OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Hybrid Grey PIPRECIA and Grey OCRA method-based dynamic multi-criteria decision-making model for mitigating non-cooperating node attacks in WSNs
S. Madhavi, RVS Praveen, N. Jagadish Kumar, et al.
Peer-to-Peer Networking and Applications (2023) Vol. 16, Iss. 5, pp. 2607-2629
Closed Access | Times Cited: 31

Showing 1-25 of 31 citing articles:

Improved blockchain-based user authentication protocol with ring signature for internet of medical things
J. Chandra Priya, RVS Praveen, K. Nivitha, et al.
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 4, pp. 2415-2434
Closed Access | Times Cited: 13

A hybrid fennec fox and sand cat optimization algorithm for clustering scheme in VANETs
V. Krishna Meera, C. Balasubramanian
Sustainable Computing Informatics and Systems (2024) Vol. 42, pp. 100983-100983
Closed Access | Times Cited: 3

Fuzzy Logic Multicriteria Decisionā€Making for Broadcast Storm Resolution in Vehicular Ad Hoc Networks
Arash Heidari, Mohammad Ali Jabraeil Jamali, Nima Jafari Navimipour
International Journal of Communication Systems (2024)
Open Access | Times Cited: 3

Teaching Learning-Based Optimization for Medical IoT applications Service Placement in Fog Computing
R Baskar, E. Mohanraj, T Sneka, et al.
2020 IEEE International Students' Conference on Electrical,Electronics and Computer Science (SCEECS) (2024)
Closed Access | Times Cited: 2

Komodo Mlipir Algorithm-based optimal route determination mechanism for improving Quality of Service in Vehicular ad hoc network
R.K. Soundarayaa, C. Balasubramanian
Sustainable Computing Informatics and Systems (2024) Vol. 42, pp. 100956-100956
Closed Access | Times Cited: 1

Hybrid Boosted Chameleon and modified Honey Badger optimization algorithm-based energy efficient cluster routing protocol for cognitive radio sensor network
G. Sathya, C. Balasubramanian
Sustainable Computing Informatics and Systems (2024) Vol. 43, pp. 101023-101023
Closed Access | Times Cited: 1

Privacy-Preserving Brakerski-Gentry-Vaikuntanathan (BGV) Homomorphic Encryption for IoMT Data Security
V. Vinoth Kumar, P. Pabitha
(2024), pp. 1-6
Closed Access | Times Cited: 1

Enhancing Cloud Resource Allocation Efficiency with Harris Hawk Optimization Algorithm(HHOA)
V Manickavasagan, Eswari Petchiammal, Sai Sudha, et al.
2020 IEEE International Students' Conference on Electrical,Electronics and Computer Science (SCEECS) (2024), pp. 1-6
Closed Access

NeuroCluster: Neural Networks for Intelligent Energy-Aware Clustering in IIoT
R. Sujatha, Raghavan Gopalakrishnan, V Shreemitha, et al.
(2024), pp. 1-6
Closed Access

Efficient Breast Cancer Detection using Lightweight Multimodal Approach
P. Kaladevi, P Vivekananthan, Bubathi Muruganatham M.A. Sanjith, et al.
(2024), pp. 1-6
Closed Access

A comprehensive decision assessment for trust evaluation in wireless sensor networks
Thilagasree Chakkarapani Sumathi, Jayakumar Thippan, Brainy Joseph Raj Vikilal Joice, et al.
Yugoslav journal of operations research (2024), Iss. 00, pp. 11-11
Open Access

Enhancing Email Spam Detection with Temporal Naive Bayes Classifier
J Mythili, B Deebeshkumar, T Eshwaramoorthy, et al.
2022 International Conference on Communication, Computing and Internet of Things (IC3IoT) (2024) Vol. 12, pp. 1-6
Closed Access

Intelligent Decision-making Algorithm for IoT Enabled Smart shopping
J Mythili, S T Menmoli, S Dhanusuya, et al.
2022 International Conference on Communication, Computing and Internet of Things (IC3IoT) (2024), pp. 1-7
Closed Access

Hybrid Grey Wolf and Particle Swarm Optimized (HGW-PSO) Scheduling in Containerized Cloud Computing Environment
S. M. Udhaya Sankar, Martin Joel Rathnam, Aswanth Babu, et al.
(2024), pp. 1-5
Closed Access

Sailfish Optimizer Algorithm for Effective Toxic Gas Detection Sensor Placement in IIoT
P Senthilraja, S Ponkaviarasu, K V Vijayabharathi, et al.
(2024), pp. 1-6
Closed Access

Epileptic Seizure Diagnosis using Bayesian Belief Network and T-CNN
S Poovarasu, R. Gopinath, A Mohanraj, et al.
(2024), pp. 1-6
Closed Access

Enhancing Cybersecurity in IIoT Smart Grids: Leveraging HGAMPO for PMU Data Manipulation Detection
B. Janani, S. Keerthana, S. Subathra, et al.
(2024), pp. 1-6
Closed Access

Enhancing Cyber-Attack Detection in IoT Networks through Deep Reinforcement Learning
T Subalaxmi, R Akalya, R Kaviya, et al.
(2024), pp. 1-6
Closed Access

An Approach for Securing IoT Data using Blockchain and Proxy Re-Encryption
M. Saradha, B Keerthivasan, Mpl Arunachalam, et al.
(2024), pp. 1-6
Closed Access

Predictive Power of Logistic Regression in Cryptocurrency Price Analysis
R Poonkuzhali, J Hitesh Paliwal, Govind Hariharan, et al.
(2024), pp. 1-6
Closed Access

Page 1 - Next Page

Scroll to top