OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Utilizing Convolutional Neural Networks and Word Embeddings for Early-Stage Recognition of Persuasion in Chat-Based Social Engineering Attacks
Nikolaos Tsinganos, Ioannis Mavridis, Dimitris Gritzalis
IEEE Access (2022) Vol. 10, pp. 108517-108529
Open Access | Times Cited: 14

Showing 14 citing articles:

Internet-Based Social Engineering Psychology, Attacks, and Defenses: A Survey
Theodore Longtchi, Rosana Montañez Rodriguez, Laith Al-Shawaf, et al.
Proceedings of the IEEE (2024) Vol. 112, Iss. 3, pp. 210-246
Closed Access | Times Cited: 7

Multilayer Perceptron of Occlusion and Pose‐Sensitive Ear Attributes for Social Engineering Attack Mitigation
Olaitan Olaleye, Oluwasefunmi Arogundade, Adebayo Abayomi‐Alli, et al.
(2025), pp. 291-313
Closed Access

Leveraging Dialogue State Tracking for Zero-Shot Chat-Based Social Engineering Attack Recognition
Nikolaos Tsinganos, Panagiotis Fouliras, Ioannis Mavridis
Applied Sciences (2023) Vol. 13, Iss. 8, pp. 5110-5110
Open Access | Times Cited: 10

CSE-ARS: Deep Learning-Based Late Fusion of Multimodal Information for Chat-Based Social Engineering Attack Recognition
Nikolaos Tsinganos, Panagiotis Fouliras, Ioannis Mavridis, et al.
IEEE Access (2024) Vol. 12, pp. 16072-16088
Open Access | Times Cited: 1

Integrating Machine Learning for Sustaining Cybersecurity in Digital Banks
Muath Asmar, Alia Tuqan
Heliyon (2024), pp. e37571-e37571
Open Access | Times Cited: 1

Decoding persuasion: a survey on ML and NLP methods for the study of online persuasion
Davide Bassi, Søren Fomsgaard, Martín Pereira-Fariña
Frontiers in Communication (2024) Vol. 9
Open Access | Times Cited: 1

A Comprehensive Survey of various Cyber Attacks
Ajeet Kumar Sharma, Rakesh Kr. Galav, Bhisham Sharma
2021 5th International Conference on Information Systems and Computer Networks (ISCON) (2023), pp. 1-4
Closed Access | Times Cited: 2

Phishing attack detection using gradient boosting
Sushmitha R. Aslin
i-manager s Journal on Digital Forensics & Cyber Security (2024) Vol. 2, Iss. 1, pp. 33-33
Closed Access

Beyond Technical Barriers: A Multidimensional Conceptual Framework for Understanding and Countering Cyber Scam Susceptibility
Abdulbasit A. Darem, Tareq M. Alkhaldi, Muteeb Alahmari, et al.
International Journal of Human-Computer Interaction (2024), pp. 1-26
Closed Access

Social Engineering Attacks in Industrial Internet of Things and Smart Industry
Muhammad Muzamil Aslam, Kassim Kalinaki, Ali Tufail, et al.
(2024), pp. 389-412
Closed Access

Mavericks at ArAIEval Shared Task: Towards a Safer Digital Space - Transformer Ensemble Models Tackling Deception and Persuasion
Sudeep Mangalvedhekar, Kshitij Deshpande, Yash Patwardhan, et al.
(2023), pp. 513-518
Open Access | Times Cited: 1

SOCIALBERT a Transformer based Model Used for Detection of Social Engineering Characteristics
Michael Abobor, Darsana Josyula
2021 International Conference on Computational Science and Computational Intelligence (CSCI) (2023), pp. 174-178
Closed Access | Times Cited: 1

Computational Approaches to Persuasion Detection and Potential of Use in Social Engineering
Subia Ansari, Mohammad Zaiyan Alam
Lecture notes in networks and systems (2023), pp. 394-409
Closed Access

Page 1

Scroll to top