OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing
Sarra Cherbal, Abdelhak Zier, Sara Hebal, et al.
The Journal of Supercomputing (2023) Vol. 80, Iss. 3, pp. 3738-3816
Closed Access | Times Cited: 43

Showing 1-25 of 43 citing articles:

Privacy-Preserving Security of IoT Networks: A Comparative Analysis of Methods and Applications
Abubakar Wakili, Sara Bakkali
Cyber Security and Applications (2025), pp. 100084-100084
Open Access | Times Cited: 1

Quantum-empowered federated learning and 6G wireless networks for IoT security: Concept, challenges and future directions
Danish Javeed, Muhammad Shahid Saeed, Ijaz Ahmad, et al.
Future Generation Computer Systems (2024) Vol. 160, pp. 577-597
Open Access | Times Cited: 9

Securing internet of things using machine and deep learning methods: a survey
Ali Ghaffari, Nasim Jelodari, Samira pouralish, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 9065-9089
Open Access | Times Cited: 7

Elevating IoT healthcare security using ProSRN and ICOM methodologies for effective threat management
Y. Sowjanya, S. Gopalakrishnan, Rakesh Kumar
International Journal of Information Technology (2025)
Closed Access

Current research on Internet of Things (IoT) security protocols: A survey
Raghavendra Mishra, Ankita Mishra
Computers & Security (2025), pp. 104310-104310
Closed Access

Deep learning technology: enabling safe communication via the internet of things
Ramiz Salama, Hitesh Mohapatra, Tuğşad Tülbentçi, et al.
Frontiers in Communications and Networks (2025) Vol. 6
Open Access

Optimizing SIKE for blockchain-based IoT ecosystems with resource constraints
Nabil A. Ismail, Shaimaa Abu Khadra, Gamal Attiya, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 3
Open Access

IoT Applications and Cyber Threats: Mitigation Strategies for a Secure Future
Pratik Kumar Swain, Lal Mohan Pattnaik, Suneeta Satpathy
(2025), pp. 403-428
Closed Access

Biometric Iris Authentication Using a Segmentation Network with Attention and a Key-Points Detection Algorithm
Katarzyna Prokop, Dawid Połap
Lecture notes in computer science (2025), pp. 356-367
Closed Access

Artificial Intelligence and Quantum Synergies in Trust-Enhanced Consumer Applications for Software Defined Networks
Kamran Ahmad Awan, Ikram Ud Din, Ahmad Almogren, et al.
IEEE Transactions on Consumer Electronics (2024) Vol. 70, Iss. 1, pp. 791-799
Closed Access | Times Cited: 2

Advances in Blockchain-Based Internet of Vehicles Application: Prospect for Machine Learning Integration
Emmanuel Ekene Okere, Vipin Balyan
Future Internet (2024) Vol. 16, Iss. 12, pp. 449-449
Open Access | Times Cited: 2

Post-quantum security design for hierarchical healthcare systems based on lattices
Manel Boujelben, Mohamed Abid
The Journal of Supercomputing (2024) Vol. 80, Iss. 12, pp. 17292-17313
Closed Access | Times Cited: 1

Quantum Computing Integrated Patterns for Real-Time Cryptography in Assorted Domains
Shally Nagpal, Shivani Gaba, Ishan Budhiraja, et al.
IEEE Access (2024) Vol. 12, pp. 132317-132331
Open Access | Times Cited: 1

Quantum communication based cyber security analysis using artificial intelligence with IoMT
Huimin Han, Jun Yao, Yujun Wu, et al.
Optical and Quantum Electronics (2024) Vol. 56, Iss. 4
Closed Access | Times Cited: 1

IoT Security Model for Smart Cities based on a Metamodeling Approach
Daifallah Zaid Alotaibe
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 3, pp. 14109-14118
Open Access | Times Cited: 1

A Review of Post-Quantum Privacy Preservation for IoMT Using Blockchain
Fariza Sabrina, Shaleeza Sohail, Umair Ullah Tariq
Electronics (2024) Vol. 13, Iss. 15, pp. 2962-2962
Open Access | Times Cited: 1

Swarm-intelligence-based quantum-inspired optimization techniques for enhancing algorithmic efficiency and empirical assessment
Ishaani Priyadarshini
Quantum Machine Intelligence (2024) Vol. 6, Iss. 2
Closed Access | Times Cited: 1

Exploration and Development of Quantum Computing Algorithms for Optimization, Cryptography, and Machine Learning Applications
Kaya Tunçel
Human computer interaction. (2024) Vol. 8, Iss. 1, pp. 1-1
Closed Access | Times Cited: 1

Unilateral protection scheme for N-qubit GHZ states against decoherence: a resource-efficient approach
Sajede Harraz, Wang Yueyan, Shuang Cong
The Journal of Supercomputing (2024) Vol. 80, Iss. 12, pp. 17004-17020
Closed Access

Securing Social Media: Analyzing User Behaviors for Threat Detection Using Ensemble Random Forest Algorithm
T S Sanjai, D. Vanathi, P. Thirumoorthi, et al.
(2024), pp. 1-4
Closed Access

Bridging the Gap to 6G: Leveraging the Synergy of Standardization and Adaptability
Anjanabhargavi Kulkarni, R. H. Goudar, Joshi Vinayak B., et al.
ICST Transactions on Scalable Information Systems (2024) Vol. 11
Open Access

Page 1 - Next Page

Scroll to top