
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
The applicability of a hybrid framework for automated phishing detection
Rob J. van der Geest, Giuseppe Cascavilla, Joris Hulstijn, et al.
Computers & Security (2024) Vol. 139, pp. 103736-103736
Open Access | Times Cited: 5
Rob J. van der Geest, Giuseppe Cascavilla, Joris Hulstijn, et al.
Computers & Security (2024) Vol. 139, pp. 103736-103736
Open Access | Times Cited: 5
Showing 5 citing articles:
Network and cybersecurity applications of defense in adversarial attacks: A state-of-the-art using machine learning and deep learning methods
Yahya Layth Khaleel, Mustafa Abdulfattah Habeeb, A. S. Albahri, et al.
Journal of Intelligent Systems (2024) Vol. 33, Iss. 1
Open Access | Times Cited: 9
Yahya Layth Khaleel, Mustafa Abdulfattah Habeeb, A. S. Albahri, et al.
Journal of Intelligent Systems (2024) Vol. 33, Iss. 1
Open Access | Times Cited: 9
Stacking ensemble classifier for phishing detection: A cyber security model with efficient feature descriptor
L Shammi, Emilin Shyni C
Intelligent Decision Technologies (2025)
Closed Access
L Shammi, Emilin Shyni C
Intelligent Decision Technologies (2025)
Closed Access
Deep Learning-Based Speech and Vision Synthesis to Improve Phishing Attack Detection through a Multi-layer Adaptive Framework
Tosin Ige, Christopher Kiekintveld, Aritran Piplai
(2024)
Open Access | Times Cited: 1
Tosin Ige, Christopher Kiekintveld, Aritran Piplai
(2024)
Open Access | Times Cited: 1
Future Trends and Challenges in Cybersecurity and Generative AI
Azeem Khan, N. Z. Jhanjhi, Dayang H. T. B. A. Haji Hamid, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 491-522
Closed Access
Azeem Khan, N. Z. Jhanjhi, Dayang H. T. B. A. Haji Hamid, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 491-522
Closed Access
MIDAS: Multi-layered Attack Detection Architecture with Decision Optimisation
Kieran Rendall, Alexios Mylonas, Stilianos Vidalis, et al.
Computers & Security (2024) Vol. 148, pp. 104154-104154
Open Access
Kieran Rendall, Alexios Mylonas, Stilianos Vidalis, et al.
Computers & Security (2024) Vol. 148, pp. 104154-104154
Open Access