
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Detecting Phishing Domains Using Machine Learning
Shouq Mohsen Alnemari, Majid Alshammari
Applied Sciences (2023) Vol. 13, Iss. 8, pp. 4649-4649
Open Access | Times Cited: 49
Shouq Mohsen Alnemari, Majid Alshammari
Applied Sciences (2023) Vol. 13, Iss. 8, pp. 4649-4649
Open Access | Times Cited: 49
Showing 1-25 of 49 citing articles:
An application for predicting phishing attacks: A case of implementing a support vector machine learning model
Emmanuel Song Shombot, Gilles Dusserre, Robert Bešťák, et al.
Cyber Security and Applications (2024) Vol. 2, pp. 100036-100036
Open Access | Times Cited: 8
Emmanuel Song Shombot, Gilles Dusserre, Robert Bešťák, et al.
Cyber Security and Applications (2024) Vol. 2, pp. 100036-100036
Open Access | Times Cited: 8
Bitterling fish optimization (BFO) algorithm
Lida Zareian, Javad Rahebi, Mohammad Javad Shayegan
Multimedia Tools and Applications (2024) Vol. 83, Iss. 31, pp. 75893-75926
Open Access | Times Cited: 8
Lida Zareian, Javad Rahebi, Mohammad Javad Shayegan
Multimedia Tools and Applications (2024) Vol. 83, Iss. 31, pp. 75893-75926
Open Access | Times Cited: 8
Develop a hybrid improved weighted quantum wolf optimization and fast mask recurrent convolutional neural network toenhance the performance of phishing malicious video detection
C. Rajeswary, M. Thirumaran
Journal of Industrial and Management Optimization (2025)
Open Access
C. Rajeswary, M. Thirumaran
Journal of Industrial and Management Optimization (2025)
Open Access
Ensemble Fusion for Enhanced Malicious URL Detection by Integrating Machine Learning and Deep Learning Techniques
Raja Rao PBV, Pokkuluri Kiran Sree, Prasad Maddula, et al.
(2025), pp. 339-349
Closed Access
Raja Rao PBV, Pokkuluri Kiran Sree, Prasad Maddula, et al.
(2025), pp. 339-349
Closed Access
Advanced Phishing Website Detection with SMOTETomek-XGB: Addressing Class Imbalance for Optimal Results
Kamal Omari, Ayoub Oukhatar
Procedia Computer Science (2025) Vol. 252, pp. 289-295
Open Access
Kamal Omari, Ayoub Oukhatar
Procedia Computer Science (2025) Vol. 252, pp. 289-295
Open Access
Web Phishing Classification using Combined Machine Learning Methods
Bambang Mahardhika Poerbo Waseso, Noor Ageng Setiyanto
Journal of Computing Theories and Applications (2023) Vol. 1, Iss. 1, pp. 11-18
Open Access | Times Cited: 15
Bambang Mahardhika Poerbo Waseso, Noor Ageng Setiyanto
Journal of Computing Theories and Applications (2023) Vol. 1, Iss. 1, pp. 11-18
Open Access | Times Cited: 15
La inteligencia artificial en la seguridad informática: Una revisión literaria
Bernabé Ortega-Tenezaca, Lady Rodriguez Carmona, Edgar Macías Farias, et al.
Arandu-UTIC. (2025) Vol. 11, Iss. 2, pp. 2798-2819
Closed Access
Bernabé Ortega-Tenezaca, Lady Rodriguez Carmona, Edgar Macías Farias, et al.
Arandu-UTIC. (2025) Vol. 11, Iss. 2, pp. 2798-2819
Closed Access
The State of the Art in AI-Based Phishing Detection: A Systematic Literature Review
Mohammed Fahad Alghenaim, Gamal Alkawsi, Christopher R. Barnhart
Studies in computational intelligence (2025), pp. 431-458
Closed Access
Mohammed Fahad Alghenaim, Gamal Alkawsi, Christopher R. Barnhart
Studies in computational intelligence (2025), pp. 431-458
Closed Access
Leveraging Textual Web Content for Phishing Website Detection with Weighted Average Word Embedding and Machine Learning
A. Saleem Raja, Sundaravadivazhagan Balasubramaniyan, Pradeepa Ganesan, et al.
Signals and communication technology (2025), pp. 925-932
Closed Access
A. Saleem Raja, Sundaravadivazhagan Balasubramaniyan, Pradeepa Ganesan, et al.
Signals and communication technology (2025), pp. 925-932
Closed Access
Machine Learning Approach for Phishing Attack Detection
Tarun Shankar Choudhary, Siddhesh Mhapankar, Rohit Bhddha, et al.
Journal of Artificial Intelligence and Technology (2023)
Open Access | Times Cited: 11
Tarun Shankar Choudhary, Siddhesh Mhapankar, Rohit Bhddha, et al.
Journal of Artificial Intelligence and Technology (2023)
Open Access | Times Cited: 11
Machine learning models for phishing detection from TLS traffic
Munish Kumar, Cheemaladinne Kondaiah, Alwyn Roshan Pais, et al.
Cluster Computing (2023) Vol. 26, Iss. 5, pp. 3263-3277
Closed Access | Times Cited: 7
Munish Kumar, Cheemaladinne Kondaiah, Alwyn Roshan Pais, et al.
Cluster Computing (2023) Vol. 26, Iss. 5, pp. 3263-3277
Closed Access | Times Cited: 7
Unveiling suspicious phishing attacks: enhancing detection with an optimal feature vectorization algorithm and supervised machine learning
Maruf Ahmed Tamal, Md. Kamrul Islam, Touhid Bhuiyan, et al.
Frontiers in Computer Science (2024) Vol. 6
Open Access | Times Cited: 2
Maruf Ahmed Tamal, Md. Kamrul Islam, Touhid Bhuiyan, et al.
Frontiers in Computer Science (2024) Vol. 6
Open Access | Times Cited: 2
Phishing Detection using Gradient Boosting Classifier
Kamal Omari
Procedia Computer Science (2023) Vol. 230, pp. 120-127
Open Access | Times Cited: 5
Kamal Omari
Procedia Computer Science (2023) Vol. 230, pp. 120-127
Open Access | Times Cited: 5
Comparative Study of Machine Learning Algorithms for Phishing Website Detection
Kamal Omari
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 9
Open Access | Times Cited: 5
Kamal Omari
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 9
Open Access | Times Cited: 5
Phishing Website URL’s Detection Using NLP and Machine Learning Techniques
Dinesh Kalla, Sivaraju Kuraku
Journal on artificial intelligence (2023) Vol. 5, pp. 145-162
Open Access | Times Cited: 5
Dinesh Kalla, Sivaraju Kuraku
Journal on artificial intelligence (2023) Vol. 5, pp. 145-162
Open Access | Times Cited: 5
Web Attack Intrusion Detection System Using Machine Learning Techniques
Mahmoud Baklizi, Issa Atoum, Mohammad Salman AlKhaza’leh, et al.
International Journal of Online and Biomedical Engineering (iJOE) (2024) Vol. 20, Iss. 03, pp. 24-38
Open Access | Times Cited: 1
Mahmoud Baklizi, Issa Atoum, Mohammad Salman AlKhaza’leh, et al.
International Journal of Online and Biomedical Engineering (iJOE) (2024) Vol. 20, Iss. 03, pp. 24-38
Open Access | Times Cited: 1
Hybrid optimization enabled squeeze net for phishing attack detection
Naresh Kamble, Nilamadhab Mishra
Computers & Security (2024) Vol. 144, pp. 103901-103901
Closed Access | Times Cited: 1
Naresh Kamble, Nilamadhab Mishra
Computers & Security (2024) Vol. 144, pp. 103901-103901
Closed Access | Times Cited: 1
EM-PAD: An Effective Mechanism for Phishing Attack Detection
Aakash Aakash, Saksham Mittal, Mohammad Wazid, et al.
2022 International Wireless Communications and Mobile Computing (IWCMC) (2024), pp. 363-368
Closed Access | Times Cited: 1
Aakash Aakash, Saksham Mittal, Mohammad Wazid, et al.
2022 International Wireless Communications and Mobile Computing (IWCMC) (2024), pp. 363-368
Closed Access | Times Cited: 1
SENTINEY: Securing ENcrypted mulTI-party computatIoN for Enhanced data privacY and phishing detection
Fatma Hendaoui, Saloua Hendaoui
Expert Systems with Applications (2024) Vol. 256, pp. 124896-124896
Closed Access | Times Cited: 1
Fatma Hendaoui, Saloua Hendaoui
Expert Systems with Applications (2024) Vol. 256, pp. 124896-124896
Closed Access | Times Cited: 1
Exploring the Efficacy of Federated-Continual Learning Nodes with Attention-Based Classifier for Robust Web Phishing Detection: An Empirical Investigation
Jesher Joshua M, R Adhithya, Sree Dananjay S, et al.
(2024), pp. 1-7
Open Access | Times Cited: 1
Jesher Joshua M, R Adhithya, Sree Dananjay S, et al.
(2024), pp. 1-7
Open Access | Times Cited: 1
Deep Learning and Big Data Integration with Cuckoo Search Optimization for Robust Phishing Attack Detection
Brij B. Gupta, Akshat Gaurav, Jinsong Wu, et al.
ICC 2022 - IEEE International Conference on Communications (2024), pp. 1322-1327
Closed Access | Times Cited: 1
Brij B. Gupta, Akshat Gaurav, Jinsong Wu, et al.
ICC 2022 - IEEE International Conference on Communications (2024), pp. 1322-1327
Closed Access | Times Cited: 1
Novel interpretable and robust web-based AI platform for phishing email detection
Abdulla Al-Subaiey, Mohammed Al-Thani, Naser Abdullah Alam, et al.
Computers & Electrical Engineering (2024) Vol. 120, pp. 109625-109625
Open Access | Times Cited: 1
Abdulla Al-Subaiey, Mohammed Al-Thani, Naser Abdullah Alam, et al.
Computers & Electrical Engineering (2024) Vol. 120, pp. 109625-109625
Open Access | Times Cited: 1
Distinguishing Malignant Melanoma and Benign Nevus of Human Skin by Retardance Using Mueller Matrix Imaging Polarimeter
Wen’ai Wang, Guoqiang Chen, Yanqiu Li
Applied Sciences (2023) Vol. 13, Iss. 11, pp. 6514-6514
Open Access | Times Cited: 2
Wen’ai Wang, Guoqiang Chen, Yanqiu Li
Applied Sciences (2023) Vol. 13, Iss. 11, pp. 6514-6514
Open Access | Times Cited: 2
A Hybrid Transformer Ensemble Approach for Phishing Website Detection
Krishna Sahithi Mandapati, Meesala Sravani, Divya Maddela, et al.
(2023), pp. 1-8
Closed Access | Times Cited: 2
Krishna Sahithi Mandapati, Meesala Sravani, Divya Maddela, et al.
(2023), pp. 1-8
Closed Access | Times Cited: 2
Deep learning based phishing website detection
N. Subhashini, Amogh Banerjee, Abhi Kumar, et al.
TELKOMNIKA (Telecommunication Computing Electronics and Control) (2023) Vol. 22, Iss. 1, pp. 113-113
Open Access | Times Cited: 2
N. Subhashini, Amogh Banerjee, Abhi Kumar, et al.
TELKOMNIKA (Telecommunication Computing Electronics and Control) (2023) Vol. 22, Iss. 1, pp. 113-113
Open Access | Times Cited: 2