OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

PhiKitA: Phishing Kit Attacks Dataset for Phishing Websites Identification
F. Castaño, Eduardo Fidalgo, Rocío Aláiz-Rodríguez, et al.
IEEE Access (2023) Vol. 11, pp. 40779-40789
Open Access | Times Cited: 12

Showing 12 citing articles:

Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites
Wenhao Li, Selvakumar Manickam, Shams Ul Arfeen Laghari, et al.
IEEE Access (2023) Vol. 11, pp. 71925-71939
Open Access | Times Cited: 5

Comparative Phishing Attack Simulations: A Case Study of Critical Information Infrastructure Organization Using Two Different Contents
Patsita Sirawongphatsara, Soawanee Prachayagringkai, Phisit Pornpongtechavanich, et al.
(2023), pp. 278-281
Closed Access | Times Cited: 2

PHISHEILD WEBSITE DETECTION SYSTEM FOR SAFEGUARDING ONLINE SECURITY
Dheer Bauva, Vineet Parmar, Yash Wadajkar, et al.
ASIAN JOURNAL OF CONVERGENCE IN TECHNOLOGY (2024) Vol. 10, Iss. 1, pp. 9-13
Open Access

Phishing Detection in Arabic SMS Messages using Natural Language Processing
Alya Ibrahim, Sarah Alyousef, Hayfa Alajmi, et al.
(2024), pp. 141-146
Closed Access

Phishing attack detection using gradient boosting
Sushmitha R. Aslin
i-manager s Journal on Digital Forensics & Cyber Security (2024) Vol. 2, Iss. 1, pp. 33-33
Closed Access

PD-UHD features: Phishing Detection Approach using uncooked URL, HTML content and Domain Name Features
M Manjula, Venkatesh Venkatesh, R H Kenchamma, et al.
(2024), pp. 1-8
Closed Access

A comprehensive survey on social engineering attacks, countermeasures, case study, and research challenges
Tejal Rathod, Nilesh Kumar Jadav, Sudeep Tanwar, et al.
Information Processing & Management (2024) Vol. 62, Iss. 1, pp. 103928-103928
Closed Access

Enhancing Network Security: A Study on Phishing Threats and Countermeasures
Ilavendhan Anandaraj, B. Nandhitha
Lecture notes in electrical engineering (2024), pp. 191-201
Closed Access

Factors Influencing Frameworks for Social Cybersecurity Management. A Systematic Literature Review
Edgar Rodriguez, José Santisteban, Vicente Morales, et al.
Lecture notes in networks and systems (2024), pp. 162-179
Closed Access

The Rise of Sophisticated Phishing. How AI Fuels Cybercrime
Patricia Riurean, George Bolog, Simona Riurean
Journal of Digital Science (2024) Vol. 6, Iss. 2, pp. 15-25
Closed Access

Page 1

Scroll to top