
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
ICSA: Intelligent chatbot security assistant using Text-CNN and multi-phase real-time defense against SNS phishing attacks
Jinsol Yoo, Youngho Cho
Expert Systems with Applications (2022) Vol. 207, pp. 117893-117893
Closed Access | Times Cited: 14
Jinsol Yoo, Youngho Cho
Expert Systems with Applications (2022) Vol. 207, pp. 117893-117893
Closed Access | Times Cited: 14
Showing 14 citing articles:
Challenges and Opportunities of Text-Based Emotion Detection: A Survey
Abdullah Al Maruf, Fahima Khanam, Md. Mahmudul Haque, et al.
IEEE Access (2024) Vol. 12, pp. 18416-18450
Open Access | Times Cited: 18
Abdullah Al Maruf, Fahima Khanam, Md. Mahmudul Haque, et al.
IEEE Access (2024) Vol. 12, pp. 18416-18450
Open Access | Times Cited: 18
DDoS: Distributed denial of service attack in communication standard vulnerabilities in smart grid applications and cyber security with recent developments
Mohammad Kamrul Hasan, A.K.M. Ahasan Habib, Shayla Islam, et al.
Energy Reports (2023) Vol. 9, pp. 1318-1326
Open Access | Times Cited: 28
Mohammad Kamrul Hasan, A.K.M. Ahasan Habib, Shayla Islam, et al.
Energy Reports (2023) Vol. 9, pp. 1318-1326
Open Access | Times Cited: 28
Artificial Intelligence-Enabled Chatbots in Mental Health: A Systematic Review
Батырхан Омаров, Sergazi Narynov, Zhandos Zhumanov
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 74, Iss. 3, pp. 5105-5122
Open Access | Times Cited: 28
Батырхан Омаров, Sergazi Narynov, Zhandos Zhumanov
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 74, Iss. 3, pp. 5105-5122
Open Access | Times Cited: 28
Social Engineering in the Era of AI: Unmasking the Changing Face of Cyber Threats
Mohamed Chawki
Studies in computational intelligence (2025), pp. 1-24
Closed Access
Mohamed Chawki
Studies in computational intelligence (2025), pp. 1-24
Closed Access
Multi-Label Classification of Complaint Texts: Civil Aviation Service Quality Case Study
Huali Cai, Xinhe Shao, Pengpeng Zhou, et al.
Electronics (2025) Vol. 14, Iss. 3, pp. 434-434
Open Access
Huali Cai, Xinhe Shao, Pengpeng Zhou, et al.
Electronics (2025) Vol. 14, Iss. 3, pp. 434-434
Open Access
Application of a digital intelligent assistant to support industrial processes: the case of adaptive allocation in the face of cyber attacks
Silvia Colabianchi
Procedia Computer Science (2025) Vol. 253, pp. 1555-1564
Open Access
Silvia Colabianchi
Procedia Computer Science (2025) Vol. 253, pp. 1555-1564
Open Access
Detection of phishing addresses and pages with a data set balancing approach by generative adversarial network (GAN ) and convolutional neural network (CNN ) optimized with swarm intelligence
Somayyeh Jafari, Nasrin Aghaee‐Maybodi
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 11
Closed Access | Times Cited: 3
Somayyeh Jafari, Nasrin Aghaee‐Maybodi
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 11
Closed Access | Times Cited: 3
Chatbots: A Framework for Improving Information Security Behaviours using ChatGPT
Tapiwa Gundu
IFIP advances in information and communication technology (2023), pp. 418-431
Closed Access | Times Cited: 8
Tapiwa Gundu
IFIP advances in information and communication technology (2023), pp. 418-431
Closed Access | Times Cited: 8
A cyber defense system against phishing attacks with deep learning game theory and LSTM-CNN with African vulture optimization algorithm (AVOA)
Mustafa Ahmed Elberri, Ümit Tokeşer, Javad Rahebi, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2583-2606
Open Access | Times Cited: 2
Mustafa Ahmed Elberri, Ümit Tokeşer, Javad Rahebi, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2583-2606
Open Access | Times Cited: 2
UCF-PKS: Unforeseen Consumer Fraud Detection With Prior Knowledge and Semantic Features
Shanyan Lai, Junfang Wu, Chunyang Ye, et al.
IEEE Transactions on Computational Social Systems (2024) Vol. 11, Iss. 4, pp. 5454-5467
Closed Access | Times Cited: 1
Shanyan Lai, Junfang Wu, Chunyang Ye, et al.
IEEE Transactions on Computational Social Systems (2024) Vol. 11, Iss. 4, pp. 5454-5467
Closed Access | Times Cited: 1
Thai-language chatbot security: Detecting instruction attacks with XLM-RoBERTa and Bi-GRU
Vajratiya Vajrobol, Brij B. Gupta, Akshat Gaurav
Computers & Electrical Engineering (2024) Vol. 116, pp. 109186-109186
Closed Access | Times Cited: 1
Vajratiya Vajrobol, Brij B. Gupta, Akshat Gaurav
Computers & Electrical Engineering (2024) Vol. 116, pp. 109186-109186
Closed Access | Times Cited: 1
Combining statistical dialog management and intent recognition for enhanced response selection
David Griol, Zoraida Callejas
Logic Journal of IGPL (2024)
Open Access | Times Cited: 1
David Griol, Zoraida Callejas
Logic Journal of IGPL (2024)
Open Access | Times Cited: 1
ВПРОВАДЖЕННЯ ПРОГРАМНИХ ТА НЕЙРОМЕРЕЖЕВИХ АЛГОРИТМІВ МАШИННОГО АНАЛІЗУ ТЕКСТОВИХ ДАНИХ ФІНАНСОВОЇ АНАЛІТИКИ
В’ячеслав Іваненко
Наука і техніка сьогодні (2024), Iss. 7(35)
Open Access
В’ячеслав Іваненко
Наука і техніка сьогодні (2024), Iss. 7(35)
Open Access
Data Redundancy, Data Phishing, and Data Cloud Backup
Meghu Lokesh, A.Keerthi Devi, U Dinesh Chowdary, et al.
(2023), pp. 1-6
Closed Access
Meghu Lokesh, A.Keerthi Devi, U Dinesh Chowdary, et al.
(2023), pp. 1-6
Closed Access