
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Phishing URLs Detection Using Sequential and Parallel ML Techniques: Comparative Analysis
Naya Nagy, Malak Aljabri, Afrah Shaahid, et al.
Sensors (2023) Vol. 23, Iss. 7, pp. 3467-3467
Open Access | Times Cited: 18
Naya Nagy, Malak Aljabri, Afrah Shaahid, et al.
Sensors (2023) Vol. 23, Iss. 7, pp. 3467-3467
Open Access | Times Cited: 18
Showing 18 citing articles:
The impact of artificial intelligence on organisational cyber security: An outcome of a systematic literature review
Irshaad Jada, Thembekile O. Mayayise
Data and Information Management (2023) Vol. 8, Iss. 2, pp. 100063-100063
Open Access | Times Cited: 35
Irshaad Jada, Thembekile O. Mayayise
Data and Information Management (2023) Vol. 8, Iss. 2, pp. 100063-100063
Open Access | Times Cited: 35
Mutual information based logistic regression for phishing URL detection
Vajratiya Vajrobol, Brij B. Gupta, Akshat Gaurav
Cyber Security and Applications (2024) Vol. 2, pp. 100044-100044
Open Access | Times Cited: 7
Vajratiya Vajrobol, Brij B. Gupta, Akshat Gaurav
Cyber Security and Applications (2024) Vol. 2, pp. 100044-100044
Open Access | Times Cited: 7
AI Enhanced Phishing Detection System
P. Chinnasamy, Prakash Krishnamoorthy, K. Alankruthi, et al.
(2024), pp. 1-5
Closed Access | Times Cited: 5
P. Chinnasamy, Prakash Krishnamoorthy, K. Alankruthi, et al.
(2024), pp. 1-5
Closed Access | Times Cited: 5
La inteligencia artificial en la seguridad informática: Una revisión literaria
Bernabé Ortega-Tenezaca, Lady Rodriguez Carmona, Edgar Macías Farias, et al.
Arandu-UTIC. (2025) Vol. 11, Iss. 2, pp. 2798-2819
Closed Access
Bernabé Ortega-Tenezaca, Lady Rodriguez Carmona, Edgar Macías Farias, et al.
Arandu-UTIC. (2025) Vol. 11, Iss. 2, pp. 2798-2819
Closed Access
Android Ransomware Detection Using Supervised Machine Learning Techniques Based on Traffic Analysis
Amnah Albin Ahmed, Afrah Shaahid, Fatima Alnasser, et al.
Sensors (2023) Vol. 24, Iss. 1, pp. 189-189
Open Access | Times Cited: 10
Amnah Albin Ahmed, Afrah Shaahid, Fatima Alnasser, et al.
Sensors (2023) Vol. 24, Iss. 1, pp. 189-189
Open Access | Times Cited: 10
Detection of phishing addresses and pages with a data set balancing approach by generative adversarial network (GAN ) and convolutional neural network (CNN ) optimized with swarm intelligence
Somayyeh Jafari, Nasrin Aghaee‐Maybodi
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 11
Closed Access | Times Cited: 3
Somayyeh Jafari, Nasrin Aghaee‐Maybodi
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 11
Closed Access | Times Cited: 3
Malicious URL Detection Using Machine Learning
Raed Bani Hani, Motasem Amoura, Mohammad Ammourah, et al.
(2024), pp. 1-5
Closed Access | Times Cited: 3
Raed Bani Hani, Motasem Amoura, Mohammad Ammourah, et al.
(2024), pp. 1-5
Closed Access | Times Cited: 3
A Novel Cuckoo Search-Based Optimized Deep CNN Model for Phishing Attack Detection in IoT Environment
Brij B. Gupta, Akshat Gaurav, Razaz Waheeb Attar, et al.
Research Square (Research Square) (2024)
Open Access | Times Cited: 1
Brij B. Gupta, Akshat Gaurav, Razaz Waheeb Attar, et al.
Research Square (Research Square) (2024)
Open Access | Times Cited: 1
Developing a Model to Detect Malicious URLs using Different Classification Algorithms
Jana Hariri, Lujain Batouq, Ahd Aljarf
(2024), pp. 47-51
Closed Access | Times Cited: 1
Jana Hariri, Lujain Batouq, Ahd Aljarf
(2024), pp. 47-51
Closed Access | Times Cited: 1
Exploring the Efficacy of Federated-Continual Learning Nodes with Attention-Based Classifier for Robust Web Phishing Detection: An Empirical Investigation
Jesher Joshua M, R Adhithya, Sree Dananjay S, et al.
(2024), pp. 1-7
Open Access | Times Cited: 1
Jesher Joshua M, R Adhithya, Sree Dananjay S, et al.
(2024), pp. 1-7
Open Access | Times Cited: 1
OEC Net: Optimal feature selection-based email classification network using unsupervised learning with deep CNN model
Subba Reddy Borra, Muppaneni Yukthika, M S Bhargavi, et al.
e-Prime - Advances in Electrical Engineering Electronics and Energy (2023) Vol. 7, pp. 100415-100415
Open Access | Times Cited: 3
Subba Reddy Borra, Muppaneni Yukthika, M S Bhargavi, et al.
e-Prime - Advances in Electrical Engineering Electronics and Energy (2023) Vol. 7, pp. 100415-100415
Open Access | Times Cited: 3
A Hybrid Transformer Ensemble Approach for Phishing Website Detection
Krishna Sahithi Mandapati, Meesala Sravani, Divya Maddela, et al.
(2023), pp. 1-8
Closed Access | Times Cited: 2
Krishna Sahithi Mandapati, Meesala Sravani, Divya Maddela, et al.
(2023), pp. 1-8
Closed Access | Times Cited: 2
A Parallel Approach of Cascade Modelling Using MPI4Py on Imbalanced Dataset
Suprapto Suprapto, Wahyono Wahyono, Nur Rokhman, et al.
International Journal of Computing and Digital Systems (2024) Vol. 15, Iss. 1, pp. 1289-1302
Open Access
Suprapto Suprapto, Wahyono Wahyono, Nur Rokhman, et al.
International Journal of Computing and Digital Systems (2024) Vol. 15, Iss. 1, pp. 1289-1302
Open Access
Choosing a library for the Python programming language for visualizing the operation of parallel algorithms
Сергій Шаров, Yurii Sitsylitsyn, Oleksii Naumuk, et al.
E3S Web of Conferences (2024) Vol. 508, pp. 03002-03002
Open Access
Сергій Шаров, Yurii Sitsylitsyn, Oleksii Naumuk, et al.
E3S Web of Conferences (2024) Vol. 508, pp. 03002-03002
Open Access
Beyond Technical Barriers: A Multidimensional Conceptual Framework for Understanding and Countering Cyber Scam Susceptibility
Abdulbasit A. Darem, Tareq M. Alkhaldi, Muteeb Alahmari, et al.
International Journal of Human-Computer Interaction (2024), pp. 1-26
Closed Access
Abdulbasit A. Darem, Tareq M. Alkhaldi, Muteeb Alahmari, et al.
International Journal of Human-Computer Interaction (2024), pp. 1-26
Closed Access
RPCP-PURI: A robust and precise computational predictor for Phishing Uniform Resource Identification
Tayyaba Asif, Faiza Mehmood, Syed Ahmed Mazhar Gillani, et al.
Journal of Information Security and Applications (2024) Vol. 89, pp. 103953-103953
Closed Access
Tayyaba Asif, Faiza Mehmood, Syed Ahmed Mazhar Gillani, et al.
Journal of Information Security and Applications (2024) Vol. 89, pp. 103953-103953
Closed Access
A Review on Malicious URLs Detection Using Machine Learning Methods
Tasfia Tabassum, Md. Mahbubul Alam, Md. Sabbir Ejaz, et al.
Journal of Engineering Research and Reports (2023) Vol. 25, Iss. 12, pp. 76-88
Open Access | Times Cited: 1
Tasfia Tabassum, Md. Mahbubul Alam, Md. Sabbir Ejaz, et al.
Journal of Engineering Research and Reports (2023) Vol. 25, Iss. 12, pp. 76-88
Open Access | Times Cited: 1
ML and DL-based Phishing Website Detection: The Effects of Varied Size Datasets and Informative Feature Selection Techniques
Kibreab Adane, Berhanu Beyene, Mohammed Abebe
Journal of Artificial Intelligence and Technology (2023)
Open Access
Kibreab Adane, Berhanu Beyene, Mohammed Abebe
Journal of Artificial Intelligence and Technology (2023)
Open Access