
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
TEGDetector: A Phishing Detector That Knows Evolving Transaction Behaviors
Haibin Zheng, Minying Ma, Haonan Ma, et al.
IEEE Transactions on Computational Social Systems (2023) Vol. 11, Iss. 3, pp. 3988-4000
Open Access | Times Cited: 7
Haibin Zheng, Minying Ma, Haonan Ma, et al.
IEEE Transactions on Computational Social Systems (2023) Vol. 11, Iss. 3, pp. 3988-4000
Open Access | Times Cited: 7
Showing 7 citing articles:
Phishing Detection Methods
Sally Dafaalla Awadalkarim Abualgasim, Zeinab E. Ahmed
IGI Global eBooks (2025), pp. 25-48
Closed Access
Sally Dafaalla Awadalkarim Abualgasim, Zeinab E. Ahmed
IGI Global eBooks (2025), pp. 25-48
Closed Access
DeFedHDP: Fully Decentralized Online Federated Learning for Heart Disease Prediction in Computational Health Systems
Mengli Wei, Ju Yang, Zhongyuan Zhao, et al.
IEEE Transactions on Computational Social Systems (2024) Vol. 11, Iss. 5, pp. 6854-6867
Closed Access | Times Cited: 3
Mengli Wei, Ju Yang, Zhongyuan Zhao, et al.
IEEE Transactions on Computational Social Systems (2024) Vol. 11, Iss. 5, pp. 6854-6867
Closed Access | Times Cited: 3
Phishing behavior detection on different blockchains via adversarial domain adaptation
Chuyi Yan, Xueying Han, Yan Zhu, et al.
Cybersecurity (2024) Vol. 7, Iss. 1
Open Access | Times Cited: 1
Chuyi Yan, Xueying Han, Yan Zhu, et al.
Cybersecurity (2024) Vol. 7, Iss. 1
Open Access | Times Cited: 1
A Counterfactual Inference-Based Social Network User-Alignment Algorithm
Ling Xing, Yuanhao Huang, Qi Zhang, et al.
IEEE Transactions on Computational Social Systems (2024) Vol. 11, Iss. 5, pp. 6939-6952
Closed Access | Times Cited: 1
Ling Xing, Yuanhao Huang, Qi Zhang, et al.
IEEE Transactions on Computational Social Systems (2024) Vol. 11, Iss. 5, pp. 6939-6952
Closed Access | Times Cited: 1
Cong Wu, Jing Chen, Ziming Zhao, et al.
(2024), pp. 956-970
Open Access | Times Cited: 1
PR-Graph2vec: PageRank-based Graph Embedding Algorithm for Phishing Detection in the Ethereum Network
Xucan Zhang, Siyi Xiao, Zexin Li, et al.
(2024), pp. 428-432
Closed Access
Xucan Zhang, Siyi Xiao, Zexin Li, et al.
(2024), pp. 428-432
Closed Access
Next-Generation Technologies for Secure Future Communication-based Social-Media 3.0 and Smart Environment
Archana Kurde, Sushil Kumar Singh
(2024) Vol. 1, Iss. 2, pp. 101-125
Open Access
Archana Kurde, Sushil Kumar Singh
(2024) Vol. 1, Iss. 2, pp. 101-125
Open Access