
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Web Phishing Classification using Combined Machine Learning Methods
Bambang Mahardhika Poerbo Waseso, Noor Ageng Setiyanto
Journal of Computing Theories and Applications (2023) Vol. 1, Iss. 1, pp. 11-18
Open Access | Times Cited: 15
Bambang Mahardhika Poerbo Waseso, Noor Ageng Setiyanto
Journal of Computing Theories and Applications (2023) Vol. 1, Iss. 1, pp. 11-18
Open Access | Times Cited: 15
Showing 15 citing articles:
Dataset and Feature Analysis for Diabetes Mellitus Classification using Random Forest
Fachrul Mustofa, Achmad Nuruddin Safriandono, Ahmad Rofiqul Muslikh, et al.
Journal of Computing Theories and Applications (2023) Vol. 1, Iss. 1, pp. 41-48
Open Access | Times Cited: 19
Fachrul Mustofa, Achmad Nuruddin Safriandono, Ahmad Rofiqul Muslikh, et al.
Journal of Computing Theories and Applications (2023) Vol. 1, Iss. 1, pp. 41-48
Open Access | Times Cited: 19
UNMASKING FRAUDSTERS: Ensemble Features Selection to Enhance Random Forest Fraud Detection
Maureen Ifeanyi Akazue, Irene Alamarefa Debekeme, Abel Efe Edje, et al.
Journal of Computing Theories and Applications (2023) Vol. 1, Iss. 2, pp. 201-211
Open Access | Times Cited: 15
Maureen Ifeanyi Akazue, Irene Alamarefa Debekeme, Abel Efe Edje, et al.
Journal of Computing Theories and Applications (2023) Vol. 1, Iss. 2, pp. 201-211
Open Access | Times Cited: 15
Integrated dual hyperchaotic and Josephus traversing based 3D confusion-diffusion pattern for image encryption
Edy Winarno, Kristiawan Prasetyo Agung Nugroho, Prajanto Wahyu Adi, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 9, pp. 101790-101790
Open Access | Times Cited: 13
Edy Winarno, Kristiawan Prasetyo Agung Nugroho, Prajanto Wahyu Adi, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 9, pp. 101790-101790
Open Access | Times Cited: 13
Can There Be a Two Way Hash Function?
Timucin Koroglu, Refik Samet
IEEE Access (2024) Vol. 12, pp. 18358-18386
Open Access | Times Cited: 3
Timucin Koroglu, Refik Samet
IEEE Access (2024) Vol. 12, pp. 18358-18386
Open Access | Times Cited: 3
Image Encryption using Half-Inverted Cascading Chaos Cipheration
De Rosal Ignatius Moses Setiadi, Robet Robet, Octara Pribadi, et al.
Journal of Computing Theories and Applications (2023) Vol. 1, Iss. 2, pp. 61-77
Open Access | Times Cited: 8
De Rosal Ignatius Moses Setiadi, Robet Robet, Octara Pribadi, et al.
Journal of Computing Theories and Applications (2023) Vol. 1, Iss. 2, pp. 61-77
Open Access | Times Cited: 8
One size does not fit all: exploring the cybersecurity perspectives and engagement preferences of UK-Based small businesses
Martin Wilson, Sharon McDonald
Information Security Journal A Global Perspective (2024) Vol. 34, Iss. 1, pp. 15-49
Open Access | Times Cited: 2
Martin Wilson, Sharon McDonald
Information Security Journal A Global Perspective (2024) Vol. 34, Iss. 1, pp. 15-49
Open Access | Times Cited: 2
AISM: An Adaptable Image Steganography Model With User Customization
Bobiao Guo, Ping Ping, Siqi Zhou, et al.
IEEE Transactions on Services Computing (2024) Vol. 17, Iss. 5, pp. 1955-1968
Closed Access | Times Cited: 1
Bobiao Guo, Ping Ping, Siqi Zhou, et al.
IEEE Transactions on Services Computing (2024) Vol. 17, Iss. 5, pp. 1955-1968
Closed Access | Times Cited: 1
Integrating Quadratic Polynomial and Symbolic Chaotic Map-Based Feistel Network to Improve Image Encryption Performance
Edy Winarno, Wiwien Hadikurniawati, Kristiawan Nugroho, et al.
IEEE Access (2024) Vol. 12, pp. 106720-106734
Open Access | Times Cited: 1
Edy Winarno, Wiwien Hadikurniawati, Kristiawan Nugroho, et al.
IEEE Access (2024) Vol. 12, pp. 106720-106734
Open Access | Times Cited: 1
Innovative Cybersecurity for Enhanced Data Protection: An Extended Bit-Plane Extraction and Chaotic Permutation-Diffusion Approach in Information Security
Mujeeb Ur Rehman, Arslan Shafique, Kashif Hesham Khan, et al.
IEEE Access (2023) Vol. 12, pp. 17926-17944
Open Access | Times Cited: 2
Mujeeb Ur Rehman, Arslan Shafique, Kashif Hesham Khan, et al.
IEEE Access (2023) Vol. 12, pp. 17926-17944
Open Access | Times Cited: 2
MC-MLDCNN: Multichannel Multilayer Dilated Convolutional Neural Networks for Web Attack Detection
Nazanin Moarref, Mehmet Tahir Sandıkkaya
Security and Communication Networks (2023) Vol. 2023, pp. 1-17
Open Access | Times Cited: 2
Nazanin Moarref, Mehmet Tahir Sandıkkaya
Security and Communication Networks (2023) Vol. 2023, pp. 1-17
Open Access | Times Cited: 2
Multi-label Classification of Indonesian Al-Quran Translation based CNN, BiLSTM, and FastText
Ahmad Rofiqul Muslikh, Ismail Akbar, De Rosal Ignatius Moses Setiadi, et al.
Techno Com (2024) Vol. 23, Iss. 1, pp. 37-50
Open Access
Ahmad Rofiqul Muslikh, Ismail Akbar, De Rosal Ignatius Moses Setiadi, et al.
Techno Com (2024) Vol. 23, Iss. 1, pp. 37-50
Open Access
Enhancing image encryption security through integration multi-chaotic systems and mixed pixel-bit level
Muhammad Naufal Erza Farandi, Aris Marjuni, Nova Rijati, et al.
The Imaging Science Journal (2024), pp. 1-18
Closed Access
Muhammad Naufal Erza Farandi, Aris Marjuni, Nova Rijati, et al.
The Imaging Science Journal (2024), pp. 1-18
Closed Access
Novel Dual-Domain Chaotic Image Cryptosystem for Cybersecurity Applications
Mahmoud Y. M. Yassin, Ali A. Nasir, Mostafa Taha
IEEE Access (2024) Vol. 12, pp. 123694-123715
Open Access
Mahmoud Y. M. Yassin, Ali A. Nasir, Mostafa Taha
IEEE Access (2024) Vol. 12, pp. 123694-123715
Open Access
Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review
Richard Apau, Michael Asante, Frimpong Twum, et al.
PLoS ONE (2024) Vol. 19, Iss. 9, pp. e0308807-e0308807
Open Access
Richard Apau, Michael Asante, Frimpong Twum, et al.
PLoS ONE (2024) Vol. 19, Iss. 9, pp. e0308807-e0308807
Open Access
A Comparative Insight into Machine Learning Strategies for Phishing Website Identification
Preet Singh, Taniya Hasija, KR Ramkumar
2022 7th International Conference on Communication and Electronics Systems (ICCES) (2024), pp. 1186-1191
Closed Access
Preet Singh, Taniya Hasija, KR Ramkumar
2022 7th International Conference on Communication and Electronics Systems (ICCES) (2024), pp. 1186-1191
Closed Access