
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Phishing websites detection using a novel multipurpose dataset and web technologies features
Manuel Sánchez-Paniagua, Eduardo Fidalgo, Enrique Alegre, et al.
Expert Systems with Applications (2022) Vol. 207, pp. 118010-118010
Open Access | Times Cited: 18
Manuel Sánchez-Paniagua, Eduardo Fidalgo, Enrique Alegre, et al.
Expert Systems with Applications (2022) Vol. 207, pp. 118010-118010
Open Access | Times Cited: 18
Showing 18 citing articles:
An application for predicting phishing attacks: A case of implementing a support vector machine learning model
Emmanuel Song Shombot, Gilles Dusserre, Robert Bešťák, et al.
Cyber Security and Applications (2024) Vol. 2, pp. 100036-100036
Open Access | Times Cited: 8
Emmanuel Song Shombot, Gilles Dusserre, Robert Bešťák, et al.
Cyber Security and Applications (2024) Vol. 2, pp. 100036-100036
Open Access | Times Cited: 8
The applicability of a hybrid framework for automated phishing detection
Rob J. van der Geest, Giuseppe Cascavilla, Joris Hulstijn, et al.
Computers & Security (2024) Vol. 139, pp. 103736-103736
Open Access | Times Cited: 5
Rob J. van der Geest, Giuseppe Cascavilla, Joris Hulstijn, et al.
Computers & Security (2024) Vol. 139, pp. 103736-103736
Open Access | Times Cited: 5
Comprehensive phishing detection: A multi-channel approach with variants TCN fusion leveraging URL and HTML features
Ali Aljofey, Saifullahi Aminu Bello, Jian Lü, et al.
Journal of Network and Computer Applications (2025), pp. 104170-104170
Closed Access
Ali Aljofey, Saifullahi Aminu Bello, Jian Lü, et al.
Journal of Network and Computer Applications (2025), pp. 104170-104170
Closed Access
Predicting Fraud in Financial Payment Services through Optimized Hyper-Parameter-Tuned XGBoost Model
Surjeet Dalal, Bijeta Seth, Magdalena Rădulescu, et al.
Mathematics (2022) Vol. 10, Iss. 24, pp. 4679-4679
Open Access | Times Cited: 21
Surjeet Dalal, Bijeta Seth, Magdalena Rădulescu, et al.
Mathematics (2022) Vol. 10, Iss. 24, pp. 4679-4679
Open Access | Times Cited: 21
PhiKitA: Phishing Kit Attacks Dataset for Phishing Websites Identification
F. Castaño, Eduardo Fidalgo, Rocío Aláiz-Rodríguez, et al.
IEEE Access (2023) Vol. 11, pp. 40779-40789
Open Access | Times Cited: 12
F. Castaño, Eduardo Fidalgo, Rocío Aláiz-Rodríguez, et al.
IEEE Access (2023) Vol. 11, pp. 40779-40789
Open Access | Times Cited: 12
Detection of phishing addresses and pages with a data set balancing approach by generative adversarial network (GAN ) and convolutional neural network (CNN ) optimized with swarm intelligence
Somayyeh Jafari, Nasrin Aghaee‐Maybodi
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 11
Closed Access | Times Cited: 3
Somayyeh Jafari, Nasrin Aghaee‐Maybodi
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 11
Closed Access | Times Cited: 3
COPS: A Compact On-Device Pipeline for Real-Time Smishing Detection
B S S Harichandana, Sumit Kumar, Manjunath Bhimappa Ujjinakoppa, et al.
(2024)
Closed Access | Times Cited: 2
B S S Harichandana, Sumit Kumar, Manjunath Bhimappa Ujjinakoppa, et al.
(2024)
Closed Access | Times Cited: 2
Constructs of Deceit: Exploring Nuances in Modern Social Engineering Attacks
Mohammad Ali Tofighi, Behzad Ousat, Javad Zandi, et al.
Lecture notes in computer science (2024), pp. 107-127
Closed Access | Times Cited: 2
Mohammad Ali Tofighi, Behzad Ousat, Javad Zandi, et al.
Lecture notes in computer science (2024), pp. 107-127
Closed Access | Times Cited: 2
URL based Phishing Detection using Machine Learning
Mohd Shoaib, M. Sarosh Umar
2021 5th International Conference on Information Systems and Computer Networks (ISCON) (2023), pp. 1-7
Closed Access | Times Cited: 5
Mohd Shoaib, M. Sarosh Umar
2021 5th International Conference on Information Systems and Computer Networks (ISCON) (2023), pp. 1-7
Closed Access | Times Cited: 5
Phishing uniform resource locator detection using machine learning: A step towards secure system
Shilpa Mahajan
Security and Privacy (2023) Vol. 6, Iss. 6
Open Access | Times Cited: 4
Shilpa Mahajan
Security and Privacy (2023) Vol. 6, Iss. 6
Open Access | Times Cited: 4
HCNN-LSTM: Hybrid Convolutional Neural Network with Long Short-Term Memory Integrated for Legitimate Web Prediction
Candra Zonyfar, Jung-Been Lee, Jeong‐Dong Kim
Journal of Web Engineering (2023)
Open Access | Times Cited: 3
Candra Zonyfar, Jung-Been Lee, Jeong‐Dong Kim
Journal of Web Engineering (2023)
Open Access | Times Cited: 3
Detection of Legitimate and Phishing Websites using Machine Learning
Anagani Kanaka Durga Bhavani, R. Sai Lakshmi, P.A. Harsha Vardhini, et al.
(2023) Vol. 37, pp. 366-371
Closed Access | Times Cited: 2
Anagani Kanaka Durga Bhavani, R. Sai Lakshmi, P.A. Harsha Vardhini, et al.
(2023) Vol. 37, pp. 366-371
Closed Access | Times Cited: 2
A Hybrid Transformer Ensemble Approach for Phishing Website Detection
Krishna Sahithi Mandapati, Meesala Sravani, Divya Maddela, et al.
(2023), pp. 1-8
Closed Access | Times Cited: 2
Krishna Sahithi Mandapati, Meesala Sravani, Divya Maddela, et al.
(2023), pp. 1-8
Closed Access | Times Cited: 2
Detection Of phishing URLs using a Term Frequency Inverse Document Frequency (TF-IDF).
M - Sibhathallah, Sathya Srinivas D -
International Journal For Multidisciplinary Research (2024) Vol. 6, Iss. 3
Open Access
M - Sibhathallah, Sathya Srinivas D -
International Journal For Multidisciplinary Research (2024) Vol. 6, Iss. 3
Open Access
Enhanced Phishing Website Detection Using Dual-Layer CNN and GRU with Attention Mechanism and Lexical NLP Features
Santosh Kumar Birthriya, Priyanka Ahlawat, Ankit Kumar Jain
SN Computer Science (2024) Vol. 5, Iss. 7
Closed Access
Santosh Kumar Birthriya, Priyanka Ahlawat, Ankit Kumar Jain
SN Computer Science (2024) Vol. 5, Iss. 7
Closed Access
Intelligent Methods in Phishing Website Detection: A Systematic Literature Review
Yeganeh Sattari, Gholamali Montazer
Research Square (Research Square) (2023)
Open Access | Times Cited: 1
Yeganeh Sattari, Gholamali Montazer
Research Square (Research Square) (2023)
Open Access | Times Cited: 1
Text Matching Technique-based Intelligent Web Crawler in Hybrid Mode
Amol Subhash Dange, Manjunath Swamy, Byranahalli Eraiah, et al.
International journal of intelligent engineering and systems (2023) Vol. 16, Iss. 6, pp. 706-717
Open Access
Amol Subhash Dange, Manjunath Swamy, Byranahalli Eraiah, et al.
International journal of intelligent engineering and systems (2023) Vol. 16, Iss. 6, pp. 706-717
Open Access
Interpretable Fuzzy System for Malicious Domain Classification Using Projection Neural Network
Rajan Prasad, Praveen Kumar Shukla
International Journal of Wireless and Microwave Technologies (2023) Vol. 13, Iss. 6, pp. 1-14
Open Access
Rajan Prasad, Praveen Kumar Shukla
International Journal of Wireless and Microwave Technologies (2023) Vol. 13, Iss. 6, pp. 1-14
Open Access
Detection of Healthcare Phishing Websites Using Machine Learning
Deepak Rao Khadatkar, Yugmani Sahu, Nivesh Pole, et al.
(2023), pp. 1-6
Closed Access
Deepak Rao Khadatkar, Yugmani Sahu, Nivesh Pole, et al.
(2023), pp. 1-6
Closed Access