OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

An Integrated Z-Number and DEMATEL-Based Cooperation Enforcement Scheme for Thwarting Malicious Nodes in MANETs
S. M. Udhaya Sankar, N. Jagadish Kumar, G. Elangovan, et al.
Wireless Personal Communications (2023) Vol. 130, Iss. 4, pp. 2531-2563
Closed Access | Times Cited: 30

Showing 1-25 of 30 citing articles:

Hybrid Grey PIPRECIA and Grey OCRA method-based dynamic multi-criteria decision-making model for mitigating non-cooperating node attacks in WSNs
S. Madhavi, RVS Praveen, N. Jagadish Kumar, et al.
Peer-to-Peer Networking and Applications (2023) Vol. 16, Iss. 5, pp. 2607-2629
Closed Access | Times Cited: 31

Improved Green Anaconda Optimization Algorithm-based Coverage Path Planning Mechanism for heterogeneous unmanned aerial vehicles
K. Karthik, C. Balasubramanian
Sustainable Computing Informatics and Systems (2024) Vol. 42, pp. 100961-100961
Closed Access | Times Cited: 7

Fuzzy ELECTRE multi-criteria decision-making technique for achieving reliable data dissemination in MANETs
S. M. Udhaya Sankar, RVS Praveen, N. Jagadish Kumar, et al.
International Journal of Information Technology (2023) Vol. 15, Iss. 4, pp. 1985-1998
Closed Access | Times Cited: 20

Optimized Retrieval of Data from Cloud using Hybridization of Bellstra Algorithm
K. Yashwanth Kumar, N. Jagadish Kumar, D. Dhinakaran, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 16

Location Selection of Electric Vehicle Charging Stations Through Employing the Spherical Fuzzy CoCoSo and CRITIC Technique
Rong Yan, Yongguang Han, Huiyuan Zhang, et al.
Informatica (2024), pp. 203-225
Open Access | Times Cited: 6

IoT Based Automated Irrigation System for Agricultural Activities
M. Keerthana, D. Dhinakaran, M. Ananthi, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 15

A Research on Metaverse and its Application
B.G. Sai Aswin, S. Vishnubala, D. Dhinakaran, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 13

Levarging Blockchain for Transparency in Agriculture Supply Chain Management Using IoT and Machine Learning
M. Harini, D. Dhinakaran, D. Prabhu, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 13

Enhanced computer network security assessment through employing an integrated LogTODIM-TOPSIS technique under interval neutrosophic sets
Qiongqiong Sun, Yang Longfei
International Journal of Knowledge-based and Intelligent Engineering Systems (2024) Vol. 28, Iss. 3, pp. 419-434
Closed Access | Times Cited: 3

A hybrid fennec fox and sand cat optimization algorithm for clustering scheme in VANETs
V. Krishna Meera, C. Balasubramanian
Sustainable Computing Informatics and Systems (2024) Vol. 42, pp. 100983-100983
Closed Access | Times Cited: 3

A Hybrid Eagle’s Web Swarm Optimization (EWSO) technique for effective cloud resource management
N. Jagadish Kumar, C. Balasubramanian, A. Naresh Kumar, et al.
(2023)
Closed Access | Times Cited: 9

Hybrid Bayesian and modified grey PROMETHEE-AL model-based trust estimation technique for thwarting malicious and selfish nodes in MANETs
J. Suresh, J. Martin Sahayaraj, B. R. Rajakumar, et al.
Wireless Networks (2024) Vol. 30, Iss. 3, pp. 1697-1718
Closed Access | Times Cited: 3

Komodo Mlipir Algorithm-based optimal route determination mechanism for improving Quality of Service in Vehicular ad hoc network
R.K. Soundarayaa, C. Balasubramanian
Sustainable Computing Informatics and Systems (2024) Vol. 42, pp. 100956-100956
Closed Access | Times Cited: 1

Optimizing market risk evaluation of small and medium sized enterprises through hamacher interactive power geometric technique under uncertainty
Wei Du, Fan Yang
Journal of Intelligent & Fuzzy Systems (2024) Vol. 46, Iss. 4, pp. 7521-7537
Closed Access | Times Cited: 1

A Neural Radiance Field-Based Architecture for Intelligent Multilayered View Synthesis
V. Sneha, M. Ananthi, N. Jagadish Kumar, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 3

Enhanced MADM framework for fuzzy comprehensive evaluation of attack ability of basketball defenders with the triangular fuzzy neutrosophic numbers
Fengshuo Rao, Sung-Pil Chung, Kailin Xing
Journal of Intelligent & Fuzzy Systems (2024) Vol. 46, Iss. 3, pp. 6763-6780
Closed Access

SVNN-ExpTODIM Technique for Maturity Evaluation of Digital Transformation in Retail Enterprises Under Single-Valued Neutrosophic Sets
Xiaoling Yang
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 6
Open Access

Enhancing Cloud Resource Allocation Efficiency with Harris Hawk Optimization Algorithm(HHOA)
V Manickavasagan, Eswari Petchiammal, Sai Sudha, et al.
2020 IEEE International Students' Conference on Electrical,Electronics and Computer Science (SCEECS) (2024), pp. 1-6
Closed Access

NeuroCluster: Neural Networks for Intelligent Energy-Aware Clustering in IIoT
R. Sujatha, Raghavan Gopalakrishnan, V Shreemitha, et al.
(2024), pp. 1-6
Closed Access

Hybrid Honey Badger and Cuttlefish Optimization Algorithm(HHBCOA) for On-Road Vehicle Breakdown Assistance in VANETs
C Nallusamy, Manojkumar Krishnan, S. Farook, et al.
(2024), pp. 1-6
Closed Access

Ensemble based Satin Bower Bird Algorithms for Cyberbullying Detection
A G Gnanabaskaran, S Kavinilavu, V L Kowshika, et al.
(2024), pp. 1-6
Closed Access

Page 1 - Next Page

Scroll to top