
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Achieving a consensual definition of phishing based on a systematic review of the literature
Elmer Lastdrager
Crime Science (2014) Vol. 3, Iss. 1
Open Access | Times Cited: 111
Elmer Lastdrager
Crime Science (2014) Vol. 3, Iss. 1
Open Access | Times Cited: 111
Showing 1-25 of 111 citing articles:
A survey of phishing attacks: Their types, vectors and technical approaches
Kang Leng Chiew, Kelvin S. C. Yong, Choon Lin Tan
Expert Systems with Applications (2018) Vol. 106, pp. 1-20
Open Access | Times Cited: 236
Kang Leng Chiew, Kelvin S. C. Yong, Choon Lin Tan
Expert Systems with Applications (2018) Vol. 106, pp. 1-20
Open Access | Times Cited: 236
A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques
Said A. Salloum, Tarek Gaber, Sunil Vadera, et al.
IEEE Access (2022) Vol. 10, pp. 65703-65727
Open Access | Times Cited: 97
Said A. Salloum, Tarek Gaber, Sunil Vadera, et al.
IEEE Access (2022) Vol. 10, pp. 65703-65727
Open Access | Times Cited: 97
Mitigation strategies against the phishing attacks: A systematic literature review
Bilal Naqvi, Kseniia Perova, Ali Farooq, et al.
Computers & Security (2023) Vol. 132, pp. 103387-103387
Open Access | Times Cited: 49
Bilal Naqvi, Kseniia Perova, Ali Farooq, et al.
Computers & Security (2023) Vol. 132, pp. 103387-103387
Open Access | Times Cited: 49
A survey and classification of web phishing detection schemes
Gaurav Varshney, Manoj Misra, Pradeep K. Atrey
Security and Communication Networks (2016) Vol. 9, Iss. 18, pp. 6266-6284
Closed Access | Times Cited: 122
Gaurav Varshney, Manoj Misra, Pradeep K. Atrey
Security and Communication Networks (2016) Vol. 9, Iss. 18, pp. 6266-6284
Closed Access | Times Cited: 122
Cybercriminal Networks, Social Ties and Online Forums: Social Ties Versus Digital Ties within Phishing and Malware Networks
Rutger Leukfeldt, E.R. Kleemans, Wouter Stol
The British Journal of Criminology (2016), pp. azw009-azw009
Open Access | Times Cited: 112
Rutger Leukfeldt, E.R. Kleemans, Wouter Stol
The British Journal of Criminology (2016), pp. azw009-azw009
Open Access | Times Cited: 112
Susceptibility to phishing on social network sites: A personality information processing model
Edwin Donald Frauenstein, Stephen Flowerday
Computers & Security (2020) Vol. 94, pp. 101862-101862
Open Access | Times Cited: 107
Edwin Donald Frauenstein, Stephen Flowerday
Computers & Security (2020) Vol. 94, pp. 101862-101862
Open Access | Times Cited: 107
Baiting the hook: factors impacting susceptibility to phishing attacks
Cristian Iuga, Jason R. C. Nurse, Arnau Erola
Human-centric Computing and Information Sciences (2016) Vol. 6, Iss. 1
Open Access | Times Cited: 101
Cristian Iuga, Jason R. C. Nurse, Arnau Erola
Human-centric Computing and Information Sciences (2016) Vol. 6, Iss. 1
Open Access | Times Cited: 101
Organised Cybercrime or Cybercrime that is Organised? An Assessment of the Conceptualisation of Financial Cybercrime as Organised Crime
Rutger Leukfeldt, Anita Lavorgna, E.R. Kleemans
European Journal on Criminal Policy and Research (2016) Vol. 23, Iss. 3, pp. 287-300
Open Access | Times Cited: 91
Rutger Leukfeldt, Anita Lavorgna, E.R. Kleemans
European Journal on Criminal Policy and Research (2016) Vol. 23, Iss. 3, pp. 287-300
Open Access | Times Cited: 91
Investigating and comparing the predictors of the intention towards taking security measures against malware, scams and cybercrime in general
Marijn Martens, Ralf De Wolf, Lieven De Marez
Computers in Human Behavior (2018) Vol. 92, pp. 139-150
Closed Access | Times Cited: 87
Marijn Martens, Ralf De Wolf, Lieven De Marez
Computers in Human Behavior (2018) Vol. 92, pp. 139-150
Closed Access | Times Cited: 87
A hybrid DNN–LSTM model for detecting phishing URLs
Alper Özcan, Cagatay Catal, Emrah Dönmez, et al.
Neural Computing and Applications (2021) Vol. 35, Iss. 7, pp. 4957-4973
Open Access | Times Cited: 81
Alper Özcan, Cagatay Catal, Emrah Dönmez, et al.
Neural Computing and Applications (2021) Vol. 35, Iss. 7, pp. 4957-4973
Open Access | Times Cited: 81
A Phishing-Attack-Detection Model Using Natural Language Processing and Deep Learning
Eduardo Benavides-Astudillo, Walter Fuertes, Sandra Sánchez-Gordón, et al.
Applied Sciences (2023) Vol. 13, Iss. 9, pp. 5275-5275
Open Access | Times Cited: 23
Eduardo Benavides-Astudillo, Walter Fuertes, Sandra Sánchez-Gordón, et al.
Applied Sciences (2023) Vol. 13, Iss. 9, pp. 5275-5275
Open Access | Times Cited: 23
Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks
Prashanth Rajivan, Cleotilde González
Frontiers in Psychology (2018) Vol. 9
Open Access | Times Cited: 74
Prashanth Rajivan, Cleotilde González
Frontiers in Psychology (2018) Vol. 9
Open Access | Times Cited: 74
Origin, growth and criminal capabilities of cybercriminal networks. An international empirical analysis
Rutger Leukfeldt, E.R. Kleemans, Wouter Stol
Crime Law and Social Change (2016) Vol. 67, Iss. 1, pp. 39-53
Closed Access | Times Cited: 66
Rutger Leukfeldt, E.R. Kleemans, Wouter Stol
Crime Law and Social Change (2016) Vol. 67, Iss. 1, pp. 39-53
Closed Access | Times Cited: 66
A typology of cybercriminal networks: from low-tech all-rounders to high-tech specialists
Rutger Leukfeldt, E.R. Kleemans, Wouter Stol
Crime Law and Social Change (2016) Vol. 67, Iss. 1, pp. 21-37
Closed Access | Times Cited: 63
Rutger Leukfeldt, E.R. Kleemans, Wouter Stol
Crime Law and Social Change (2016) Vol. 67, Iss. 1, pp. 21-37
Closed Access | Times Cited: 63
Individual Cyber Security: Empowering Employees to Resist Spear Phishing to Prevent Identity Theft and Ransomware Attacks
Jason Thomas
International Journal of Business and Management (2018) Vol. 13, Iss. 6, pp. 1-1
Open Access | Times Cited: 57
Jason Thomas
International Journal of Business and Management (2018) Vol. 13, Iss. 6, pp. 1-1
Open Access | Times Cited: 57
The design and evaluation of a theory-based intervention to promote security behaviour against phishing
Jurjen Jansen, Paul van Schaik
International Journal of Human-Computer Studies (2018) Vol. 123, pp. 40-55
Open Access | Times Cited: 54
Jurjen Jansen, Paul van Schaik
International Journal of Human-Computer Studies (2018) Vol. 123, pp. 40-55
Open Access | Times Cited: 54
The Use of Online Crime Markets by Cybercriminal Networks: A View From Within
Rutger Leukfeldt, E.R. Kleemans, Wouter Stol
American Behavioral Scientist (2017) Vol. 61, Iss. 11, pp. 1387-1402
Open Access | Times Cited: 51
Rutger Leukfeldt, E.R. Kleemans, Wouter Stol
American Behavioral Scientist (2017) Vol. 61, Iss. 11, pp. 1387-1402
Open Access | Times Cited: 51
Phishing and Malware Attacks on Online Banking Customers in the Netherlands: A Qualitative Analysis of Factors Leading to Victimization
Jurjen Jansen, Rutger Leukfeldt
International journal of cyber criminology (2016) Vol. 10, Iss. 1, pp. 79
Closed Access | Times Cited: 48
Jurjen Jansen, Rutger Leukfeldt
International journal of cyber criminology (2016) Vol. 10, Iss. 1, pp. 79
Closed Access | Times Cited: 48
From Feature Engineering and Topics Models to Enhanced Prediction Rates in Phishing Detection
Éder Souza Gualberto, Rafael T. de Sousa, Thiago Pereira De Brito Vieira, et al.
IEEE Access (2020) Vol. 8, pp. 76368-76385
Open Access | Times Cited: 47
Éder Souza Gualberto, Rafael T. de Sousa, Thiago Pereira De Brito Vieira, et al.
IEEE Access (2020) Vol. 8, pp. 76368-76385
Open Access | Times Cited: 47
Deep Character-Level Anomaly Detection Based on a Convolutional Autoencoder for Zero-Day Phishing URL Detection
Seok-Jun Bu, Sung-Bae Cho
Electronics (2021) Vol. 10, Iss. 12, pp. 1492-1492
Open Access | Times Cited: 39
Seok-Jun Bu, Sung-Bae Cho
Electronics (2021) Vol. 10, Iss. 12, pp. 1492-1492
Open Access | Times Cited: 39
Hybrid Rule-Based Solution for Phishing URL Detection Using Convolutional Neural Network
Youness Mourtaji, Mohammed Bouhorma, Daniyal Alghazzawi, et al.
Wireless Communications and Mobile Computing (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 37
Youness Mourtaji, Mohammed Bouhorma, Daniyal Alghazzawi, et al.
Wireless Communications and Mobile Computing (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 37
Spear phishing in organisations explained
Jan-Willem Bullée, Lorena Montoya, Marianne Junger, et al.
Information and Computer Security (2017) Vol. 25, Iss. 5, pp. 593-613
Open Access | Times Cited: 47
Jan-Willem Bullée, Lorena Montoya, Marianne Junger, et al.
Information and Computer Security (2017) Vol. 25, Iss. 5, pp. 593-613
Open Access | Times Cited: 47
Phishing Email Detection using Persuasion Cues
Rohit Valecha, Pranali Mandaokar, H. Raghav Rao
IEEE Transactions on Dependable and Secure Computing (2021), pp. 1-1
Open Access | Times Cited: 31
Rohit Valecha, Pranali Mandaokar, H. Raghav Rao
IEEE Transactions on Dependable and Secure Computing (2021), pp. 1-1
Open Access | Times Cited: 31
Cybercrime on the menu? Examining cafeteria-style offending among financially motivated cybercriminals
Rutger Leukfeldt, Thomas J. Holt
Computers in Human Behavior (2021) Vol. 126, pp. 106979-106979
Open Access | Times Cited: 30
Rutger Leukfeldt, Thomas J. Holt
Computers in Human Behavior (2021) Vol. 126, pp. 106979-106979
Open Access | Times Cited: 30
Unraveling the crime scripts of phishing networks: an analysis of 45 court cases in the Netherlands
Joeri Loggen, Rutger Leukfeldt
Trends in Organized Crime (2022) Vol. 25, Iss. 2, pp. 205-225
Closed Access | Times Cited: 20
Joeri Loggen, Rutger Leukfeldt
Trends in Organized Crime (2022) Vol. 25, Iss. 2, pp. 205-225
Closed Access | Times Cited: 20