
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Building an Effective Classifier for Phishing Web Pages Detection: A Quantum-Inspired Biomimetic Paradigm Suitable for Big Data Analytics of Cyber Attacks
Saad M. Darwish, Dheyauldeen A. Farhan, Adel A. El-Zoghabi
Biomimetics (2023) Vol. 8, Iss. 2, pp. 197-197
Open Access | Times Cited: 10
Saad M. Darwish, Dheyauldeen A. Farhan, Adel A. El-Zoghabi
Biomimetics (2023) Vol. 8, Iss. 2, pp. 197-197
Open Access | Times Cited: 10
Showing 10 citing articles:
A Comprehensive Review of Bio-Inspired Optimization Algorithms Including Applications in Microelectronics and Nanophotonics
Zoran Jakšić, Swagata Devi, Olga Jakšić, et al.
Biomimetics (2023) Vol. 8, Iss. 3, pp. 278-278
Open Access | Times Cited: 35
Zoran Jakšić, Swagata Devi, Olga Jakšić, et al.
Biomimetics (2023) Vol. 8, Iss. 3, pp. 278-278
Open Access | Times Cited: 35
Enhanced Feature Selection Using Genetic Algorithm for Machine-Learning-Based Phishing URL Detection
Emre Koçyiğit, Mehmet Korkmaz, Özgür Koray Şahingöz, et al.
Applied Sciences (2024) Vol. 14, Iss. 14, pp. 6081-6081
Open Access | Times Cited: 4
Emre Koçyiğit, Mehmet Korkmaz, Özgür Koray Şahingöz, et al.
Applied Sciences (2024) Vol. 14, Iss. 14, pp. 6081-6081
Open Access | Times Cited: 4
An Abnormal External Link Detection Algorithm Based on Multi-Modal Fusion
Zhiqiang Wu
International Journal of Information Security and Privacy (2024) Vol. 18, Iss. 1, pp. 1-15
Open Access | Times Cited: 1
Zhiqiang Wu
International Journal of Information Security and Privacy (2024) Vol. 18, Iss. 1, pp. 1-15
Open Access | Times Cited: 1
Enhancing the Efficiency of a Cybersecurity Operations Center Using Biomimetic Algorithms Empowered by Deep Q-Learning
Rodrigo Olivares, Omar Salinas, Camilo Ravelo, et al.
Biomimetics (2024) Vol. 9, Iss. 6, pp. 307-307
Open Access | Times Cited: 1
Rodrigo Olivares, Omar Salinas, Camilo Ravelo, et al.
Biomimetics (2024) Vol. 9, Iss. 6, pp. 307-307
Open Access | Times Cited: 1
Enhancing the Efficiency of a Cyber SOC Using Biomimetic Algorithms Empowered by Deep Q–Learning
Rodrigo Olivares, Omar Salinas, Camilo Ravelo, et al.
(2024)
Open Access
Rodrigo Olivares, Omar Salinas, Camilo Ravelo, et al.
(2024)
Open Access
PHISHEILD WEBSITE DETECTION SYSTEM FOR SAFEGUARDING ONLINE SECURITY
Dheer Bauva, Vineet Parmar, Yash Wadajkar, et al.
ASIAN JOURNAL OF CONVERGENCE IN TECHNOLOGY (2024) Vol. 10, Iss. 1, pp. 9-13
Open Access
Dheer Bauva, Vineet Parmar, Yash Wadajkar, et al.
ASIAN JOURNAL OF CONVERGENCE IN TECHNOLOGY (2024) Vol. 10, Iss. 1, pp. 9-13
Open Access
Research on Classified Information Security of Computer Network Based on Big Data Clustering Algorithm
Chaorong Song
(2024), pp. 338-343
Closed Access
Chaorong Song
(2024), pp. 338-343
Closed Access
Quantum-Inspired Machine Learning Models for Cyber Threat Intelligence
Sana Pavan Kumar Reddy, Niladri Sekhar Dey, A. SrujanGoud, et al.
Communications in computer and information science (2024), pp. 106-126
Closed Access
Sana Pavan Kumar Reddy, Niladri Sekhar Dey, A. SrujanGoud, et al.
Communications in computer and information science (2024), pp. 106-126
Closed Access
Quantum Machine Learning Algorithms for Big Data Analytics in Cyber Security
Surajit Das, Santosh Kumar Vishwakarma, S. S. Rao, et al.
Communications in computer and information science (2024), pp. 146-162
Closed Access
Surajit Das, Santosh Kumar Vishwakarma, S. S. Rao, et al.
Communications in computer and information science (2024), pp. 146-162
Closed Access
Performance Enhancement to Improve Accuracy for the Novel CNN GoogleNet Compared AAgainst ResNet in Predicting Cyber Hacking Breaches
Saravanan Madderi Sivalingam, Ch Lokesh
(2023), pp. 158-163
Closed Access
Saravanan Madderi Sivalingam, Ch Lokesh
(2023), pp. 158-163
Closed Access