OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Phishing Webpage Classification via Deep Learning-Based Algorithms: An Empirical Study
Nguyet Quang, Ali Selamat, Ondřej Krejcar, et al.
Applied Sciences (2021) Vol. 11, Iss. 19, pp. 9210-9210
Open Access | Times Cited: 34

Showing 1-25 of 34 citing articles:

A Deep Learning-Based Phishing Detection System Using CNN, LSTM, and LSTM-CNN
Zainab Alshingiti, Rabeah Alaqel, Jalal Al‐Muhtadi, et al.
Electronics (2023) Vol. 12, Iss. 1, pp. 232-232
Open Access | Times Cited: 86

PDGAN: Phishing Detection With Generative Adversarial Networks
Saad Al-Ahmadi, Afrah Alotaibi, Omar Alsaleh
IEEE Access (2022) Vol. 10, pp. 42459-42468
Open Access | Times Cited: 38

A Deep Learning-Based Innovative Technique for Phishing Detection in Modern Security with Uniform Resource Locators
Eman Abdullah Aldakheel, Mohammed Zakariah, Ghada Abdalaziz Gashgari, et al.
Sensors (2023) Vol. 23, Iss. 9, pp. 4403-4403
Open Access | Times Cited: 34

A Phishing-Attack-Detection Model Using Natural Language Processing and Deep Learning
Eduardo Benavides-Astudillo, Walter Fuertes, Sandra Sánchez-Gordón, et al.
Applied Sciences (2023) Vol. 13, Iss. 9, pp. 5275-5275
Open Access | Times Cited: 22

Enhancing Phishing Detection: A Novel Hybrid Deep Learning Framework for Cybercrime Forensics
Faisal S. Alsubaei, Abdulwahab Ali Almazroi, Nasir Ayub
IEEE Access (2024) Vol. 12, pp. 8373-8389
Open Access | Times Cited: 11

AntiPhishStack: LSTM-Based Stacked Generalization Model for Optimized Phishing URL Detection
Saba Aslam, Hafsa Aslam, Arslan Manzoor, et al.
Symmetry (2024) Vol. 16, Iss. 2, pp. 248-248
Open Access | Times Cited: 8

Phish Responder: A Hybrid Machine Learning Approach to Detect Phishing and Spam Emails
Molly Dewis, Thiago Viana
Applied System Innovation (2022) Vol. 5, Iss. 4, pp. 73-73
Open Access | Times Cited: 21

Unbalanced Web Phishing Classification through Deep Reinforcement Learning
Antonio Maci, Alessandro Santorsola, Antonio Coscia, et al.
Computers (2023) Vol. 12, Iss. 6, pp. 118-118
Open Access | Times Cited: 12

AntiPhishStack: LSTM-based Stacked Generalization Model for Optimized Phishing URLs Detection
Saba Aslam, Hafsa Aslam, Arslan Manzoor, et al.
(2024)
Open Access | Times Cited: 3

Intrusion Detection with deep learning: A literature review
Brahim Khalil Sedraoui, Abdelmadjid Benmachiche, Amina Makhlouf, et al.
(2024) Vol. 7, pp. 1-8
Closed Access | Times Cited: 2

A Modeling Design Method for Complex Products Based on LSTM Neural Network and Kansei Engineering
Jin-Juan Duan, Ping-Sheng Luo, Qi Liu, et al.
Applied Sciences (2023) Vol. 13, Iss. 2, pp. 710-710
Open Access | Times Cited: 6

A deep learning approach to detect phishing websites using CNN for privacy protection
Rania Zaimi, Mohamed Hafidi, Mahnane Lamia
Intelligent Decision Technologies (2023) Vol. 17, Iss. 3, pp. 713-728
Closed Access | Times Cited: 6

An improved anti‐phishing model utilizing TF‐IDF and AdaBoost
Bhawna Sharma, Parvinder Singh
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 26
Closed Access | Times Cited: 8

Deep learning in phishing mitigation: a uniform resource locator-based predictive model
Hamzah Salah, Hiba Zuhair
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2023) Vol. 13, Iss. 3, pp. 3227-3227
Open Access | Times Cited: 4

Convolutional Neural Network dalam Citra Medis
Danny Gunawan, Hendry Setiawan
KONSTELASI Konvergensi Teknologi dan Sistem Informasi (2022) Vol. 2, Iss. 2
Open Access | Times Cited: 7

Enhancеd Analysis Approach to Detect Phishing Attacks During COVID-19 Crisis
Mousa Tayseer Jafar, Mohammad Al-Fawa’reh, Malek Barhoush, et al.
Cybernetics and Information Technologies (2022) Vol. 22, Iss. 1, pp. 60-76
Open Access | Times Cited: 6

Characterization of Malicious URLs Using Machine Learning and Feature Engineering
Sidwendluian Romaric Nana, Didier Bassolé, Jean Serge Dimitri Ouattara, et al.
(2024), pp. 15-32
Closed Access

Market or Markets? Investigating Google Search’s Market Shares under Vertical Segmentation
Desheng Hu, J. M. Gleason, Muhammad Abu Bakar Aziz, et al.
Proceedings of the International AAAI Conference on Web and Social Media (2024) Vol. 18, pp. 637-650
Open Access

Context-aware embeddings for robust multiclass fraudulent URL detection in online social platforms
Sara Afzal, Muhammad Asim, Mirza Omer Beg, et al.
Computers & Electrical Engineering (2024) Vol. 119, pp. 109494-109494
Open Access

Phishing URLs Detection Method Using Hybrid Feature and Convolutional Neural Networks with Attention Mechanisms
Santosh Kumar Birthriya, Priyanka Ahlawat, Ankit Kumar Jain
Communications in computer and information science (2024), pp. 290-303
Closed Access

Phishing URL Detection Using BiLSTM With Attention Mechanism
K S Jishnu, B. Arthi
Advances in computational intelligence and robotics book series (2024), pp. 159-184
Closed Access

BaitNet: A Deep Learning Approach for Phishing Detection
Stefan Barath, J Jaikrishnan, Anthony Divas, et al.
(2023), pp. 1-8
Closed Access | Times Cited: 1

Hierarchical Contaminated Web Page Classification Based on Meta Tag Denoising Disposal
Xiang Song, Yi Zhu, Xuemei Zeng, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-11
Open Access | Times Cited: 3

Page 1 - Next Page

Scroll to top