
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Significance of Machine Learning for Detection of Malicious Websites on an Unbalanced Dataset
Ietezaz Ul Hassan, Raja Hashim Ali, Zain ul Abideen, et al.
Digital (2022) Vol. 2, Iss. 4, pp. 501-519
Open Access | Times Cited: 49
Ietezaz Ul Hassan, Raja Hashim Ali, Zain ul Abideen, et al.
Digital (2022) Vol. 2, Iss. 4, pp. 501-519
Open Access | Times Cited: 49
Showing 1-25 of 49 citing articles:
Analysis of the Performance Impact of Fine-Tuned Machine Learning Model for Phishing URL Detection
A. Saleem Raja, Sundaravadivazhagan Balasubaramanian, Amna Salim Al-Kaabi, et al.
Electronics (2023) Vol. 12, Iss. 7, pp. 1642-1642
Open Access | Times Cited: 63
A. Saleem Raja, Sundaravadivazhagan Balasubaramanian, Amna Salim Al-Kaabi, et al.
Electronics (2023) Vol. 12, Iss. 7, pp. 1642-1642
Open Access | Times Cited: 63
Predictive analysis on severity of Non-Alcoholic Fatty Liver Disease (NAFLD) using Machine Learning Algorithms
Muhamamd Haseeb Aslam, Syed Fawad Hussain, Raja Hashim Ali
(2022), pp. 95-100
Closed Access | Times Cited: 32
Muhamamd Haseeb Aslam, Syed Fawad Hussain, Raja Hashim Ali
(2022), pp. 95-100
Closed Access | Times Cited: 32
Solving Graph Coloring Problem via Graph Neural Network (GNN)
Ali Zeeshan Ijaz, Raja Hashim Ali, Nisar Ali, et al.
(2022), pp. 178-183
Closed Access | Times Cited: 31
Ali Zeeshan Ijaz, Raja Hashim Ali, Nisar Ali, et al.
(2022), pp. 178-183
Closed Access | Times Cited: 31
DocOnTap: AI-based disease diagnostic system and recommendation system
Zain ul Abideen, Talha Ali Khan, Raja Hashim Ali, et al.
(2022), pp. 148-153
Closed Access | Times Cited: 29
Zain ul Abideen, Talha Ali Khan, Raja Hashim Ali, et al.
(2022), pp. 148-153
Closed Access | Times Cited: 29
Importance of Synteny in Homology Inference
Ali Zeeshan Ijaz, Raja Hashim Ali, Asima Sarwar, et al.
(2022) Vol. 4, pp. 234-239
Closed Access | Times Cited: 27
Ali Zeeshan Ijaz, Raja Hashim Ali, Asima Sarwar, et al.
(2022) Vol. 4, pp. 234-239
Closed Access | Times Cited: 27
Advanced Phishing Website Detection with SMOTETomek-XGB: Addressing Class Imbalance for Optimal Results
Kamal Omari, Ayoub Oukhatar
Procedia Computer Science (2025) Vol. 252, pp. 289-295
Open Access
Kamal Omari, Ayoub Oukhatar
Procedia Computer Science (2025) Vol. 252, pp. 289-295
Open Access
Identification of Severity in Non-Alcoholic Fatty Liver Disease Using Machine Learning Algorithms
Koteswara Rao Makkena, Karthika Natarajan
Algorithms for intelligent systems (2025), pp. 179-197
Closed Access
Koteswara Rao Makkena, Karthika Natarajan
Algorithms for intelligent systems (2025), pp. 179-197
Closed Access
An investigation of machine learning algorithms and data augmentation techniques for diabetes diagnosis using class imbalanced BRFSS dataset
Mohammad Mihrab Chowdhury, Ragib Shahariar Ayon, Md Sakhawat Hossain
Healthcare Analytics (2023) Vol. 5, pp. 100297-100297
Open Access | Times Cited: 13
Mohammad Mihrab Chowdhury, Ragib Shahariar Ayon, Md Sakhawat Hossain
Healthcare Analytics (2023) Vol. 5, pp. 100297-100297
Open Access | Times Cited: 13
Unbalanced Web Phishing Classification through Deep Reinforcement Learning
Antonio Maci, Alessandro Santorsola, Antonio Coscia, et al.
Computers (2023) Vol. 12, Iss. 6, pp. 118-118
Open Access | Times Cited: 12
Antonio Maci, Alessandro Santorsola, Antonio Coscia, et al.
Computers (2023) Vol. 12, Iss. 6, pp. 118-118
Open Access | Times Cited: 12
Deep Reinforcement Learning-based Malicious URL Detection with Feature Selection
Antonio Maci, Nicola Tamma, Antonio Coscia
(2024), pp. 1-7
Closed Access | Times Cited: 4
Antonio Maci, Nicola Tamma, Antonio Coscia
(2024), pp. 1-7
Closed Access | Times Cited: 4
Safeguarding cyberspace: Enhancing malicious website detection with PSO optimized XGBoost and firefly-based feature selection
Saeid Sheikhi, Panos Kostakos
Computers & Security (2024) Vol. 142, pp. 103885-103885
Open Access | Times Cited: 4
Saeid Sheikhi, Panos Kostakos
Computers & Security (2024) Vol. 142, pp. 103885-103885
Open Access | Times Cited: 4
BERT-Based Approach for Greening Software Requirements Engineering Through Non-Functional Requirements
Ahmad F. Subahi
IEEE Access (2023) Vol. 11, pp. 103001-103013
Open Access | Times Cited: 8
Ahmad F. Subahi
IEEE Access (2023) Vol. 11, pp. 103001-103013
Open Access | Times Cited: 8
Malicious URL and Intrusion Detection using Machine Learning
Amr Hamza, Farah Hammam, Medhat Abouzeid, et al.
2022 International Conference on Information Networking (ICOIN) (2024), pp. 795-800
Closed Access | Times Cited: 1
Amr Hamza, Farah Hammam, Medhat Abouzeid, et al.
2022 International Conference on Information Networking (ICOIN) (2024), pp. 795-800
Closed Access | Times Cited: 1
Implementing an unlearning approach to combat counter-knowledge in multiple sclerosis
Jorge Cegarra-Sánchez, Aurora Martínez‐Martínez, Juan Gabriel Cegarra Navarro, et al.
Knowledge Management Research & Practice (2024), pp. 1-11
Closed Access | Times Cited: 1
Jorge Cegarra-Sánchez, Aurora Martínez‐Martínez, Juan Gabriel Cegarra Navarro, et al.
Knowledge Management Research & Practice (2024), pp. 1-11
Closed Access | Times Cited: 1
Unveiling the Correlation between Nonfunctional Requirements and Sustainable Environmental Factors Using a Machine Learning Model
Shoaib Hassan, Qianmu Li, Muhammad Zubair, et al.
Sustainability (2024) Vol. 16, Iss. 14, pp. 5901-5901
Open Access | Times Cited: 1
Shoaib Hassan, Qianmu Li, Muhammad Zubair, et al.
Sustainability (2024) Vol. 16, Iss. 14, pp. 5901-5901
Open Access | Times Cited: 1
Machine learning Algorithms and Biomarkers Identification for Pancreatic cancer Diagnosis Using Multi-Omics Data Integration
Arian Karimi Rouzbahani, Ghazaleh Khalili‐Tanha, Yasamin Rajabloo, et al.
Pathology - Research and Practice (2024) Vol. 263, pp. 155602-155602
Closed Access | Times Cited: 1
Arian Karimi Rouzbahani, Ghazaleh Khalili‐Tanha, Yasamin Rajabloo, et al.
Pathology - Research and Practice (2024) Vol. 263, pp. 155602-155602
Closed Access | Times Cited: 1
Smart Scheduling of EVs Through Intelligent Home Energy Management Using Deep Reinforcement Learning
Ahmad Suleman, Muhammad Amin, Mahnoor Fatima, et al.
(2022), pp. 18-24
Closed Access | Times Cited: 6
Ahmad Suleman, Muhammad Amin, Mahnoor Fatima, et al.
(2022), pp. 18-24
Closed Access | Times Cited: 6
Malicious URL Detection Using Machine Learning
Shakti Kinger, P. Nirmal, Ayush Shrivastav, et al.
(2023)
Closed Access | Times Cited: 2
Shakti Kinger, P. Nirmal, Ayush Shrivastav, et al.
(2023)
Closed Access | Times Cited: 2
Performance comparison of visualization-based malware detection and classification techniques
Syed Shakir Hameed Shah, Norziana Jamil, Atta ur Rehman Khan
(2022), pp. 200-205
Closed Access | Times Cited: 3
Syed Shakir Hameed Shah, Norziana Jamil, Atta ur Rehman Khan
(2022), pp. 200-205
Closed Access | Times Cited: 3
Player Engagement Classification in Mobile Games Using MUSE Headband
Ghulam Ruqeyya, Sanay Muhammad Umar Saeed
(2022), pp. 83-88
Closed Access | Times Cited: 3
Ghulam Ruqeyya, Sanay Muhammad Umar Saeed
(2022), pp. 83-88
Closed Access | Times Cited: 3
Comprehensive empirical investigation for prioritizing the pipeline of using feature selection and data resampling techniques
Pooja Tyagi, Jaspreeti Singh, Anjana Gosain
Journal of Intelligent & Fuzzy Systems (2024) Vol. 46, Iss. 3, pp. 6019-6040
Closed Access
Pooja Tyagi, Jaspreeti Singh, Anjana Gosain
Journal of Intelligent & Fuzzy Systems (2024) Vol. 46, Iss. 3, pp. 6019-6040
Closed Access
A Comparative Analysis of Different Preprocessing Pipelines for EEG-based Mental Stress Detection
Trishita Ghosh Troyee, Md. Fazlul Karim Khondakar, Mahmudul Hasan, et al.
(2024), pp. 370-375
Closed Access
Trishita Ghosh Troyee, Md. Fazlul Karim Khondakar, Mahmudul Hasan, et al.
(2024), pp. 370-375
Closed Access
MEDAL: A Multimodality-Based Effective Data Augmentation Framework for Illegal Website Identification
Wen Li, Min Zhang, Chenyang Wang, et al.
Electronics (2024) Vol. 13, Iss. 11, pp. 2199-2199
Open Access
Wen Li, Min Zhang, Chenyang Wang, et al.
Electronics (2024) Vol. 13, Iss. 11, pp. 2199-2199
Open Access
USING MACHINE LEARNING ALGORITHMS TO DETECT MALICIOUS ADVERTISEMENTS ON WEB PAGES
N. E. Rakhimbay, K. B. Tusupova
Bulletin of Shakarim University Technical Sciences (2024) Vol. 1, Iss. 2(14), pp. 43-50
Closed Access
N. E. Rakhimbay, K. B. Tusupova
Bulletin of Shakarim University Technical Sciences (2024) Vol. 1, Iss. 2(14), pp. 43-50
Closed Access
Improving Cybersecurity: A Comparative Analysis of Machine Learning-Based Uniform Resource Locator (URL) Classification
Robert G. de Luna, Kriztel Anne R. Girang, J. Lucido, et al.
(2024), pp. 78-83
Closed Access
Robert G. de Luna, Kriztel Anne R. Girang, J. Lucido, et al.
(2024), pp. 78-83
Closed Access