OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning
Mohammed Alsaedi, Fuad A. Ghaleb, Faisal Saeed, et al.
Sensors (2022) Vol. 22, Iss. 9, pp. 3373-3373
Open Access | Times Cited: 56

Showing 1-25 of 56 citing articles:

A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience
Saqib Saeed, Sarah A. Suayyid, Manal S. Al-Ghamdi, et al.
Sensors (2023) Vol. 23, Iss. 16, pp. 7273-7273
Open Access | Times Cited: 47

Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems
Hang Thanh Bui, Hamed Aboutorab, Arash Mahboubi, et al.
Computers & Security (2024) Vol. 140, pp. 103754-103754
Open Access | Times Cited: 19

Ensemble Fusion for Enhanced Malicious URL Detection by Integrating Machine Learning and Deep Learning Techniques
Raja Rao PBV, Pokkuluri Kiran Sree, Prasad Maddula, et al.
(2025), pp. 339-349
Closed Access

Cyber Threat Intelligence Sharing: Challenges and Opportunities
Carlos Roberto Viana, Milton Sérgio Fernandes de Lima, Byron Loureiro Lanverly de Melo, et al.
(2025)
Closed Access

Web Security in the Digital Age
Sujatha Krishna, Rajesh Natarajan, Francesco Flammini, et al.
International Journal on Semantic Web and Information Systems (2025) Vol. 21, Iss. 1, pp. 1-25
Open Access

Enhancing Threat Detection in Financial Cyber Security Through Auto Encoder-MLP Hybrid Models
Layth Almahadeen, Ghayth AlMahadin, Kathari Santosh, et al.
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 4
Open Access | Times Cited: 3

Machine and Deep Learning-based XSS Detection Approaches: A Systematic Literature Review
Isam Kareem Thajeel, Khairulmizam Samsudin, Shaiful Jahari Hashim, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 7, pp. 101628-101628
Open Access | Times Cited: 10

A Machine Learning Approach for Walking Classification in Elderly People with Gait Disorders
Abdolrahman Peimankar, Trine Straarup Winther, Ali Ebrahimi, et al.
Sensors (2023) Vol. 23, Iss. 2, pp. 679-679
Open Access | Times Cited: 9

BERT-Based Approaches to Identifying Malicious URLs
Ming‐Yang Su, Kuan-Lin Su
Sensors (2023) Vol. 23, Iss. 20, pp. 8499-8499
Open Access | Times Cited: 9

A Systematic Literature Review and Meta-Analysis of Studies on Online Fake News Detection
Robyn C. Thompson, Seena Joseph, Timothy T. Adeliyi
Information (2022) Vol. 13, Iss. 11, pp. 527-527
Open Access | Times Cited: 14

WHOIS Right? An Analysis of WHOIS and RDAP Consistency
Simon Fernandez, Olivier Hureau, Andrzej Duda, et al.
Lecture notes in computer science (2024), pp. 206-231
Open Access | Times Cited: 1

An Efficient Hybrid Feature Selection Technique Toward Prediction of Suspicious URLs in IoT Environment
Sanjukta Mohanty, Arup Abhinna Acharya, Tarek Gaber, et al.
IEEE Access (2024) Vol. 12, pp. 50578-50594
Open Access | Times Cited: 1

Enhancing Malicious URL Detection: A Novel Framework Leveraging Priority Coefficient and Feature Evaluation
Ahmad Sahban Rafsanjani, Norshaliza Kamaruddin, Mehran Behjati, et al.
IEEE Access (2024) Vol. 12, pp. 85001-85026
Open Access | Times Cited: 1

Innovative IoT Threat Detection: Weighted Variational Autoencoder-Based Hunter Prey Search Algorithm for Strengthening Cybersecurity
Sami Alshmrany
IETE Journal of Research (2024) Vol. 70, Iss. 10, pp. 7687-7700
Closed Access | Times Cited: 1

Chinese Cyber Threat Intelligence Named Entity Recognition via RoBERTa-wwm-RDCNN-CRF
Zhen Zhen, Jian Gao
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 77, Iss. 1, pp. 299-323
Open Access | Times Cited: 4

Data Driven based Malicious URL Detection using Explainable AI
Saranda Poddar, Deepraj Chowdhury, Ashutosh Dhar Dwivedi, et al.
(2022)
Closed Access | Times Cited: 7

Evolutionary Algorithm with Deep Auto Encoder Network Based Website Phishing Detection and Classification
Hamed Alqahtani, Saud S. Alotaibi, Fatma S. Alrayes, et al.
Applied Sciences (2022) Vol. 12, Iss. 15, pp. 7441-7441
Open Access | Times Cited: 6

Malicious Domain Detection using NLP Methods — A Review
Pradeepa Ganesan, R. Devi
(2022) Vol. 35, pp. 1584-1588
Closed Access | Times Cited: 6

Multi-Modal Features Representation-Based Convolutional Neural Network Model for Malicious Website Detection
Mohammed Alsaedi, Fuad A. Ghaleb, Faisal Saeed, et al.
IEEE Access (2023) Vol. 12, pp. 7271-7284
Open Access | Times Cited: 3

Hybrid Approach for Phishing Website Detection Using Classification Algorithms
Mukta Mithra Raj, J. Angel Arul Jothi
ParadigmPlus (2022) Vol. 3, Iss. 3, pp. 16-29
Open Access | Times Cited: 4

Developing and Evaluating an Artificial Intelligence Model for Malicious URL Detection
F. Tiryaki, Ümit Şentürk, İbrahim Yücedağ
European Journal of Science and Technology (2023)
Open Access | Times Cited: 2

Classification of Malicious Websites Using Machine Learning Based on URL Characteristics
Muon Ha, Yulia Shichkina, Nhan Nguyen, et al.
Lecture notes in computer science (2023), pp. 317-327
Closed Access | Times Cited: 2

Investigating IPTV Malware in the Wild
Adam Lockett, Ioannis Chalkias, Çağatay Yücel, et al.
Future Internet (2023) Vol. 15, Iss. 10, pp. 325-325
Open Access | Times Cited: 2

An Intelligent System for Detecting Fake Materials on the Internet
Aya S. Noah, Naglaa E. Ghannam, Gaber A. Elsharawy, et al.
International Journal of Modern Education and Computer Science (2023) Vol. 15, Iss. 5, pp. 42-59
Open Access | Times Cited: 2

Political Optimization Algorithm with a Hybrid Deep Learning Assisted Malicious URL Detection Model
Mohammed Aljebreen, Fatma S. Alrayes, Sumayh S. Aljameel, et al.
Sustainability (2023) Vol. 15, Iss. 24, pp. 16811-16811
Open Access | Times Cited: 2

Page 1 - Next Page

Scroll to top