OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Email Security Issues, Tools, and Techniques Used in Investigation
Esra Altulaihan, Abrar Alismail, M. M. Hafizur Rahman, et al.
Sustainability (2023) Vol. 15, Iss. 13, pp. 10612-10612
Open Access | Times Cited: 9

Showing 9 citing articles:

A Blockchain-based Approach with zk-SNARKs for Secure Email Applications
Md. Biplob Hossain, Maya Rahayu, Md. Arshad Ali, et al.
International Journal of Networking and Computing (2024) Vol. 14, Iss. 2, pp. 225-247
Open Access | Times Cited: 2

Earlier Decision on Detection of Ransomware Identification: A Comprehensive Systematic Literature Review
Latifa Albshaier, Seetah Almarri, M. M. Hafizur Rahman
Information (2024) Vol. 15, Iss. 8, pp. 484-484
Open Access | Times Cited: 2

An Optimized Machine Learning Model for the Detection of Man-in-the-Middle Attack in Mobile Edge Computing
Ramahlapane Lerato Moila, Mthulisi Velempini
2021 IST-Africa Conference (IST-Africa) (2024), pp. 1-12
Closed Access | Times Cited: 1

A Smart Contract Based Blockchain Approach Integrated with Elliptic Curve Cryptography for Secure Email Application
Md. Biplob Hossain, Maya Rahayu, Md. Arshad Ali, et al.
(2023), pp. 195-201
Closed Access | Times Cited: 2

An Innovative URL-Based System Approach with ML Based Prevention
Nongmeikapam Thoiba Singh, Jyoti Rani, Prince Sharma, et al.
(2024), pp. 1498-1503
Closed Access

Comparative Investigation of Traditional Machine-Learning Models and Transformer Models for Phishing Email Detection
René Meléndez, Michał Ptaszyński, Fumito Masui
Electronics (2024) Vol. 13, Iss. 24, pp. 4877-4877
Open Access

Inappropriate Use of Submission and Rejection Emails for Advertising Revision Services and Congresses
Jaime A. Teixeira da Silva
ETHICS IN PROGRESS (2023) Vol. 14, Iss. 2, pp. 68-76
Open Access

Page 1

Scroll to top