
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Malicious URL Detection using Logistic Regression
Ch. Rupa, Gautam Srivastava, Sweta Bhattacharya, et al.
(2021), pp. 1-6
Closed Access | Times Cited: 43
Ch. Rupa, Gautam Srivastava, Sweta Bhattacharya, et al.
(2021), pp. 1-6
Closed Access | Times Cited: 43
Showing 1-25 of 43 citing articles:
A Comprehensive Survey on Computer Forensics: State-of-the-Art, Tools, Techniques, Challenges, and Future Directions
Abdul Rehman Javed, Waqas Ahmed, Mamoun Alazab, et al.
IEEE Access (2022) Vol. 10, pp. 11065-11089
Open Access | Times Cited: 89
Abdul Rehman Javed, Waqas Ahmed, Mamoun Alazab, et al.
IEEE Access (2022) Vol. 10, pp. 11065-11089
Open Access | Times Cited: 89
Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning
Mohammed Alsaedi, Fuad A. Ghaleb, Faisal Saeed, et al.
Sensors (2022) Vol. 22, Iss. 9, pp. 3373-3373
Open Access | Times Cited: 57
Mohammed Alsaedi, Fuad A. Ghaleb, Faisal Saeed, et al.
Sensors (2022) Vol. 22, Iss. 9, pp. 3373-3373
Open Access | Times Cited: 57
Detecting Malicious URLs Using Machine Learning Techniques: Review and Research Directions
Malak Aljabri, Hanan S. Altamimi, Shahd A. Albelali, et al.
IEEE Access (2022) Vol. 10, pp. 121395-121417
Open Access | Times Cited: 49
Malak Aljabri, Hanan S. Altamimi, Shahd A. Albelali, et al.
IEEE Access (2022) Vol. 10, pp. 121395-121417
Open Access | Times Cited: 49
A Hybrid Approach for Alluring Ads Phishing Attack Detection Using Machine Learning
Muhammad Waqas Shaukat, Rashid Amin, Muhana Magboul Ali Muslam, et al.
Sensors (2023) Vol. 23, Iss. 19, pp. 8070-8070
Open Access | Times Cited: 21
Muhammad Waqas Shaukat, Rashid Amin, Muhana Magboul Ali Muslam, et al.
Sensors (2023) Vol. 23, Iss. 19, pp. 8070-8070
Open Access | Times Cited: 21
Comparative analysis of binary and one-class classification techniques for credit card fraud data
Joffrey L. Leevy, John Hancock, Taghi M. Khoshgoftaar
Journal Of Big Data (2023) Vol. 10, Iss. 1
Open Access | Times Cited: 17
Joffrey L. Leevy, John Hancock, Taghi M. Khoshgoftaar
Journal Of Big Data (2023) Vol. 10, Iss. 1
Open Access | Times Cited: 17
MACHINE LEARNING ALGORITHMS FOR DETECTION OF CYBER THREATS USING LOGISTIC REGRESSION
Hari Gonaygunta
International Journal of Smart Sensor and Adhoc Network (2023), pp. 36-42
Open Access | Times Cited: 13
Hari Gonaygunta
International Journal of Smart Sensor and Adhoc Network (2023), pp. 36-42
Open Access | Times Cited: 13
Android-IoT Malware Classification and Detection Approach Using Deep URL Features Analysis
Farhan Ullah, Xiaochun Cheng, Leonardo Mostarda, et al.
Journal of Database Management (2023) Vol. 34, Iss. 2, pp. 1-26
Open Access | Times Cited: 13
Farhan Ullah, Xiaochun Cheng, Leonardo Mostarda, et al.
Journal of Database Management (2023) Vol. 34, Iss. 2, pp. 1-26
Open Access | Times Cited: 13
An Ensemble-Based Machine Learning-Envisioned Intrusion Detection in Industry 5.0-Driven Healthcare Applications
Mohammad Wazid, Jaskaran Singh, Ashok Kumar Das, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 1, pp. 1903-1912
Closed Access | Times Cited: 11
Mohammad Wazid, Jaskaran Singh, Ashok Kumar Das, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 1, pp. 1903-1912
Closed Access | Times Cited: 11
Efficient usage of web forensics, disk forensics and email forensics in successful investigation of cyber crime
Bishwajeet Pandey, Pushpanjali Pandey, Aitolkyn Kulmuratova, et al.
International Journal of Information Technology (2024) Vol. 16, Iss. 6, pp. 3815-3824
Closed Access | Times Cited: 4
Bishwajeet Pandey, Pushpanjali Pandey, Aitolkyn Kulmuratova, et al.
International Journal of Information Technology (2024) Vol. 16, Iss. 6, pp. 3815-3824
Closed Access | Times Cited: 4
A Malicious Websites Classifier Based on an Improved Relation Network
Qianshi Wang, Chongjun Xu, Huayu Yang, et al.
Lecture notes in computer science (2025), pp. 215-230
Closed Access
Qianshi Wang, Chongjun Xu, Huayu Yang, et al.
Lecture notes in computer science (2025), pp. 215-230
Closed Access
Quantum-Enhanced Machine Learning for Cybersecurity: Evaluating Malicious URL Detection
Lauren Eze, Umair B. Chaudhry, Hamid Jahankhani
Electronics (2025) Vol. 14, Iss. 9, pp. 1827-1827
Open Access
Lauren Eze, Umair B. Chaudhry, Hamid Jahankhani
Electronics (2025) Vol. 14, Iss. 9, pp. 1827-1827
Open Access
QsecR: Secure QR Code Scanner According to a Novel Malicious URL Detection Framework
Ahmad Sahban Rafsanjani, Norshaliza Kamaruddin, Hazlifah Mohd Rusli, et al.
IEEE Access (2023) Vol. 11, pp. 92523-92539
Open Access | Times Cited: 9
Ahmad Sahban Rafsanjani, Norshaliza Kamaruddin, Hazlifah Mohd Rusli, et al.
IEEE Access (2023) Vol. 11, pp. 92523-92539
Open Access | Times Cited: 9
Characteristics of Understanding URLs and Domain Names Features: The Detection of Phishing Websites With Machine Learning Methods
İlker Kara, Murathan Ok, Ahmet Ozaday
IEEE Access (2022) Vol. 10, pp. 124420-124428
Open Access | Times Cited: 13
İlker Kara, Murathan Ok, Ahmet Ozaday
IEEE Access (2022) Vol. 10, pp. 124420-124428
Open Access | Times Cited: 13
Detection of malicious URLs using machine learning
Nuria Reyes-Dorta, Pino Caballero‐Gil, Carlos Rosa-Remedios
Wireless Networks (2024) Vol. 30, Iss. 9, pp. 7543-7560
Open Access | Times Cited: 2
Nuria Reyes-Dorta, Pino Caballero‐Gil, Carlos Rosa-Remedios
Wireless Networks (2024) Vol. 30, Iss. 9, pp. 7543-7560
Open Access | Times Cited: 2
Enhancing Online Security: A Novel Machine Learning Framework for Robust Detection of Known and Unknown Malicious URLs
S. P. Li, Omar Dib
Journal of theoretical and applied electronic commerce research (2024) Vol. 19, Iss. 4, pp. 2919-2960
Open Access | Times Cited: 2
S. P. Li, Omar Dib
Journal of theoretical and applied electronic commerce research (2024) Vol. 19, Iss. 4, pp. 2919-2960
Open Access | Times Cited: 2
Region based Detection of Ships from Remote Sensing Satellite Imagery using Deep Learning
Anusha Ch, Ch. Rupa, G. Samhitha
2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM) (2022), pp. 118-122
Closed Access | Times Cited: 10
Anusha Ch, Ch. Rupa, G. Samhitha
2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM) (2022), pp. 118-122
Closed Access | Times Cited: 10
Jointly beam stealing attackers detection and localization without training: an image processing viewpoint
Yaoqi Yang, Xianglin Wei, Renhui Xu, et al.
Frontiers of Computer Science (2022) Vol. 17, Iss. 3
Closed Access | Times Cited: 9
Yaoqi Yang, Xianglin Wei, Renhui Xu, et al.
Frontiers of Computer Science (2022) Vol. 17, Iss. 3
Closed Access | Times Cited: 9
Evading obscure communication from spam emails
Khan Farhan Rafat, Qin Xin, Abdul Rehman Javed, et al.
Mathematical Biosciences & Engineering (2021) Vol. 19, Iss. 2, pp. 1926-1943
Open Access | Times Cited: 11
Khan Farhan Rafat, Qin Xin, Abdul Rehman Javed, et al.
Mathematical Biosciences & Engineering (2021) Vol. 19, Iss. 2, pp. 1926-1943
Open Access | Times Cited: 11
Classification of Phishing Websites using Machine Learning Models
Santhosh Raminedi, Trilok Nath Pandey, Venkat Amith Woonna, et al.
(2023), pp. 1-5
Closed Access | Times Cited: 4
Santhosh Raminedi, Trilok Nath Pandey, Venkat Amith Woonna, et al.
(2023), pp. 1-5
Closed Access | Times Cited: 4
Improving Medicare Fraud Detection through Big Data Size Reduction Techniques
Huanjing Wang, John Hancock, Taghi M. Khoshgoftaar
(2023), pp. 208-217
Closed Access | Times Cited: 4
Huanjing Wang, John Hancock, Taghi M. Khoshgoftaar
(2023), pp. 208-217
Closed Access | Times Cited: 4
A Heterogeneous Machine Learning Ensemble Framework for Malicious Webpage Detection
Sam-Shin Shin, Seung-Goo Ji, Sung-Sam Hong
Applied Sciences (2022) Vol. 12, Iss. 23, pp. 12070-12070
Open Access | Times Cited: 7
Sam-Shin Shin, Seung-Goo Ji, Sung-Sam Hong
Applied Sciences (2022) Vol. 12, Iss. 23, pp. 12070-12070
Open Access | Times Cited: 7
Multi-Modal Features Representation-Based Convolutional Neural Network Model for Malicious Website Detection
Mohammed Alsaedi, Fuad A. Ghaleb, Faisal Saeed, et al.
IEEE Access (2023) Vol. 12, pp. 7271-7284
Open Access | Times Cited: 3
Mohammed Alsaedi, Fuad A. Ghaleb, Faisal Saeed, et al.
IEEE Access (2023) Vol. 12, pp. 7271-7284
Open Access | Times Cited: 3
Detection of Malicious URLs through an Ensemble of Machine Learning Techniques
Shreya Venugopal, Shreya Yuvraj Panale, Manav Agarwal, et al.
2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE) (2021), pp. 1-6
Closed Access | Times Cited: 7
Shreya Venugopal, Shreya Yuvraj Panale, Manav Agarwal, et al.
2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE) (2021), pp. 1-6
Closed Access | Times Cited: 7
URL filtering using machine learning algorithms
Asia Othman Aljahdali, Shoroq Banafee, Thana Aljohani
Information Security Journal A Global Perspective (2023) Vol. 33, Iss. 3, pp. 193-203
Closed Access | Times Cited: 2
Asia Othman Aljahdali, Shoroq Banafee, Thana Aljohani
Information Security Journal A Global Perspective (2023) Vol. 33, Iss. 3, pp. 193-203
Closed Access | Times Cited: 2
Detecting Malicious URLs using Lexical Analysis and Network Activities
Amit Kumar, Soumyadev Maity
2022 4th International Conference on Inventive Research in Computing Applications (ICIRCA) (2022)
Closed Access | Times Cited: 4
Amit Kumar, Soumyadev Maity
2022 4th International Conference on Inventive Research in Computing Applications (ICIRCA) (2022)
Closed Access | Times Cited: 4