
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Optimal hybrid heat transfer search and grey wolf optimization-based homomorphic encryption model to assure security in cloud-based IoT environment
J. Thresa Jeniffer, A. Chandrasekar
Peer-to-Peer Networking and Applications (2022) Vol. 15, Iss. 1, pp. 703-723
Closed Access | Times Cited: 14
J. Thresa Jeniffer, A. Chandrasekar
Peer-to-Peer Networking and Applications (2022) Vol. 15, Iss. 1, pp. 703-723
Closed Access | Times Cited: 14
Showing 14 citing articles:
Energy-Efficient Cluster Head Selection in Wireless Sensor Networks Using an Improved Grey Wolf Optimization Algorithm
Mandli Rami Reddy, M. L. Ravi Chandra, P. Venkatramana, et al.
Computers (2023) Vol. 12, Iss. 2, pp. 35-35
Open Access | Times Cited: 74
Mandli Rami Reddy, M. L. Ravi Chandra, P. Venkatramana, et al.
Computers (2023) Vol. 12, Iss. 2, pp. 35-35
Open Access | Times Cited: 74
A systematic review of applying grey wolf optimizer, its variants, and its developments in different Internet of Things applications
Mohammad H. Nadimi-Shahraki, Hoda Zamani, Zahra Asghari Varzaneh, et al.
Internet of Things (2024) Vol. 26, pp. 101135-101135
Closed Access | Times Cited: 8
Mohammad H. Nadimi-Shahraki, Hoda Zamani, Zahra Asghari Varzaneh, et al.
Internet of Things (2024) Vol. 26, pp. 101135-101135
Closed Access | Times Cited: 8
Machine Learning-Based Fraud Detection System for Insurance Claims in IoT Environment
Bediga Sharan, Mohammad Hassan, V Divya Vani, et al.
2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (2024), pp. 1-5
Closed Access | Times Cited: 1
Bediga Sharan, Mohammad Hassan, V Divya Vani, et al.
2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (2024), pp. 1-5
Closed Access | Times Cited: 1
Exploring Tourism Industry Influence: A Transportation Mode-Centric View through Artificial Intelligence
Mohammad Shahparan, Elena Salnikova, Kuvandikov Sardor, et al.
2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (2024), pp. 1-6
Closed Access | Times Cited: 1
Mohammad Shahparan, Elena Salnikova, Kuvandikov Sardor, et al.
2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (2024), pp. 1-6
Closed Access | Times Cited: 1
Artificial lizard search optimized fuzzy logic approach to addressing authentication and data security challenges in P2P cloud environments
Judy Flavia B, Balika J Chelliah
Computers & Security (2023) Vol. 135, pp. 103475-103475
Closed Access | Times Cited: 4
Judy Flavia B, Balika J Chelliah
Computers & Security (2023) Vol. 135, pp. 103475-103475
Closed Access | Times Cited: 4
An improved IoT based security model for fitness tracker using quantum fruit fly optimization improved faster RCNN
P T Shanthala, D. Annapurna
International Journal of Information Technology (2023) Vol. 15, Iss. 7, pp. 3623-3629
Closed Access | Times Cited: 2
P T Shanthala, D. Annapurna
International Journal of Information Technology (2023) Vol. 15, Iss. 7, pp. 3623-3629
Closed Access | Times Cited: 2
Test case minimization and prioritization for regression testing using SBLA-based adaboost convolutional neural network
Lilly Raamesh, S. Jothi, S. Radhika
The Journal of Supercomputing (2022) Vol. 78, Iss. 16, pp. 18379-18403
Closed Access | Times Cited: 4
Lilly Raamesh, S. Jothi, S. Radhika
The Journal of Supercomputing (2022) Vol. 78, Iss. 16, pp. 18379-18403
Closed Access | Times Cited: 4
Hybrid homomorphic‐asymmetric lightweight cryptosystem for securing smart devices: A review
Renie Mathews, Deepa Jose
Transactions on Emerging Telecommunications Technologies (2023) Vol. 35, Iss. 1
Closed Access | Times Cited: 2
Renie Mathews, Deepa Jose
Transactions on Emerging Telecommunications Technologies (2023) Vol. 35, Iss. 1
Closed Access | Times Cited: 2
Exploring Synonymy: Artificial Intelligence’s Computational Analysis of its Relationships with Other Lexical Systems
Usmanova Saliha Yuldashevna, Vokhidova Nigora Abduzugurovna, Toshbekova Dilorom Ismoilovna, et al.
2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (2024), pp. 1-6
Closed Access
Usmanova Saliha Yuldashevna, Vokhidova Nigora Abduzugurovna, Toshbekova Dilorom Ismoilovna, et al.
2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (2024), pp. 1-6
Closed Access
Machine Learning Approaches for Anomaly Detection in IoT Networks
Gotte Ranjith Kumar, Anagha Deepak Kulkarni, B Santhosh Kumar, et al.
2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (2024), pp. 1-5
Closed Access
Gotte Ranjith Kumar, Anagha Deepak Kulkarni, B Santhosh Kumar, et al.
2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (2024), pp. 1-5
Closed Access
Ensuring Access Control Reliability and Security of Lightweight Blockchain-Based IOT Cloud-Based Electronic Medical Records Sharing
S Sujitha, P. Tamil Selvi
2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (2024), pp. 1-5
Closed Access
S Sujitha, P. Tamil Selvi
2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (2024), pp. 1-5
Closed Access
Deep Neural Networks Implementation on IoT Devices: A Practical Guide
V. Sridevi, Dipen Bhuva, Abhishek Bhuva, et al.
2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (2024), pp. 1-6
Closed Access
V. Sridevi, Dipen Bhuva, Abhishek Bhuva, et al.
2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (2024), pp. 1-6
Closed Access
Integration of BWT scrambling and data compression in an innovative system enhances protection and versatile management of sensor feeds (SEC)
M. Baritha Begum, Karthikeyan Kaliyaperumal
Heliyon (2024) Vol. 10, Iss. 20, pp. e39254-e39254
Open Access
M. Baritha Begum, Karthikeyan Kaliyaperumal
Heliyon (2024) Vol. 10, Iss. 20, pp. e39254-e39254
Open Access
Design of Portable Sensor Data Storage System Based on Homomorphic Encryption Algorithm
Jie Zhang
(2022), pp. 1-4
Closed Access
Jie Zhang
(2022), pp. 1-4
Closed Access