
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
PhiKitA: Phishing Kit Attacks Dataset for Phishing Websites Identification
F. Castaño, Eduardo Fidalgo, Rocío Aláiz-Rodríguez, et al.
IEEE Access (2023) Vol. 11, pp. 40779-40789
Open Access | Times Cited: 12
F. Castaño, Eduardo Fidalgo, Rocío Aláiz-Rodríguez, et al.
IEEE Access (2023) Vol. 11, pp. 40779-40789
Open Access | Times Cited: 12
Showing 12 citing articles:
Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites
Wenhao Li, Selvakumar Manickam, Shams Ul Arfeen Laghari, et al.
IEEE Access (2023) Vol. 11, pp. 71925-71939
Open Access | Times Cited: 5
Wenhao Li, Selvakumar Manickam, Shams Ul Arfeen Laghari, et al.
IEEE Access (2023) Vol. 11, pp. 71925-71939
Open Access | Times Cited: 5
Comparative Phishing Attack Simulations: A Case Study of Critical Information Infrastructure Organization Using Two Different Contents
Patsita Sirawongphatsara, Soawanee Prachayagringkai, Phisit Pornpongtechavanich, et al.
(2023), pp. 278-281
Closed Access | Times Cited: 2
Patsita Sirawongphatsara, Soawanee Prachayagringkai, Phisit Pornpongtechavanich, et al.
(2023), pp. 278-281
Closed Access | Times Cited: 2
Sectrabank Model to Mitigate Computer Fraud in Electronic Operations through Banking Applications on Android Devices
Jhon Melendez, Jomark Pablo Noriega, Jose Tiznado, et al.
(2024)
Open Access
Jhon Melendez, Jomark Pablo Noriega, Jose Tiznado, et al.
(2024)
Open Access
PHISHEILD WEBSITE DETECTION SYSTEM FOR SAFEGUARDING ONLINE SECURITY
Dheer Bauva, Vineet Parmar, Yash Wadajkar, et al.
ASIAN JOURNAL OF CONVERGENCE IN TECHNOLOGY (2024) Vol. 10, Iss. 1, pp. 9-13
Open Access
Dheer Bauva, Vineet Parmar, Yash Wadajkar, et al.
ASIAN JOURNAL OF CONVERGENCE IN TECHNOLOGY (2024) Vol. 10, Iss. 1, pp. 9-13
Open Access
Phishing Detection in Arabic SMS Messages using Natural Language Processing
Alya Ibrahim, Sarah Alyousef, Hayfa Alajmi, et al.
(2024), pp. 141-146
Closed Access
Alya Ibrahim, Sarah Alyousef, Hayfa Alajmi, et al.
(2024), pp. 141-146
Closed Access
Phishing attack detection using gradient boosting
Sushmitha R. Aslin
i-manager s Journal on Digital Forensics & Cyber Security (2024) Vol. 2, Iss. 1, pp. 33-33
Closed Access
Sushmitha R. Aslin
i-manager s Journal on Digital Forensics & Cyber Security (2024) Vol. 2, Iss. 1, pp. 33-33
Closed Access
PD-UHD features: Phishing Detection Approach using uncooked URL, HTML content and Domain Name Features
M Manjula, Venkatesh Venkatesh, R H Kenchamma, et al.
(2024), pp. 1-8
Closed Access
M Manjula, Venkatesh Venkatesh, R H Kenchamma, et al.
(2024), pp. 1-8
Closed Access
A comprehensive survey on social engineering attacks, countermeasures, case study, and research challenges
Tejal Rathod, Nilesh Kumar Jadav, Sudeep Tanwar, et al.
Information Processing & Management (2024) Vol. 62, Iss. 1, pp. 103928-103928
Closed Access
Tejal Rathod, Nilesh Kumar Jadav, Sudeep Tanwar, et al.
Information Processing & Management (2024) Vol. 62, Iss. 1, pp. 103928-103928
Closed Access
Enhancing Network Security: A Study on Phishing Threats and Countermeasures
Ilavendhan Anandaraj, B. Nandhitha
Lecture notes in electrical engineering (2024), pp. 191-201
Closed Access
Ilavendhan Anandaraj, B. Nandhitha
Lecture notes in electrical engineering (2024), pp. 191-201
Closed Access
Staying ahead of phishers: a review of recent advances and emerging methodologies in phishing detection
S. Kavya, D. Sumathi
Artificial Intelligence Review (2024) Vol. 58, Iss. 2
Open Access
S. Kavya, D. Sumathi
Artificial Intelligence Review (2024) Vol. 58, Iss. 2
Open Access
Factors Influencing Frameworks for Social Cybersecurity Management. A Systematic Literature Review
Edgar Rodriguez, José Santisteban, Vicente Morales, et al.
Lecture notes in networks and systems (2024), pp. 162-179
Closed Access
Edgar Rodriguez, José Santisteban, Vicente Morales, et al.
Lecture notes in networks and systems (2024), pp. 162-179
Closed Access
The Rise of Sophisticated Phishing. How AI Fuels Cybercrime
Patricia Riurean, George Bolog, Simona Riurean
Journal of Digital Science (2024) Vol. 6, Iss. 2, pp. 15-25
Closed Access
Patricia Riurean, George Bolog, Simona Riurean
Journal of Digital Science (2024) Vol. 6, Iss. 2, pp. 15-25
Closed Access