
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
DEPHIDES: Deep Learning Based Phishing Detection System
Özgür Koray Şahingöz, Ebubekir Buber, Emin Kugu
IEEE Access (2024) Vol. 12, pp. 8052-8070
Open Access | Times Cited: 15
Özgür Koray Şahingöz, Ebubekir Buber, Emin Kugu
IEEE Access (2024) Vol. 12, pp. 8052-8070
Open Access | Times Cited: 15
Showing 15 citing articles:
Develop a hybrid improved weighted quantum wolf optimization and fast mask recurrent convolutional neural network toenhance the performance of phishing malicious video detection
C. Rajeswary, M. Thirumaran
Journal of Industrial and Management Optimization (2025)
Open Access
C. Rajeswary, M. Thirumaran
Journal of Industrial and Management Optimization (2025)
Open Access
Web-based phishing URL detection model using deep learning optimization techniques
Kousik Barik, Sanjay Misra, R.S. Mohan
International Journal of Data Science and Analytics (2025)
Open Access
Kousik Barik, Sanjay Misra, R.S. Mohan
International Journal of Data Science and Analytics (2025)
Open Access
Harnessing Machine Learning Intelligence Against Cyber Threats
Bhupinder Singh, Christian Kaunert, Ritu Gautam
Advances in business strategy and competitive advantage book series (2024), pp. 319-352
Closed Access | Times Cited: 4
Bhupinder Singh, Christian Kaunert, Ritu Gautam
Advances in business strategy and competitive advantage book series (2024), pp. 319-352
Closed Access | Times Cited: 4
Phishing Detection Methods
Sally Dafaalla Awadalkarim Abualgasim, Zeinab E. Ahmed
IGI Global eBooks (2025), pp. 25-48
Closed Access
Sally Dafaalla Awadalkarim Abualgasim, Zeinab E. Ahmed
IGI Global eBooks (2025), pp. 25-48
Closed Access
Stacking ensemble classifier for phishing detection: A cyber security model with efficient feature descriptor
L Shammi, Emilin Shyni C
Intelligent Decision Technologies (2025)
Closed Access
L Shammi, Emilin Shyni C
Intelligent Decision Technologies (2025)
Closed Access
Exploring GRU-based approaches with attention mechanisms for accurate phishing URL detection
K S Jishnu, B. Arthi
Intelligent Decision Technologies (2024) Vol. 18, Iss. 2, pp. 1029-1052
Closed Access
K S Jishnu, B. Arthi
Intelligent Decision Technologies (2024) Vol. 18, Iss. 2, pp. 1029-1052
Closed Access
PhishGuard: A Convolutional Neural Network-Based Model for Detecting Phishing URLs with Explainability Analysis
Md. Robiul Islam, Md Mahamodul Islam, Mst. Suraiya Afrin, et al.
(2024), pp. 1-6
Open Access
Md. Robiul Islam, Md Mahamodul Islam, Mst. Suraiya Afrin, et al.
(2024), pp. 1-6
Open Access
A Comprehensive Review of Neural Network-Based Approaches for Predicting Phishing Websites and URLs
Eric Blancaflor, Amiel Heart S. Calpo, Spencer Jireh Cebrian, et al.
(2024), pp. 96-101
Closed Access
Eric Blancaflor, Amiel Heart S. Calpo, Spencer Jireh Cebrian, et al.
(2024), pp. 96-101
Closed Access
Scouting the Juncture of Internet of Things (IoT), Deep Learning, and Cybercrime
Bhupinder Singh, Christian Kaunert
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 363-398
Closed Access
Bhupinder Singh, Christian Kaunert
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 363-398
Closed Access
A Hybrid Framework for Improved Weighted Quantum Particle Swarm Optimization and Fast Mask Recurrent CNN to Enhance Phishing-URL Prediction Performance
S. Senthil Kumar, Prakash Muthusamy, Michael Jerald
International Journal of Computational Intelligence Systems (2024) Vol. 17, Iss. 1
Open Access
S. Senthil Kumar, Prakash Muthusamy, Michael Jerald
International Journal of Computational Intelligence Systems (2024) Vol. 17, Iss. 1
Open Access
Exploring Effective Strategies for Combatting Cybercrime and Intersection of IoT, Deep Learning
Bhupinder Singh, Christian Kaunert
Advances in human and social aspects of technology book series (2024), pp. 141-172
Closed Access
Bhupinder Singh, Christian Kaunert
Advances in human and social aspects of technology book series (2024), pp. 141-172
Closed Access
PD-UHD features: Phishing Detection Approach using uncooked URL, HTML content and Domain Name Features
M Manjula, Venkatesh Venkatesh, R H Kenchamma, et al.
(2024), pp. 1-8
Closed Access
M Manjula, Venkatesh Venkatesh, R H Kenchamma, et al.
(2024), pp. 1-8
Closed Access
Real-time phishing URL detection framework using knowledge distilled ELECTRA
K S Jishnu, B. Arthi
Automatika (2024) Vol. 65, Iss. 4, pp. 1621-1639
Open Access
K S Jishnu, B. Arthi
Automatika (2024) Vol. 65, Iss. 4, pp. 1621-1639
Open Access
Navigating Cryptocurrency Regulation
Bhupinder Singh, Christian Kaunert
Advances in hospitality, tourism and the services industry (AHTSI) book series (2024), pp. 133-160
Closed Access
Bhupinder Singh, Christian Kaunert
Advances in hospitality, tourism and the services industry (AHTSI) book series (2024), pp. 133-160
Closed Access
Staying ahead of phishers: a review of recent advances and emerging methodologies in phishing detection
S. Kavya, D. Sumathi
Artificial Intelligence Review (2024) Vol. 58, Iss. 2
Open Access
S. Kavya, D. Sumathi
Artificial Intelligence Review (2024) Vol. 58, Iss. 2
Open Access