
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Cooperative and feedback based authentic routing protocol for energy efficient IoT systems
A. Gayathri, A. V. Prabu, S. Rajasoundaran, et al.
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 11
Closed Access | Times Cited: 18
A. Gayathri, A. V. Prabu, S. Rajasoundaran, et al.
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 11
Closed Access | Times Cited: 18
Showing 18 citing articles:
Collaborative Energy-Efficient Routing Protocol for Sustainable Communication in 5G/6G Wireless Sensor Networks
H L Gururaj, Rajesh Natarajan, Nouf Abdullah Almujally, et al.
IEEE Open Journal of the Communications Society (2023) Vol. 4, pp. 2050-2061
Open Access | Times Cited: 33
H L Gururaj, Rajesh Natarajan, Nouf Abdullah Almujally, et al.
IEEE Open Journal of the Communications Society (2023) Vol. 4, pp. 2050-2061
Open Access | Times Cited: 33
A secured trusted routing using the structure of a novel directed acyclic graph-blockchain in mobile ad hoc network internet of things environment
N. Ilakkiya, A. Rajaram
Multimedia Tools and Applications (2024) Vol. 83, Iss. 40, pp. 87903-87928
Closed Access | Times Cited: 8
N. Ilakkiya, A. Rajaram
Multimedia Tools and Applications (2024) Vol. 83, Iss. 40, pp. 87903-87928
Closed Access | Times Cited: 8
F-EVM: improving routing in Internet of Things using fuzzy MAIRCA approach and fuzzy eigenvector method
Mohammad Mohammadi, Amin Mehranzadeh, Mohsen Chekin
Cluster Computing (2024) Vol. 27, Iss. 4, pp. 5121-5141
Closed Access | Times Cited: 7
Mohammad Mohammadi, Amin Mehranzadeh, Mohsen Chekin
Cluster Computing (2024) Vol. 27, Iss. 4, pp. 5121-5141
Closed Access | Times Cited: 7
Modern Energy Optimization Approach for Efficient Data Communication in IoT-Based Wireless Sensor Networks
L. Sathish Kumar, Sultan Ahmad, Sidheswar Routray, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-13
Open Access | Times Cited: 23
L. Sathish Kumar, Sultan Ahmad, Sidheswar Routray, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-13
Open Access | Times Cited: 23
A Machine Learning-Based Cross-Layer DoS Attack Detection Technique for IoT
Aditi Paul, Suresh Chaudhary, Somnath Sinha
Lecture notes in networks and systems (2025), pp. 11-23
Closed Access
Aditi Paul, Suresh Chaudhary, Somnath Sinha
Lecture notes in networks and systems (2025), pp. 11-23
Closed Access
Energy-Efficient Network Protocols and Resilient Data Transmission Schemes for Wireless Sensor Networks—An Experimental Survey
Dharmesh Dhabliya, S. Rajasoundaran, Parthiban Selvarasu, et al.
Energies (2022) Vol. 15, Iss. 23, pp. 8883-8883
Open Access | Times Cited: 18
Dharmesh Dhabliya, S. Rajasoundaran, Parthiban Selvarasu, et al.
Energies (2022) Vol. 15, Iss. 23, pp. 8883-8883
Open Access | Times Cited: 18
Multi-antenna relay based cyber-physical systems in smart-healthcare NTNs: an explainable AI approach
Sunil Pattepu, Amrit Mukherjee, Sidheswar Routray, et al.
Cluster Computing (2022) Vol. 26, Iss. 4, pp. 2259-2269
Closed Access | Times Cited: 15
Sunil Pattepu, Amrit Mukherjee, Sidheswar Routray, et al.
Cluster Computing (2022) Vol. 26, Iss. 4, pp. 2259-2269
Closed Access | Times Cited: 15
Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks
S. Rajasoundaran, R. Maheswar, Akila Muthuramalingam, et al.
Sensors (2022) Vol. 22, Iss. 20, pp. 8046-8046
Open Access | Times Cited: 4
S. Rajasoundaran, R. Maheswar, Akila Muthuramalingam, et al.
Sensors (2022) Vol. 22, Iss. 20, pp. 8046-8046
Open Access | Times Cited: 4
Internet of Things routing protocol with mobility awareness and energy efficiency
Birendra Kumar Chauhan, M. Banupriya, K. Venkatagurunatham, et al.
(2023), pp. 437-441
Closed Access | Times Cited: 2
Birendra Kumar Chauhan, M. Banupriya, K. Venkatagurunatham, et al.
(2023), pp. 437-441
Closed Access | Times Cited: 2
Energy-efficient Neuro-fuzzy-based Multi-node Charging Model for WRSNs using Multiple Mobile Charging Vehicles
H Hingoliwala, Naween Kumar, Anand Nayyar, et al.
Computer Communications (2024) Vol. 216, pp. 356-373
Closed Access
H Hingoliwala, Naween Kumar, Anand Nayyar, et al.
Computer Communications (2024) Vol. 216, pp. 356-373
Closed Access
Enhancing Renewable Energy Storage Conversion Efficiency using ERFE with FFNN
Elqui Yeye Pari-Condori, Ganga Rama Koteswara Rao, Rasheed Abdulkader, et al.
Journal of Machine and Computing (2024), pp. 40-48
Open Access
Elqui Yeye Pari-Condori, Ganga Rama Koteswara Rao, Rasheed Abdulkader, et al.
Journal of Machine and Computing (2024), pp. 40-48
Open Access
Optimizing Building Energy Management with Deep Reinforcement Learning for Smart and Sustainable Infrastructure
Nabeel S. Alsharafa, R. Suguna, Raguru Jaya Krishna, et al.
Journal of Machine and Computing (2024), pp. 381-391
Open Access
Nabeel S. Alsharafa, R. Suguna, Raguru Jaya Krishna, et al.
Journal of Machine and Computing (2024), pp. 381-391
Open Access
Energy aware optimal routing model for wireless multimedia sensor networks using modified Voronoi assisted prioritized double deep Q‐learning
Suseela Sellamuthu, Krithiga Ravi, M. Revathi, et al.
Concurrency and Computation Practice and Experience (2023) Vol. 36, Iss. 6
Closed Access | Times Cited: 1
Suseela Sellamuthu, Krithiga Ravi, M. Revathi, et al.
Concurrency and Computation Practice and Experience (2023) Vol. 36, Iss. 6
Closed Access | Times Cited: 1
A comprehensive study on energy-efficient-based routing protocols in the Internet of things Part I: definition and classification
Noor Raad Saadallah, Salah Abdulghani Alabady
Iran Journal of Computer Science (2024) Vol. 7, Iss. 3, pp. 631-661
Closed Access
Noor Raad Saadallah, Salah Abdulghani Alabady
Iran Journal of Computer Science (2024) Vol. 7, Iss. 3, pp. 631-661
Closed Access
A deep experimental analysis of energy‐proficient firewall policies and security practices for resource limited wireless networks
S. Rajasoundaran, S. A. Sivakumar, S. Devaraju, et al.
Security and Privacy (2024) Vol. 7, Iss. 6
Open Access
S. Rajasoundaran, S. A. Sivakumar, S. Devaraju, et al.
Security and Privacy (2024) Vol. 7, Iss. 6
Open Access
QoS Authentic Routing protocol for Home-based IoT-based System
Bushra Shahzad Khan, Mukhtiar Ahmed, Shamshad Lakho, et al.
VAWKUM Transactions on Computer Sciences (2024) Vol. 12, Iss. 2, pp. 99-111
Open Access
Bushra Shahzad Khan, Mukhtiar Ahmed, Shamshad Lakho, et al.
VAWKUM Transactions on Computer Sciences (2024) Vol. 12, Iss. 2, pp. 99-111
Open Access
A Trust and Energy based Routing using Gorilla Troops Optimization in RPL Networks
M Savitha, Prabhugoud I. Basarkod
(2023), pp. 1-7
Closed Access
M Savitha, Prabhugoud I. Basarkod
(2023), pp. 1-7
Closed Access
Efficient Key Management Mechanism with Trusted Gateways for Wireless Mesh Networks
Ganesh Reddy Karri, A. V. Prabu, Sidheswar Routray, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-20
Open Access
Ganesh Reddy Karri, A. V. Prabu, Sidheswar Routray, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-20
Open Access