications (2021) Vol. 35, Iss. 7, pp. 4957-4973
Open Access | Times Cited: 79
Showing 1-25 of 79 citing articles:
Long-term traffic flow forecasting using a hybrid CNN-BiLSTM model
Manuel Méndez, Mercedes G. Merayo, Manuel Núñez
Engineering Applications of Artificial Intelligence (2023) Vol. 121, pp. 106041-106041
Open Access | Times Cited: 94
Manuel Méndez, Mercedes G. Merayo, Manuel Núñez
Engineering Applications of Artificial Intelligence (2023) Vol. 121, pp. 106041-106041
Open Access | Times Cited: 94
Mitigation strategies against the phishing attacks: A systematic literature review
Bilal Naqvi, Kseniia Perova, Ali Farooq, et al.
Computers & Security (2023) Vol. 132, pp. 103387-103387
Open Access | Times Cited: 47
Bilal Naqvi, Kseniia Perova, Ali Farooq, et al.
Computers & Security (2023) Vol. 132, pp. 103387-103387
Open Access | Times Cited: 47
Prompt Engineering or Fine-Tuning? A Case Study on Phishing Detection with Large Language Models
Fouad Trad, Ali Chehab
Machine Learning and Knowledge Extraction (2024) Vol. 6, Iss. 1, pp. 367-384
Open Access | Times Cited: 22
Fouad Trad, Ali Chehab
Machine Learning and Knowledge Extraction (2024) Vol. 6, Iss. 1, pp. 367-384
Open Access | Times Cited: 22
A critical review of emerging cybersecurity threats in financial technologies
Uchenna Joseph Umoga, Enoch Oluwademilade Sodiya, Olukunle Oladipupo Amoo, et al.
International Journal of Science and Research Archive (2024) Vol. 11, Iss. 1, pp. 1810-1817
Open Access | Times Cited: 15
Uchenna Joseph Umoga, Enoch Oluwademilade Sodiya, Olukunle Oladipupo Amoo, et al.
International Journal of Science and Research Archive (2024) Vol. 11, Iss. 1, pp. 1810-1817
Open Access | Times Cited: 15
A Study on the Psychology of Social Engineering-Based Cyberattacks and Existing Countermeasures
Murtaza Ahmed Siddiqi, Wooguil Pak, Moquddam A. Siddiqi
Applied Sciences (2022) Vol. 12, Iss. 12, pp. 6042-6042
Open Access | Times Cited: 56
Murtaza Ahmed Siddiqi, Wooguil Pak, Moquddam A. Siddiqi
Applied Sciences (2022) Vol. 12, Iss. 12, pp. 6042-6042
Open Access | Times Cited: 56
Detecting Malicious URLs Using Machine Learning Techniques: Review and Research Directions
Malak Aljabri, Hanan S. Altamimi, Shahd A. Albelali, et al.
IEEE Access (2022) Vol. 10, pp. 121395-121417
Open Access | Times Cited: 47
Malak Aljabri, Hanan S. Altamimi, Shahd A. Albelali, et al.
IEEE Access (2022) Vol. 10, pp. 121395-121417
Open Access | Times Cited: 47
CNN-Fusion: An effective and lightweight phishing detection method based on multi-variant ConvNet
Musarat Hussain, Chi Cheng, Rui Xu, et al.
Information Sciences (2023) Vol. 631, pp. 328-345
Closed Access | Times Cited: 31
Musarat Hussain, Chi Cheng, Rui Xu, et al.
Information Sciences (2023) Vol. 631, pp. 328-345
Closed Access | Times Cited: 31
Look before you leap: Detecting phishing web pages by exploiting raw URL and HTML characteristics
Chidimma Opara, Yingke Chen, Bo Wei
Expert Systems with Applications (2023) Vol. 236, pp. 121183-121183
Open Access | Times Cited: 25
Chidimma Opara, Yingke Chen, Bo Wei
Expert Systems with Applications (2023) Vol. 236, pp. 121183-121183
Open Access | Times Cited: 25
A Phishing-Attack-Detection Model Using Natural Language Processing and Deep Learning
Eduardo Benavides-Astudillo, Walter Fuertes, Sandra Sánchez-Gordón, et al.
Applied Sciences (2023) Vol. 13, Iss. 9, pp. 5275-5275
Open Access | Times Cited: 22
Eduardo Benavides-Astudillo, Walter Fuertes, Sandra Sánchez-Gordón, et al.
Applied Sciences (2023) Vol. 13, Iss. 9, pp. 5275-5275
Open Access | Times Cited: 22
Multi-scale semantic deep fusion models for phishing website detection
Liu Dong-jie, Guanggang Geng, Xinchang Zhang
Expert Systems with Applications (2022) Vol. 209, pp. 118305-118305
Open Access | Times Cited: 33
Liu Dong-jie, Guanggang Geng, Xinchang Zhang
Expert Systems with Applications (2022) Vol. 209, pp. 118305-118305
Open Access | Times Cited: 33
Building Energy Consumption Prediction Using a Deep-Forest-Based DQN Method
Qiming Fu, Ke Li, Jianping Chen, et al.
Buildings (2022) Vol. 12, Iss. 2, pp. 131-131
Open Access | Times Cited: 30
Qiming Fu, Ke Li, Jianping Chen, et al.
Buildings (2022) Vol. 12, Iss. 2, pp. 131-131
Open Access | Times Cited: 30
Finsformer: A Novel Approach to Detecting Financial Attacks Using Transformer and Cluster-Attention
Hao An, Ruotong Ma, Yuhan Yan, et al.
Applied Sciences (2024) Vol. 14, Iss. 1, pp. 460-460
Open Access | Times Cited: 6
Hao An, Ruotong Ma, Yuhan Yan, et al.
Applied Sciences (2024) Vol. 14, Iss. 1, pp. 460-460
Open Access | Times Cited: 6
The applicability of a hybrid framework for automated phishing detection
Rob J. van der Geest, Giuseppe Cascavilla, Joris Hulstijn, et al.
Computers & Security (2024) Vol. 139, pp. 103736-103736
Open Access | Times Cited: 5
Rob J. van der Geest, Giuseppe Cascavilla, Joris Hulstijn, et al.
Computers & Security (2024) Vol. 139, pp. 103736-103736
Open Access | Times Cited: 5
URL based phishing attack detection using BiLSTM-gated highway attention block convolutional neural network
Manika Nanda, Shivani Goel
Multimedia Tools and Applications (2024) Vol. 83, Iss. 27, pp. 69345-69375
Closed Access | Times Cited: 5
Manika Nanda, Shivani Goel
Multimedia Tools and Applications (2024) Vol. 83, Iss. 27, pp. 69345-69375
Closed Access | Times Cited: 5
Enhanced Phishing URL Detection Using a Novel GRU-CNN Hybrid Approach
M. Sangeetha, K. Navaz, Santosh Kumar Ravva, et al.
Journal of Machine and Computing (2025), pp. 089-101
Closed Access
M. Sangeetha, K. Navaz, Santosh Kumar Ravva, et al.
Journal of Machine and Computing (2025), pp. 089-101
Closed Access
Development of BiLSTM deep learning model to detect URL-based phishing attacks
Öznur Şifa Akçam, Adem Tekerek, Mehmet Tekerek
Computers & Electrical Engineering (2025) Vol. 123, pp. 110212-110212
Closed Access
Öznur Şifa Akçam, Adem Tekerek, Mehmet Tekerek
Computers & Electrical Engineering (2025) Vol. 123, pp. 110212-110212
Closed Access
A Lightweight Multi-View Learning Approach for Phishing Attack Detection Using Transformer with Mixture of Experts
Yanbin Wang, Wenrui Ma, Haitao Xu, et al.
Applied Sciences (2023) Vol. 13, Iss. 13, pp. 7429-7429
Open Access | Times Cited: 13
Yanbin Wang, Wenrui Ma, Haitao Xu, et al.
Applied Sciences (2023) Vol. 13, Iss. 13, pp. 7429-7429
Open Access | Times Cited: 13
The State of the Art in AI-Based Phishing Detection: A Systematic Literature Review
Mohammed Fahad Alghenaim, Gamal Alkawsi, Christopher R. Barnhart
Studies in computational intelligence (2025), pp. 431-458
Closed Access
Mohammed Fahad Alghenaim, Gamal Alkawsi, Christopher R. Barnhart
Studies in computational intelligence (2025), pp. 431-458
Closed Access
Multiple model visual feature embedding and selection method for an efficient oncular disease classification
Isha Kansal, Vikas Khullar, Preeti Sharma, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Isha Kansal, Vikas Khullar, Preeti Sharma, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Continuous Multi-Task Pre-Training for Malicious Url Detection and Webpage Classification
Yujie Li, Yiwei Liu, Peiyue Li, et al.
(2025)
Closed Access
Yujie Li, Yiwei Liu, Peiyue Li, et al.
(2025)
Closed Access
Impact of detection accuracy rates on phishing email spikes: Towards more effective mitigation
Sunday Eric Adewumi, Uchenna Ani
Information Security Journal A Global Perspective (2025), pp. 1-38
Open Access
Sunday Eric Adewumi, Uchenna Ani
Information Security Journal A Global Perspective (2025), pp. 1-38
Open Access
A Scalable Phishing Website Detection Model Based on Dual-Branch TCN and Mask Attention
Lixia Xie, Hao Zhang, Hongyu Yang, et al.
Computer Networks (2025), pp. 111230-111230
Closed Access
Lixia Xie, Hao Zhang, Hongyu Yang, et al.
Computer Networks (2025), pp. 111230-111230
Closed Access
Comprehensive phishing detection: A multi-channel approach with variants TCN fusion leveraging URL and HTML features
Ali Aljofey, Saifullahi Aminu Bello, Jian Lü, et al.
Journal of Network and Computer Applications (2025), pp. 104170-104170
Closed Access
Ali Aljofey, Saifullahi Aminu Bello, Jian Lü, et al.
Journal of Network and Computer Applications (2025), pp. 104170-104170
Closed Access
Sufficiency of Ensemble Machine Learning Methods for Phishing Websites Detection
Yi Wei, Yuji SEKIYA
IEEE Access (2022) Vol. 10, pp. 124103-124113
Open Access | Times Cited: 20
Yi Wei, Yuji SEKIYA
IEEE Access (2022) Vol. 10, pp. 124103-124113
Open Access | Times Cited: 20
PhiKitA: Phishing Kit Attacks Dataset for Phishing Websites Identification
F. Castaño, Eduardo Fidalgo, Rocío Aláiz-Rodríguez, et al.
IEEE Access (2023) Vol. 11, pp. 40779-40789
Open Access | Times Cited: 12
F. Castaño, Eduardo Fidalgo, Rocío Aláiz-Rodríguez, et al.
IEEE Access (2023) Vol. 11, pp. 40779-40789
Open Access | Times Cited: 12