
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
GRUSpam: robust e-mail spam detection using gated recurrent unit (GRU) algorithm
Putra Wanda
International Journal of Information Technology (2023) Vol. 15, Iss. 8, pp. 4315-4322
Closed Access | Times Cited: 4
Putra Wanda
International Journal of Information Technology (2023) Vol. 15, Iss. 8, pp. 4315-4322
Closed Access | Times Cited: 4
Showing 4 citing articles:
Belief-DDoS: stepping up DDoS attack detection model using DBN algorithm
Putra Wanda, Marselina Endah Hiswati
International Journal of Information Technology (2023) Vol. 16, Iss. 1, pp. 271-278
Closed Access | Times Cited: 8
Putra Wanda, Marselina Endah Hiswati
International Journal of Information Technology (2023) Vol. 16, Iss. 1, pp. 271-278
Closed Access | Times Cited: 8
Anomaly detection framework for highly scattered and dynamic data on large-scale networks using AWS
Richa Singh, Nidhi Srivastava, Ashwani Kumar
International Journal of Information Technology (2024)
Closed Access | Times Cited: 2
Richa Singh, Nidhi Srivastava, Ashwani Kumar
International Journal of Information Technology (2024)
Closed Access | Times Cited: 2
DeepNews: enhancing fake news detection using generative round network (GRN)
Putra Wanda, Mohammad Diqi
International Journal of Information Technology (2024) Vol. 16, Iss. 7, pp. 4289-4298
Closed Access | Times Cited: 1
Putra Wanda, Mohammad Diqi
International Journal of Information Technology (2024) Vol. 16, Iss. 7, pp. 4289-4298
Closed Access | Times Cited: 1
Designing a novel framework of email spam detection using an improved heuristic algorithm and dual-scale feature fusion-based adaptive convolution neural network
V. S. Kadam, Subhash Pingale, S. R. Biradar, et al.
Information Security Journal A Global Perspective (2024), pp. 1-24
Closed Access
V. S. Kadam, Subhash Pingale, S. R. Biradar, et al.
Information Security Journal A Global Perspective (2024), pp. 1-24
Closed Access