
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Malicious URL Detection using Deep Learning
R. Vinayakumar, Sai Sriram, Soman KP, et al.
(2020)
Open Access | Times Cited: 9
R. Vinayakumar, Sai Sriram, Soman KP, et al.
(2020)
Open Access | Times Cited: 9
Showing 9 citing articles:
Malware Analysis Using AI
Taher Kutbuddin Kapadia, Vedangi Nilesh Gupte, Bhaumik Hitesh Thakker, et al.
Lecture notes in electrical engineering (2025), pp. 255-266
Closed Access
Taher Kutbuddin Kapadia, Vedangi Nilesh Gupte, Bhaumik Hitesh Thakker, et al.
Lecture notes in electrical engineering (2025), pp. 255-266
Closed Access
Federated Learning For Cyber Security: SOC Collaboration For Malicious URL Detection
Ekaterina Khramtsova, Christian Hammerschmidt, Sofian Lagraa, et al.
(2020)
Open Access | Times Cited: 15
Ekaterina Khramtsova, Christian Hammerschmidt, Sofian Lagraa, et al.
(2020)
Open Access | Times Cited: 15
SeizeMaliciousURL: A novel learning approach to detect malicious URLs
Dipankar Kumar Mondal, Bikash Chandra Singh, Haibo Hu, et al.
Journal of Information Security and Applications (2021) Vol. 62, pp. 102967-102967
Closed Access | Times Cited: 13
Dipankar Kumar Mondal, Bikash Chandra Singh, Haibo Hu, et al.
Journal of Information Security and Applications (2021) Vol. 62, pp. 102967-102967
Closed Access | Times Cited: 13
Malicious URL detection Using majority vote method with machine learning and deep learning models
A.C Rakotoasimbahoaka, Iadaloharivola Randria, Nicolas Raft Razafindrakoto
(2020), pp. 37-43
Closed Access | Times Cited: 5
A.C Rakotoasimbahoaka, Iadaloharivola Randria, Nicolas Raft Razafindrakoto
(2020), pp. 37-43
Closed Access | Times Cited: 5
Combating the Phishing Attacks
Sonia Tasmin, Asma Khanam Sarmin, Mitul Shalehin, et al.
Advances in web technologies and engineering book series (2022), pp. 106-137
Closed Access | Times Cited: 1
Sonia Tasmin, Asma Khanam Sarmin, Mitul Shalehin, et al.
Advances in web technologies and engineering book series (2022), pp. 106-137
Closed Access | Times Cited: 1
Phish What You Wish
Pascal Gadient, Pascal Gerig, Oscar Nierstrasz, et al.
2021 IEEE 21st International Conference on Software Quality, Reliability and Security (QRS) (2021), pp. 1048-1059
Open Access | Times Cited: 1
Pascal Gadient, Pascal Gerig, Oscar Nierstrasz, et al.
2021 IEEE 21st International Conference on Software Quality, Reliability and Security (QRS) (2021), pp. 1048-1059
Open Access | Times Cited: 1
Event-Driven Malicious URL Extractor
Sinhala Welandage Sajeth Jonathan, Renu Harshatha Arunaasalam, Amila Senarathne, et al.
(2021), pp. 491-495
Closed Access | Times Cited: 1
Sinhala Welandage Sajeth Jonathan, Renu Harshatha Arunaasalam, Amila Senarathne, et al.
(2021), pp. 491-495
Closed Access | Times Cited: 1
Analysis of adversarial attacks on the machine learning models of cyberprotection systems.
V. Chevardin, O.S. Yurchenko, О. Zaluzhnyi, et al.
Communication informatization and cybersecurity systems and technologies (2023), Iss. 4, pp. 100-109
Open Access
V. Chevardin, O.S. Yurchenko, О. Zaluzhnyi, et al.
Communication informatization and cybersecurity systems and technologies (2023), Iss. 4, pp. 100-109
Open Access
Detection of Malicious URLs
S. Suresh Kumar, C. M. Richy Ryan, D. Samuel Jebin, et al.
Lecture notes in networks and systems (2022), pp. 739-747
Closed Access
S. Suresh Kumar, C. M. Richy Ryan, D. Samuel Jebin, et al.
Lecture notes in networks and systems (2022), pp. 739-747
Closed Access