
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Blockchain-Enabled Authentication Handover With Efficient Privacy Protection in SDN-Based 5G Networks
Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha, et al.
IEEE Transactions on Network Science and Engineering (2019) Vol. 8, Iss. 2, pp. 1120-1132
Open Access | Times Cited: 88
Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha, et al.
IEEE Transactions on Network Science and Engineering (2019) Vol. 8, Iss. 2, pp. 1120-1132
Open Access | Times Cited: 88
Showing 26-50 of 88 citing articles:
Is 5G Handover Secure and Private? A Survey
Dongsheng Zhao, Zheng Yan, Mingjun Wang, et al.
IEEE Internet of Things Journal (2021) Vol. 8, Iss. 16, pp. 12855-12879
Open Access | Times Cited: 33
Dongsheng Zhao, Zheng Yan, Mingjun Wang, et al.
IEEE Internet of Things Journal (2021) Vol. 8, Iss. 16, pp. 12855-12879
Open Access | Times Cited: 33
The DAG blockchain: A secure edge assisted honeypot for attack detection and multi-controller based load balancing in SDN 5G
Ihsan H. Abdulqadder, Deqing Zou, Israa T. Aziz
Future Generation Computer Systems (2022) Vol. 141, pp. 339-354
Closed Access | Times Cited: 24
Ihsan H. Abdulqadder, Deqing Zou, Israa T. Aziz
Future Generation Computer Systems (2022) Vol. 141, pp. 339-354
Closed Access | Times Cited: 24
Neuro-Fuzzy Based Handover Authentication Protocol for Ultra Dense 5G Networks
Vincent Omollo Nyangaresi, Anthony Rodrigues, Silvance O. Abeka
(2020), pp. 339-344
Closed Access | Times Cited: 38
Vincent Omollo Nyangaresi, Anthony Rodrigues, Silvance O. Abeka
(2020), pp. 339-344
Closed Access | Times Cited: 38
Public Blockchains Scalability: An Examination of Sharding and Segregated Witness
Amritraj Singh, Reza M. Parizi, Meng Han, et al.
Advances in information security (2020), pp. 203-232
Closed Access | Times Cited: 36
Amritraj Singh, Reza M. Parizi, Meng Han, et al.
Advances in information security (2020), pp. 203-232
Closed Access | Times Cited: 36
Making Sense of Blockchain for AI Deepfakes Technology
Abbas Yazdinejad, Reza M. Parizi, Gautam Srivastava, et al.
2022 IEEE Globecom Workshops (GC Wkshps) (2020), pp. 1-6
Closed Access | Times Cited: 35
Abbas Yazdinejad, Reza M. Parizi, Gautam Srivastava, et al.
2022 IEEE Globecom Workshops (GC Wkshps) (2020), pp. 1-6
Closed Access | Times Cited: 35
Impact of Temporary Fork on the Evolution of Mining Pools in Blockchain Networks: An Evolutionary Game Analysis
Canhui Chen, Chen Xu, Jiangshan Yu, et al.
IEEE Transactions on Network Science and Engineering (2020) Vol. 8, Iss. 1, pp. 400-418
Open Access | Times Cited: 33
Canhui Chen, Chen Xu, Jiangshan Yu, et al.
IEEE Transactions on Network Science and Engineering (2020) Vol. 8, Iss. 1, pp. 400-418
Open Access | Times Cited: 33
Mobility Management for Blockchain-Based Ultra-Dense Edge Computing: A Deep Reinforcement Learning Approach
Haibin Zhang, Rong Wang, Wen Sun, et al.
IEEE Transactions on Wireless Communications (2021) Vol. 20, Iss. 11, pp. 7346-7359
Open Access | Times Cited: 31
Haibin Zhang, Rong Wang, Wen Sun, et al.
IEEE Transactions on Wireless Communications (2021) Vol. 20, Iss. 11, pp. 7346-7359
Open Access | Times Cited: 31
Evolving Requirements and Application of SDN and IoT in the Context of Industry 4.0, Blockchain and Artificial Intelligence
Sunil K. Singh, Sunil Kr Sharma, Dipesh Singla, et al.
(2022), pp. 427-496
Closed Access | Times Cited: 19
Sunil K. Singh, Sunil Kr Sharma, Dipesh Singla, et al.
(2022), pp. 427-496
Closed Access | Times Cited: 19
Highly secured authentication and fast handover scheme for mobility management in 5G vehicular networks
Prabhakar Krishnan, Kurunandan Jain, Ala-Saleh D. Alluhaidan, et al.
Computers & Electrical Engineering (2024) Vol. 116, pp. 109152-109152
Closed Access | Times Cited: 3
Prabhakar Krishnan, Kurunandan Jain, Ala-Saleh D. Alluhaidan, et al.
Computers & Electrical Engineering (2024) Vol. 116, pp. 109152-109152
Closed Access | Times Cited: 3
ANN-FL Secure Handover Protocol for 5G and Beyond Networks
Vincent Omollo Nyangaresi, Anthony Rodrigues, Silvance O. Abeka
Springer eBooks (2021), pp. 99-118
Closed Access | Times Cited: 18
Vincent Omollo Nyangaresi, Anthony Rodrigues, Silvance O. Abeka
Springer eBooks (2021), pp. 99-118
Closed Access | Times Cited: 18
Distributed ledger technologies for authentication and access control in networking applications: A comprehensive survey
Fariba Ghaffari, E. Bertin, Noël Crespi, et al.
Computer Science Review (2023) Vol. 50, pp. 100590-100590
Closed Access | Times Cited: 7
Fariba Ghaffari, E. Bertin, Noël Crespi, et al.
Computer Science Review (2023) Vol. 50, pp. 100590-100590
Closed Access | Times Cited: 7
SOMNet: Self-Optimizing mobility management for resilient 5G heterogeneous networks
Abdulraqeb Alhammadi, Zool Hilmi Ismail, Ibraheem Shayea, et al.
Engineering Science and Technology an International Journal (2024) Vol. 52, pp. 101671-101671
Open Access | Times Cited: 2
Abdulraqeb Alhammadi, Zool Hilmi Ismail, Ibraheem Shayea, et al.
Engineering Science and Technology an International Journal (2024) Vol. 52, pp. 101671-101671
Open Access | Times Cited: 2
Robotic Process Automation in Cyber Security Operations: Optimizing Workflows with AI-Driven Automation
Et al. Dharmesh Dhabliya
Deleted Journal (2024) Vol. 19, Iss. 3, pp. 96-105
Open Access | Times Cited: 2
Et al. Dharmesh Dhabliya
Deleted Journal (2024) Vol. 19, Iss. 3, pp. 96-105
Open Access | Times Cited: 2
6G and V2X Communications: Applications, Features, and Challenges
Hamza Ouamna, Zhour Madini, Younes Zouine
2018 4th International Conference on Optimization and Applications (ICOA) (2022), pp. 1-6
Closed Access | Times Cited: 10
Hamza Ouamna, Zhour Madini, Younes Zouine
2018 4th International Conference on Optimization and Applications (ICOA) (2022), pp. 1-6
Closed Access | Times Cited: 10
A Machine Learning-based SDN Controller Framework for Drone Management
Abbas Yazdinejad, Elnaz Rabieinejad, Ali Dehghantanha, et al.
2022 IEEE Globecom Workshops (GC Wkshps) (2021), pp. 1-6
Closed Access | Times Cited: 14
Abbas Yazdinejad, Elnaz Rabieinejad, Ali Dehghantanha, et al.
2022 IEEE Globecom Workshops (GC Wkshps) (2021), pp. 1-6
Closed Access | Times Cited: 14
BlockHDFS: Blockchain-integrated Hadoop distributed file system for secure provenance traceability
Viraaji Mothukuri, Sai S. Cheerla, Reza M. Parizi, et al.
Blockchain Research and Applications (2021) Vol. 2, Iss. 4, pp. 100032-100032
Open Access | Times Cited: 13
Viraaji Mothukuri, Sai S. Cheerla, Reza M. Parizi, et al.
Blockchain Research and Applications (2021) Vol. 2, Iss. 4, pp. 100032-100032
Open Access | Times Cited: 13
Topic Modeling: Exploring the Processes, Tools, Challenges and Applications
Kazem Taghandiki, Mohammad Mohammadi
(2023)
Open Access | Times Cited: 5
Kazem Taghandiki, Mohammad Mohammadi
(2023)
Open Access | Times Cited: 5
EFFICIENT PRIVACY PRESERVING MEDICAL DIAGNOSIS ON EDGE COMPUTING PLATFORMS
Jayrajan Dr. Jayrajan
Journal of Science and Technology (2024) Vol. 9, Iss. 1, pp. 1-10
Open Access | Times Cited: 1
Jayrajan Dr. Jayrajan
Journal of Science and Technology (2024) Vol. 9, Iss. 1, pp. 1-10
Open Access | Times Cited: 1
Security and Privacy Challenges in SDN-Enabled IoT Systems: Causes, Proposed Solutions, and Future Directions
Ahmad Rahdari, Ahmad Jalili, Mehdi Esnaashari, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 80, Iss. 2, pp. 2511-2533
Open Access | Times Cited: 1
Ahmad Rahdari, Ahmad Jalili, Mehdi Esnaashari, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 80, Iss. 2, pp. 2511-2533
Open Access | Times Cited: 1
Joint energy efficiency and network optimization for integrated blockchain-SDN-based internet of things networks
Akram Hakiri, Bassem Sellami, Sadok Ben Yahia
Future Generation Computer Systems (2024) Vol. 163, pp. 107519-107519
Closed Access | Times Cited: 1
Akram Hakiri, Bassem Sellami, Sadok Ben Yahia
Future Generation Computer Systems (2024) Vol. 163, pp. 107519-107519
Closed Access | Times Cited: 1
BlockREV: Blockchain-Enabled Multi-Controller Rule Enforcement Verification in SDN
Ping Li, Songtao Guo, Jiahui Wu, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-16
Open Access | Times Cited: 7
Ping Li, Songtao Guo, Jiahui Wu, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-16
Open Access | Times Cited: 7
Trustzone-based secure lightweight wallet for hyperledger fabric
Weiqi Dai, Qinyuan Wang, Zeli Wang, et al.
Journal of Parallel and Distributed Computing (2020) Vol. 149, pp. 66-75
Closed Access | Times Cited: 10
Weiqi Dai, Qinyuan Wang, Zeli Wang, et al.
Journal of Parallel and Distributed Computing (2020) Vol. 149, pp. 66-75
Closed Access | Times Cited: 10
Blockchain in Cybersecurity Realm: An Overview
Reza M. Parizi, Ali Dehghantanha, Amin Azmoodeh, et al.
Advances in information security (2020), pp. 1-5
Closed Access | Times Cited: 9
Reza M. Parizi, Ali Dehghantanha, Amin Azmoodeh, et al.
Advances in information security (2020), pp. 1-5
Closed Access | Times Cited: 9
Secure Blockchain-Based Traffic Load Balancing Using Edge Computing and Reinforcement Learning
Kevin Tiba, Reza M. Parizi, Qi Zhang, et al.
Advances in information security (2020), pp. 99-128
Closed Access | Times Cited: 9
Kevin Tiba, Reza M. Parizi, Qi Zhang, et al.
Advances in information security (2020), pp. 99-128
Closed Access | Times Cited: 9
A Blockchain-Based Authentication and Service Provision Scheme for Intemet of Things
Mei‐Juan Chen, Chen Tan, Xiaorong Zhu, et al.
2022 IEEE Globecom Workshops (GC Wkshps) (2020)
Closed Access | Times Cited: 9
Mei‐Juan Chen, Chen Tan, Xiaorong Zhu, et al.
2022 IEEE Globecom Workshops (GC Wkshps) (2020)
Closed Access | Times Cited: 9