
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Recent Advancements in Machine Learning for Cybercrime Prediction
Lavanya Elluri, Varun Mandalapu, Piyush Vyas, et al.
Journal of Computer Information Systems (2023), pp. 1-15
Open Access | Times Cited: 10
Lavanya Elluri, Varun Mandalapu, Piyush Vyas, et al.
Journal of Computer Information Systems (2023), pp. 1-15
Open Access | Times Cited: 10
Showing 10 citing articles:
Enhancing Phishing Detection: A Novel Hybrid Deep Learning Framework for Cybercrime Forensics
Faisal S. Alsubaei, Abdulwahab Ali Almazroi, Nasir Ayub
IEEE Access (2024) Vol. 12, pp. 8373-8389
Open Access | Times Cited: 11
Faisal S. Alsubaei, Abdulwahab Ali Almazroi, Nasir Ayub
IEEE Access (2024) Vol. 12, pp. 8373-8389
Open Access | Times Cited: 11
Harnessing Machine Learning Intelligence Against Cyber Threats
Bhupinder Singh, Christian Kaunert, Ritu Gautam
Advances in business strategy and competitive advantage book series (2024), pp. 319-352
Closed Access | Times Cited: 4
Bhupinder Singh, Christian Kaunert, Ritu Gautam
Advances in business strategy and competitive advantage book series (2024), pp. 319-352
Closed Access | Times Cited: 4
AlgoXSSF: Detection and Analysis of Cross-Site Request Forgery (XSRF) and Cross-Site Scripting (XSS) Attacks via Machine Learning Algorithms
Naresh Kshetri, Dilip Kumar, James Hutson, et al.
(2024), pp. 1-8
Open Access | Times Cited: 1
Naresh Kshetri, Dilip Kumar, James Hutson, et al.
(2024), pp. 1-8
Open Access | Times Cited: 1
Confronting the Offensive Stalking Risks: With Standing Cyber Stalkers
S M Kowsik Godavarthi, Surya Vishnu Ganimisetty, Sreekar Palanati, et al.
2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (2024), pp. 1-7
Closed Access | Times Cited: 1
S M Kowsik Godavarthi, Surya Vishnu Ganimisetty, Sreekar Palanati, et al.
2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (2024), pp. 1-7
Closed Access | Times Cited: 1
Research on Feature Extraction Strategies for Cybercrime Crimes Combined with Deep Learning and Their Probabilistic Models
Lei Yang, Lingyu Liao
Applied Mathematics and Nonlinear Sciences (2024) Vol. 9, Iss. 1
Open Access
Lei Yang, Lingyu Liao
Applied Mathematics and Nonlinear Sciences (2024) Vol. 9, Iss. 1
Open Access
Exploring Generative Artificial Intelligence Research: A Bibliometric Analysis Approach
Rahul Dwivedi, Lavanya Elluri
IEEE Access (2024) Vol. 12, pp. 119884-119902
Open Access
Rahul Dwivedi, Lavanya Elluri
IEEE Access (2024) Vol. 12, pp. 119884-119902
Open Access
Scouting the Juncture of Internet of Things (IoT), Deep Learning, and Cybercrime
Bhupinder Singh, Christian Kaunert
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 363-398
Closed Access
Bhupinder Singh, Christian Kaunert
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 363-398
Closed Access
Exploring Effective Strategies for Combatting Cybercrime and Intersection of IoT, Deep Learning
Bhupinder Singh, Christian Kaunert
Advances in human and social aspects of technology book series (2024), pp. 141-172
Closed Access
Bhupinder Singh, Christian Kaunert
Advances in human and social aspects of technology book series (2024), pp. 141-172
Closed Access
Navigating Cryptocurrency Regulation
Bhupinder Singh, Christian Kaunert
Advances in hospitality, tourism and the services industry (AHTSI) book series (2024), pp. 133-160
Closed Access
Bhupinder Singh, Christian Kaunert
Advances in hospitality, tourism and the services industry (AHTSI) book series (2024), pp. 133-160
Closed Access
Towards Building Generalizable Models for Malware Detection
Jihoon Shin, Emilia Rivas, Daniel Lucio, et al.
2021 IEEE International Conference on Big Data (Big Data) (2024), pp. 5656-5663
Closed Access
Jihoon Shin, Emilia Rivas, Daniel Lucio, et al.
2021 IEEE International Conference on Big Data (Big Data) (2024), pp. 5656-5663
Closed Access