
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Atom search sunflower optimization for trust‐based routing in internet of things
Pramod Jadhav, S. D. Joshi
International Journal of Numerical Modelling Electronic Networks Devices and Fields (2020) Vol. 34, Iss. 3
Closed Access | Times Cited: 15
Pramod Jadhav, S. D. Joshi
International Journal of Numerical Modelling Electronic Networks Devices and Fields (2020) Vol. 34, Iss. 3
Closed Access | Times Cited: 15
Showing 15 citing articles:
A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things
Taief Alaa Al-Amiedy, Mohammed Anbar, Bahari Belaton, et al.
Internet of Things (2023) Vol. 22, pp. 100741-100741
Closed Access | Times Cited: 41
Taief Alaa Al-Amiedy, Mohammed Anbar, Bahari Belaton, et al.
Internet of Things (2023) Vol. 22, pp. 100741-100741
Closed Access | Times Cited: 41
Effective PID controller design using a novel hybrid algorithm for high order systems
Davut İzci, Serdar Ekinci, Abdelazim G. Hussien
PLoS ONE (2023) Vol. 18, Iss. 5, pp. e0286060-e0286060
Open Access | Times Cited: 37
Davut İzci, Serdar Ekinci, Abdelazim G. Hussien
PLoS ONE (2023) Vol. 18, Iss. 5, pp. e0286060-e0286060
Open Access | Times Cited: 37
Atom Search Optimization: a comprehensive review of its variants, applications, and future directions
M.A. El‐Shorbagy, Anas Bouaouda, Laith Abualigah, et al.
PeerJ Computer Science (2025) Vol. 11, pp. e2722-e2722
Open Access
M.A. El‐Shorbagy, Anas Bouaouda, Laith Abualigah, et al.
PeerJ Computer Science (2025) Vol. 11, pp. e2722-e2722
Open Access
Deep Learning Based Attack Detection and QoS Aware Secure Routing Protocol for SDN ‐IoT Network
Manvitha Gali, Aditya Mahamkali
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 6-8
Closed Access
Manvitha Gali, Aditya Mahamkali
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 6-8
Closed Access
An adaptive hybrid atom search optimization with particle swarm optimization and its application to optimal no-load PID design of hydro-turbine governor
Weiguo Zhao, Tiancong Shi, Liying Wang, et al.
Journal of Computational Design and Engineering (2021) Vol. 8, Iss. 5, pp. 1204-1233
Open Access | Times Cited: 36
Weiguo Zhao, Tiancong Shi, Liying Wang, et al.
Journal of Computational Design and Engineering (2021) Vol. 8, Iss. 5, pp. 1204-1233
Open Access | Times Cited: 36
Multi‐objective sunflower optimization: A new hypercubic meta‐heuristic for constrained engineering problems
João Luiz Junho Pereira, Guilherme Ferreira Gomes
Expert Systems (2023) Vol. 40, Iss. 8
Closed Access | Times Cited: 11
João Luiz Junho Pereira, Guilherme Ferreira Gomes
Expert Systems (2023) Vol. 40, Iss. 8
Closed Access | Times Cited: 11
Madathodika Asna, Hussain Shareef, Munir Azam Muhammad, et al.
International Journal of Energy Research (2022) Vol. 46, Iss. 12, pp. 17308-17331
Closed Access | Times Cited: 14
CSADF: ingesting cuckoo search optimization algorithm enabled with fitness function for effective model transformation pertaining to ADF
Pramod Jadhav, Sandeep Dwarkanath Pande, Rahul Joshi, et al.
Multimedia Tools and Applications (2024) Vol. 83, Iss. 33, pp. 79219-79234
Closed Access | Times Cited: 2
Pramod Jadhav, Sandeep Dwarkanath Pande, Rahul Joshi, et al.
Multimedia Tools and Applications (2024) Vol. 83, Iss. 33, pp. 79219-79234
Closed Access | Times Cited: 2
A Comprehensive Analysis on Trust Based Secure Routing Protocol used in Internet of Things (IoTs)
B Shruthi, Channakrishna Raju
(2023), pp. 1-4
Closed Access | Times Cited: 5
B Shruthi, Channakrishna Raju
(2023), pp. 1-4
Closed Access | Times Cited: 5
Review on Security Issues and Applications of Trust Mechanism in Wireless Sensor Networks
Zhengxin Xia, Zhe Wei, Huan Zhang
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-9
Open Access | Times Cited: 8
Zhengxin Xia, Zhe Wei, Huan Zhang
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-9
Open Access | Times Cited: 8
Design of vacuum annealing furnace temperature control system based on GA-Fuzzy-PID algorithm
Jintao Meng, Haitao Gao, Mi-Xue Ruan, et al.
PLoS ONE (2023) Vol. 18, Iss. 11, pp. e0293823-e0293823
Open Access | Times Cited: 4
Jintao Meng, Haitao Gao, Mi-Xue Ruan, et al.
PLoS ONE (2023) Vol. 18, Iss. 11, pp. e0293823-e0293823
Open Access | Times Cited: 4
Energy Efficient Trust Routing Based on Mud Ring Optimization in Wireless Sensor Network
N Maradona, T. Jaya
(2024)
Closed Access
N Maradona, T. Jaya
(2024)
Closed Access
A routing approach based on combination of gray wolf clustering and fuzzy clustering and using multi-criteria decision making approaches for WSN-IoT
Amir M. Rahmani, Amir Haider, Saqib Ali, et al.
Computers & Electrical Engineering (2024) Vol. 122, pp. 109946-109946
Closed Access
Amir M. Rahmani, Amir Haider, Saqib Ali, et al.
Computers & Electrical Engineering (2024) Vol. 122, pp. 109946-109946
Closed Access
Quantum Inspired Binary Atom Search Optimization Algorithm for Charging Station Placement Problem
Madathodika Asna, Hussain Shareef, Achikkulath Prasanthi
(2023), pp. 2315-2322
Closed Access | Times Cited: 1
Madathodika Asna, Hussain Shareef, Achikkulath Prasanthi
(2023), pp. 2315-2322
Closed Access | Times Cited: 1
Attack detection and mitigation using optimal deep maxout network in cloud computing
Shubangini Patil, Rekha Patil
International Journal of Adaptive Control and Signal Processing (2022) Vol. 36, Iss. 9, pp. 2217-2237
Closed Access | Times Cited: 2
Shubangini Patil, Rekha Patil
International Journal of Adaptive Control and Signal Processing (2022) Vol. 36, Iss. 9, pp. 2217-2237
Closed Access | Times Cited: 2
Big data clustering using fractional sail fish-sparse fuzzy C-means and particle whale optimization based MapReduce framework
Omkaresh Kulkarni, Ravi Sankar Vadali
Web Intelligence (2022) Vol. 20, Iss. 3, pp. 153-171
Closed Access
Omkaresh Kulkarni, Ravi Sankar Vadali
Web Intelligence (2022) Vol. 20, Iss. 3, pp. 153-171
Closed Access