OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Selfish node detection in ad hoc networks based on fuzzy logic
Homa Hasani, Shahram Babaie
Neural Computing and Applications (2018) Vol. 31, Iss. 10, pp. 6079-6090
Closed Access | Times Cited: 24

Showing 24 citing articles:

A selfish node trust aware with Optimized Clustering for reliable routing protocol in Manet
K. Nirmaladevi, K. Prabha
Measurement Sensors (2023) Vol. 26, pp. 100680-100680
Open Access | Times Cited: 23

Green Internet of Things (GIoT): Vision, applications and research challenges
Ali Eslami Varjovi, Shahram Babaie
Sustainable Computing Informatics and Systems (2020) Vol. 28, pp. 100448-100448
Closed Access | Times Cited: 47

Selfishness in Mobile Ad-Hoc Networks: A Literature Review on Detection Techniques and Prevention Mechanisms
D. Kampitaki, Anastasios A. Economides
IEEE Access (2023) Vol. 11, pp. 86895-86909
Open Access | Times Cited: 10

DEHCIC: A distributed energy-aware hexagon based clustering algorithm to improve coverage in wireless sensor networks
Somaieh Zakariayi, Shahram Babaie
Peer-to-Peer Networking and Applications (2018) Vol. 12, Iss. 4, pp. 689-704
Closed Access | Times Cited: 27

An artificial immune system‐based algorithm for selfish node detection in Mobile Ad Hoc Networks (MANETs)
M. S. Gowtham, M. Vigenesh, M. Ramkumar
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 2
Closed Access | Times Cited: 2

Fuzzy logic-based modelling of yield strength of as-cast A356 alloy
Vladimir Tarasov, He Tan, Anders E. W. Jarfors, et al.
Neural Computing and Applications (2019) Vol. 32, Iss. 10, pp. 5833-5844
Open Access | Times Cited: 21

Fusion protocol for improving coverage and connectivity WSNs
Anand Singh Rajawat, Sumit Jain, Kanishk Barhanpurkar
IET Wireless Sensor Systems (2021) Vol. 11, Iss. 4, pp. 161-168
Open Access | Times Cited: 16

Selfish node Detection Based on Fuzzy Logic and Harris Hawks Optimization Algorithm in IoT Networks
Abbas Akhbari, Ali Ghaffari
Security and Communication Networks (2021) Vol. 2021, pp. 1-20
Open Access | Times Cited: 14

A Survey on Traffic Management in Software-Defined Networks: Challenges, Effective Approaches, and Potential Measures
Amin Hodaei, Shahram Babaie
Wireless Personal Communications (2021) Vol. 118, Iss. 2, pp. 1507-1534
Closed Access | Times Cited: 12

A new selfish thing detection method based on Voronoi diagram for Internet of Things
Nasim Razzaghi, Shahram Babaie
The Journal of Supercomputing (2022) Vol. 78, Iss. 6, pp. 8389-8408
Closed Access | Times Cited: 8

A review of data sets of short-range wireless networks
Zhiting Lin, Pengfei Wang
Computer Communications (2019) Vol. 147, pp. 138-158
Closed Access | Times Cited: 10

A novel selfish node detection based on reputation and game theory in Internet of Things
Gholam Hossein Abdi, A. H. Refahi Sheikhani, Sohrab Kordrostami, et al.
Computing (2023) Vol. 106, Iss. 1, pp. 81-107
Closed Access | Times Cited: 2

A Skellam Distribution Inspired Trust Factor-Based Selfish Node Detection Technique in MANETs
M. Deva Priya, A. Christy Jeba Malar, Sengathir Janakiraman, et al.
Lecture notes in networks and systems (2021), pp. 357-368
Closed Access | Times Cited: 5

Detecting Noncooperation Nodes Mechanisms in Wireless Networks: A Survey
Solmaz Nobahary, Hossein Gharaee Garakani, Ahmad Khademzadeh
Security and Communication Networks (2022) Vol. 2022, pp. 1-20
Open Access | Times Cited: 3

A Review of Power Management Approaches for Mobile Ad Hoc Networks
S. Hemalatha, M. Pallikonda Rajasekaran, Lalit Kumar Sagar, et al.
Journal Européen des Systèmes Automatisés (2024) Vol. 57, Iss. 1, pp. 137-145
Open Access

Improving the Battery Life of Mobile Adhoc Networks through Quality of Service Parameters
S. Hemalatha, K. Valarmathi, G. Nagappan, et al.
Journal of Advances in Information Technology (2024) Vol. 15, Iss. 9, pp. 1001-1010
Open Access

Monitoring and enhancing the co-operation of IoT network rhrough scheduling function based punishment reward strategy
Abdur Rashid Sangi, Bingqian Li, Satish Anamalamudi, et al.
PLoS ONE (2024) Vol. 19, Iss. 9, pp. e0309123-e0309123
Open Access

Prevention and Detection of Intrusion Using Machine Learning in Mobile Ad Hoc Networks
Kumar Ratnesh, Suman Kuril, M. S. Gowtham, et al.
Advances in intelligent systems and computing (2024), pp. 665-675
Closed Access

Performance Evaluation and Comparison of Cooperative Frameworks for IoT-Based VDTN
Ghani Ur Rehman, Muhammad Zubair, Wael Hosny Fouad Aly, et al.
Sustainability (2023) Vol. 15, Iss. 6, pp. 5454-5454
Open Access | Times Cited: 1

Selfishness in secure internet of things networks: 6TiSCH case study
Yassine Boufenneche, Rafik Zitouni, Laurent George, et al.
Wireless Networks (2021) Vol. 27, Iss. 6, pp. 3927-3946
Closed Access | Times Cited: 2

Introducing a new algorithm based on collaborative game theory with the power of learning selfish node records to encourage selfish nodes in mobile social networks
Mojtaba Ghorbanalizadeh, Nahideh Derakhshanfard, Nima JafariNavimipour
Wireless Networks (2022) Vol. 28, Iss. 4, pp. 1657-1669
Closed Access | Times Cited: 1

FAOACA-SND: Fuzzy selfish node detection employing arithmetic optimization algorithm and cell automata in DTN
Rakhi Sharma, Shail Kumar Dinkar
Measurement Sensors (2023) Vol. 31, pp. 100997-100997
Open Access

SRBR: Anti-selfish Routing Based on Social Similarity and Reputation Using Fuzzy Logic
Haoxiang Wang, Yu’ang Zhang, Yujie Song, et al.
(2023), pp. 577-584
Closed Access

An Overview of Latest Alleviate Mechanisms to Counteract Misbehavior Attack in Ad Hoc Networks
R. Mohana Priya, Nithya Rekha Sivakumar
2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA) (2020), pp. 78-83
Closed Access

Page 1

Scroll to top