
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A URL-Based Social Semantic Attacks Detection With Character-Aware Language Model
May Almousa, Mohd Anwar
IEEE Access (2023) Vol. 11, pp. 10654-10663
Open Access | Times Cited: 10
May Almousa, Mohd Anwar
IEEE Access (2023) Vol. 11, pp. 10654-10663
Open Access | Times Cited: 10
Showing 10 citing articles:
Morphological transfer learning based brain tumor detection using YOLOv5
Sanat Kumar Pandey, Ashish Kumar Bhandari
Multimedia Tools and Applications (2023) Vol. 83, Iss. 16, pp. 49343-49366
Closed Access | Times Cited: 5
Sanat Kumar Pandey, Ashish Kumar Bhandari
Multimedia Tools and Applications (2023) Vol. 83, Iss. 16, pp. 49343-49366
Closed Access | Times Cited: 5
Detection of fake web pages and phishing attacks with rabbit optimization algorithm
Leyla Shahba, Ahmad Heidary-Sharifabad, Mohammadreza Mollahoseini Ardakani
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access | Times Cited: 1
Leyla Shahba, Ahmad Heidary-Sharifabad, Mohammadreza Mollahoseini Ardakani
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access | Times Cited: 1
A Generalized Two-Level Ensemble Method for Spam Mail Detection
C. Nagaraju B. Aruna Kumari
Deleted Journal (2024) Vol. 20, Iss. 2, pp. 1570-1579
Open Access
C. Nagaraju B. Aruna Kumari
Deleted Journal (2024) Vol. 20, Iss. 2, pp. 1570-1579
Open Access
Detection of adversarial phishing attack using machine learning techniques
K. Muthamil Sudar, M Rohan, K. Vignesh
Sadhana (2024) Vol. 49, Iss. 3
Closed Access
K. Muthamil Sudar, M Rohan, K. Vignesh
Sadhana (2024) Vol. 49, Iss. 3
Closed Access
Malware Detection System Using Natural Language Processing Based on Website Links
Lare Adeola, Celestine Iwendi
(2024), pp. 1-5
Closed Access
Lare Adeola, Celestine Iwendi
(2024), pp. 1-5
Closed Access
Social Engineering Attacks in Industrial Internet of Things and Smart Industry
Muhammad Muzamil Aslam, Kassim Kalinaki, Ali Tufail, et al.
(2024), pp. 389-412
Closed Access
Muhammad Muzamil Aslam, Kassim Kalinaki, Ali Tufail, et al.
(2024), pp. 389-412
Closed Access
Survey of Transformer-Based Malicious Software Detection Systems
M. M. Al-Shomrani, Aiiad Albeshri, Badraddin Alturki, et al.
Electronics (2024) Vol. 13, Iss. 23, pp. 4677-4677
Open Access
M. M. Al-Shomrani, Aiiad Albeshri, Badraddin Alturki, et al.
Electronics (2024) Vol. 13, Iss. 23, pp. 4677-4677
Open Access
Staying ahead of phishers: a review of recent advances and emerging methodologies in phishing detection
S. Kavya, D. Sumathi
Artificial Intelligence Review (2024) Vol. 58, Iss. 2
Open Access
S. Kavya, D. Sumathi
Artificial Intelligence Review (2024) Vol. 58, Iss. 2
Open Access
Performance Evaluation of Machine Learning Algorithms for Website Defacement Attack Detection
Atul Kumar, Ishu Sharma
(2023), pp. 1-6
Closed Access | Times Cited: 1
Atul Kumar, Ishu Sharma
(2023), pp. 1-6
Closed Access | Times Cited: 1
A Review on Malicious URLs Detection Using Machine Learning Methods
Tasfia Tabassum, Md. Mahbubul Alam, Md. Sabbir Ejaz, et al.
Journal of Engineering Research and Reports (2023) Vol. 25, Iss. 12, pp. 76-88
Open Access | Times Cited: 1
Tasfia Tabassum, Md. Mahbubul Alam, Md. Sabbir Ejaz, et al.
Journal of Engineering Research and Reports (2023) Vol. 25, Iss. 12, pp. 76-88
Open Access | Times Cited: 1