
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Cyber-Phishing Website Detection Using Fuzzy Rule Interpolation
Mohammad Almseidin, Mouhammd Alkasassbeh, Maen Alzubi, et al.
Cryptography (2022) Vol. 6, Iss. 2, pp. 24-24
Open Access | Times Cited: 8
Mohammad Almseidin, Mouhammd Alkasassbeh, Maen Alzubi, et al.
Cryptography (2022) Vol. 6, Iss. 2, pp. 24-24
Open Access | Times Cited: 8
Showing 8 citing articles:
EI-FRI: Extended Incircle Fuzzy Rule Interpolation for Multidimensional Antecedents, Multiple Fuzzy Rules, and Extrapolation Using Total Weight Measurement and Shift Ratio
Maen Alzubi, Mohammad Almseidin, Szilveszter Kovács, et al.
Journal of Robotics and Control (JRC) (2024) Vol. 5, Iss. 1, pp. 217-227
Open Access | Times Cited: 2
Maen Alzubi, Mohammad Almseidin, Szilveszter Kovács, et al.
Journal of Robotics and Control (JRC) (2024) Vol. 5, Iss. 1, pp. 217-227
Open Access | Times Cited: 2
Comparative Analysis of Fuzzy Rule Interpolation Techniques Across Various Scenarios Using a Set of Benchmarks
Maen Alzubi, Mohammad Almseidin, Mouhammd Alkasassbeh, et al.
IEEE Access (2024) Vol. 12, pp. 33140-33153
Open Access | Times Cited: 1
Maen Alzubi, Mohammad Almseidin, Mouhammd Alkasassbeh, et al.
IEEE Access (2024) Vol. 12, pp. 33140-33153
Open Access | Times Cited: 1
An Accurate Detection Approach for IoT Botnet Attacks Using Interpolation Reasoning Method
Mohammad Almseidin, Mouhammd Alkasassbeh
Information (2022) Vol. 13, Iss. 6, pp. 300-300
Open Access | Times Cited: 7
Mohammad Almseidin, Mouhammd Alkasassbeh
Information (2022) Vol. 13, Iss. 6, pp. 300-300
Open Access | Times Cited: 7
Botnet Detection Techniques: A Comparative Study
Mohammad Alauthman
(2023)
Open Access | Times Cited: 3
Mohammad Alauthman
(2023)
Open Access | Times Cited: 3
Sectrabank Model to Mitigate Computer Fraud in Electronic Operations through Banking Applications on Android Devices
Jhon Melendez, Jomark Pablo Noriega, Jose Tiznado, et al.
(2024)
Open Access
Jhon Melendez, Jomark Pablo Noriega, Jose Tiznado, et al.
(2024)
Open Access
Phishing Detection Using Machine Learning: A Model Development and Integration
Valentine Adeyemi Onih
International Journal of Scientific and Management Research (2024) Vol. 07, Iss. 04, pp. 27-63
Open Access
Valentine Adeyemi Onih
International Journal of Scientific and Management Research (2024) Vol. 07, Iss. 04, pp. 27-63
Open Access
A Threefold Approach for Enhancing Fuzzy Interpolative Reasoning: Case Study on Phishing Attack Detection Using Sparse Rule Bases
Mohammad Almseidin, Maen Alzubi, Jamil Al‐Sawwa, et al.
Computers (2024) Vol. 13, Iss. 11, pp. 291-291
Open Access
Mohammad Almseidin, Maen Alzubi, Jamil Al‐Sawwa, et al.
Computers (2024) Vol. 13, Iss. 11, pp. 291-291
Open Access
Improved Random Forest Algorithm using Chicken Swarm Optimization for Phishing Website Classification Model
C. Rajeswary, M Thirumaran
International Journal of Electrical and Electronics Engineering (2023) Vol. 10, Iss. 4, pp. 141-151
Open Access
C. Rajeswary, M Thirumaran
International Journal of Electrical and Electronics Engineering (2023) Vol. 10, Iss. 4, pp. 141-151
Open Access