
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Sustaining accurate detection of phishing URLs using SDN and feature selection approaches
Raniyah Wazirali, Rami Ahmad, Ashraf Abu-Ein
Computer Networks (2021) Vol. 201, pp. 108591-108591
Closed Access | Times Cited: 28
Raniyah Wazirali, Rami Ahmad, Ashraf Abu-Ein
Computer Networks (2021) Vol. 201, pp. 108591-108591
Closed Access | Times Cited: 28
Showing 1-25 of 28 citing articles:
Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues
Rami Ahmad, Raniyah Wazirali, Tarik Abu-Ain
Sensors (2022) Vol. 22, Iss. 13, pp. 4730-4730
Open Access | Times Cited: 126
Rami Ahmad, Raniyah Wazirali, Tarik Abu-Ain
Sensors (2022) Vol. 22, Iss. 13, pp. 4730-4730
Open Access | Times Cited: 126
Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review
Yazeed Yasin Ghadi, Tehseen Mazhar, Tamara Al Shloul, et al.
IEEE Access (2024) Vol. 12, pp. 12699-12719
Open Access | Times Cited: 20
Yazeed Yasin Ghadi, Tehseen Mazhar, Tamara Al Shloul, et al.
IEEE Access (2024) Vol. 12, pp. 12699-12719
Open Access | Times Cited: 20
Optimization Algorithms for Wireless Sensor Networks Node Localization: An Overview
Rami Ahmad, Waseem Alhasan, Raniyah Wazirali, et al.
IEEE Access (2024) Vol. 12, pp. 50459-50488
Open Access | Times Cited: 16
Rami Ahmad, Waseem Alhasan, Raniyah Wazirali, et al.
IEEE Access (2024) Vol. 12, pp. 50459-50488
Open Access | Times Cited: 16
Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning
Mohammed Alsaedi, Fuad A. Ghaleb, Faisal Saeed, et al.
Sensors (2022) Vol. 22, Iss. 9, pp. 3373-3373
Open Access | Times Cited: 56
Mohammed Alsaedi, Fuad A. Ghaleb, Faisal Saeed, et al.
Sensors (2022) Vol. 22, Iss. 9, pp. 3373-3373
Open Access | Times Cited: 56
Survey on Joint Paradigm of 5G and SDN Emerging Mobile Technologies: Architecture, Security, Challenges and Research Directions
Syed Hussain Ali Kazmi, Faizan Qamar, Rosilah Hassan, et al.
Wireless Personal Communications (2023) Vol. 130, Iss. 4, pp. 2753-2800
Open Access | Times Cited: 36
Syed Hussain Ali Kazmi, Faizan Qamar, Rosilah Hassan, et al.
Wireless Personal Communications (2023) Vol. 130, Iss. 4, pp. 2753-2800
Open Access | Times Cited: 36
Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction
Fatma Foad Ashrif, Elankovan Sundararajan, Rami Ahmad, et al.
Journal of Network and Computer Applications (2023) Vol. 221, pp. 103759-103759
Open Access | Times Cited: 25
Fatma Foad Ashrif, Elankovan Sundararajan, Rami Ahmad, et al.
Journal of Network and Computer Applications (2023) Vol. 221, pp. 103759-103759
Open Access | Times Cited: 25
A SYSTEMATIC LITERATURE REVIEW: RECURSIVE FEATURE ELIMINATION ALGORITHMS
Arif Mudi Priyatno, Triyanna Widiyaningtyas
JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) (2024) Vol. 9, Iss. 2, pp. 196-207
Open Access | Times Cited: 13
Arif Mudi Priyatno, Triyanna Widiyaningtyas
JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) (2024) Vol. 9, Iss. 2, pp. 196-207
Open Access | Times Cited: 13
Digital-care in next generation networks: Requirements and future directions
Rami Ahmad, Matti Hämäläinen, Raniyah Wazirali, et al.
Computer Networks (2023) Vol. 224, pp. 109599-109599
Open Access | Times Cited: 18
Rami Ahmad, Matti Hämäläinen, Raniyah Wazirali, et al.
Computer Networks (2023) Vol. 224, pp. 109599-109599
Open Access | Times Cited: 18
PhishNot: A Cloud-Based Machine-Learning Approach to Phishing URL Detection
Mohammed M. Alani, Hissam Tawfik
Computer Networks (2022) Vol. 218, pp. 109407-109407
Closed Access | Times Cited: 25
Mohammed M. Alani, Hissam Tawfik
Computer Networks (2022) Vol. 218, pp. 109407-109407
Closed Access | Times Cited: 25
Two-Level Sensor Self-Calibration Based on Interpolation and Autoregression for Low-Cost Wireless Sensor Networks
Rami Ahmad, Bernhard Rinner, Raniyah Wazirali, et al.
IEEE Sensors Journal (2023) Vol. 23, Iss. 20, pp. 25242-25253
Closed Access | Times Cited: 15
Rami Ahmad, Bernhard Rinner, Raniyah Wazirali, et al.
IEEE Sensors Journal (2023) Vol. 23, Iss. 20, pp. 25242-25253
Closed Access | Times Cited: 15
Smart remote sensing network for disaster management: an overview
Rami Ahmad
Telecommunication Systems (2024) Vol. 87, Iss. 1, pp. 213-237
Closed Access | Times Cited: 4
Rami Ahmad
Telecommunication Systems (2024) Vol. 87, Iss. 1, pp. 213-237
Closed Access | Times Cited: 4
Survey on Joint Paradigm of 5G and SDN Emerging Mobile Technologies: Architecture, Security, Challenges and Research Directions
Syed Hussain Ali Kazmi, Faizan Qamar, Rosilah Hassan, et al.
Research Square (Research Square) (2022)
Open Access | Times Cited: 21
Syed Hussain Ali Kazmi, Faizan Qamar, Rosilah Hassan, et al.
Research Square (Research Square) (2022)
Open Access | Times Cited: 21
A New SDN-Handover Framework for QoS in Heterogeneous Wireless Networks
Tarik Abu-Ain, Rami Ahmad, Raniyah Wazirali, et al.
Arabian Journal for Science and Engineering (2023) Vol. 48, Iss. 8, pp. 10857-10873
Closed Access | Times Cited: 10
Tarik Abu-Ain, Rami Ahmad, Raniyah Wazirali, et al.
Arabian Journal for Science and Engineering (2023) Vol. 48, Iss. 8, pp. 10857-10873
Closed Access | Times Cited: 10
Recent Advancements in Machine Learning for Cybercrime Prediction
Lavanya Elluri, Varun Mandalapu, Piyush Vyas, et al.
Journal of Computer Information Systems (2023), pp. 1-15
Open Access | Times Cited: 10
Lavanya Elluri, Varun Mandalapu, Piyush Vyas, et al.
Journal of Computer Information Systems (2023), pp. 1-15
Open Access | Times Cited: 10
ICSA: Intelligent chatbot security assistant using Text-CNN and multi-phase real-time defense against SNS phishing attacks
Jinsol Yoo, Youngho Cho
Expert Systems with Applications (2022) Vol. 207, pp. 117893-117893
Closed Access | Times Cited: 14
Jinsol Yoo, Youngho Cho
Expert Systems with Applications (2022) Vol. 207, pp. 117893-117893
Closed Access | Times Cited: 14
Graph-based phishing detection: URLGBM model driven by machine learning
Abdelali Elkouay, Najem Moussa, Abdallah Madani
International Journal of Computers and Applications (2024) Vol. 46, Iss. 7, pp. 481-495
Closed Access | Times Cited: 2
Abdelali Elkouay, Najem Moussa, Abdallah Madani
International Journal of Computers and Applications (2024) Vol. 46, Iss. 7, pp. 481-495
Closed Access | Times Cited: 2
SDN as a defence mechanism: a comprehensive survey
Believe Ayodele, Victor Buttigieg
International Journal of Information Security (2023) Vol. 23, Iss. 1, pp. 141-185
Open Access | Times Cited: 4
Believe Ayodele, Victor Buttigieg
International Journal of Information Security (2023) Vol. 23, Iss. 1, pp. 141-185
Open Access | Times Cited: 4
Phishing webpage detection based on global and local visual similarity
Mengli Wang, Lipeng Song, Luyang Li, et al.
Expert Systems with Applications (2024) Vol. 252, pp. 124120-124120
Closed Access | Times Cited: 1
Mengli Wang, Lipeng Song, Luyang Li, et al.
Expert Systems with Applications (2024) Vol. 252, pp. 124120-124120
Closed Access | Times Cited: 1
PDHF: Effective phishing detection model combining optimal artificial and automatic deep features
Erzhou Zhu, Kang Cheng, Zhizheng Zhang, et al.
Computers & Security (2023) Vol. 136, pp. 103561-103561
Closed Access | Times Cited: 3
Erzhou Zhu, Kang Cheng, Zhizheng Zhang, et al.
Computers & Security (2023) Vol. 136, pp. 103561-103561
Closed Access | Times Cited: 3
HCNN-LSTM: Hybrid Convolutional Neural Network with Long Short-Term Memory Integrated for Legitimate Web Prediction
Candra Zonyfar, Jung-Been Lee, Jeong‐Dong Kim
Journal of Web Engineering (2023)
Open Access | Times Cited: 3
Candra Zonyfar, Jung-Been Lee, Jeong‐Dong Kim
Journal of Web Engineering (2023)
Open Access | Times Cited: 3
Multi-Modal Features Representation-Based Convolutional Neural Network Model for Malicious Website Detection
Mohammed Alsaedi, Fuad A. Ghaleb, Faisal Saeed, et al.
IEEE Access (2023) Vol. 12, pp. 7271-7284
Open Access | Times Cited: 3
Mohammed Alsaedi, Fuad A. Ghaleb, Faisal Saeed, et al.
IEEE Access (2023) Vol. 12, pp. 7271-7284
Open Access | Times Cited: 3
An Overview of Problems and Difficulties with ML in WSNs Protection
Piyush Raja, A. Deepak Kumar, Ram Krishna Kumar, et al.
Deleted Journal (2024) Vol. 2, Iss. 2, pp. 245-278
Open Access
Piyush Raja, A. Deepak Kumar, Ram Krishna Kumar, et al.
Deleted Journal (2024) Vol. 2, Iss. 2, pp. 245-278
Open Access
A Reliable Approach for Lightweight Anomaly Detection in Sensors Using Continuous Wavelet Transform and Vector Clustering
Rami Ahmad, Waseem Alhasan, Raniyah Wazirali, et al.
IEEE Sensors Journal (2024) Vol. 24, Iss. 15, pp. 24921-24930
Closed Access
Rami Ahmad, Waseem Alhasan, Raniyah Wazirali, et al.
IEEE Sensors Journal (2024) Vol. 24, Iss. 15, pp. 24921-24930
Closed Access
WEB SPOOFING DEFENSE EMPOWERING USERS WITH PHISHCATCHER'S MACHINE LEARNING
K. Gowsic, S Siranjeevi, Nataliia Shmatko, et al.
ShodhKosh Journal of Visual and Performing Arts (2024) Vol. 5, Iss. 3
Closed Access
K. Gowsic, S Siranjeevi, Nataliia Shmatko, et al.
ShodhKosh Journal of Visual and Performing Arts (2024) Vol. 5, Iss. 3
Closed Access
A heterogeneous stacking ensemble-based security framework for detecting phishing attacks
Basant Subba
(2023), pp. 1-6
Closed Access | Times Cited: 1
Basant Subba
(2023), pp. 1-6
Closed Access | Times Cited: 1