OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

XECryptoGA: a metaheuristic algorithm-based block cipher to enhance the security goals
Md Saquib Jawed, Mohammad Sajid
Evolving Systems (2022) Vol. 14, Iss. 5, pp. 749-770
Closed Access | Times Cited: 19

Showing 19 citing articles:

An efficient IoT task scheduling algorithm in cloud environment using modified Firefly algorithm
Mohammad Qasim, Mohammad Sajid
International Journal of Information Technology (2024)
Closed Access | Times Cited: 8

Securing IoT Communications: A Novel Lightweight Stream Cipher Using DNA Cryptography and Grain-80 Cipher
Mohammad Ubaidullah Bokhari, Shahnwaz Afzal, Imran Khan, et al.
SN Computer Science (2025) Vol. 6, Iss. 2
Closed Access

An IoT-Enabled Cloud Computing Model for Authentication and Data Confidentiality using Lightweight Cryptography
Salman Ali, Faisal Anwer
Arabian Journal for Science and Engineering (2025)
Closed Access

Identification of optimal Argon2i parameters for performance and security enhancement
Sirapat Boonkrong, Patchara Koksungnoen
International Journal of Information Technology (2025)
Closed Access

Enhancing the cryptographic key using sample entropy and whale optimization algorithm
Md Saquib Jawed, Mohammad Sajid
International Journal of Information Technology (2023) Vol. 16, Iss. 3, pp. 1733-1741
Closed Access | Times Cited: 10

Blockchain Technology: Opportunities & Challenges
Khushnood Bilal, Mohammad Sajid, Jagendra Singh
2021 International Conference on Data Analytics for Business and Industry (ICDABI) (2022)
Closed Access | Times Cited: 16

Chaotic and Transfer Function-Assisted Grey Wolf Optimizer for IoT Task Scheduling in Cloud-of Things
Mohammad Qasim, Mohammad Sajid
(2024), pp. 1323-1327
Closed Access | Times Cited: 2

CryptoHHO: a bio-inspired cryptosystem for data security in Fog–Cloud architecture
Md Saquib Jawed, Mohammad Sajid
The Journal of Supercomputing (2024) Vol. 80, Iss. 11, pp. 15834-15867
Closed Access | Times Cited: 2

A Swarm Intelligence-based Faster and Secure Algorithm for Improved Industrial IoT-Cloud Computing Communication
Md Saquib Jawed, Mohammad Sajid
(2024), pp. 1-5
Closed Access | Times Cited: 1

A novel approach for code coverage testing using hybrid metaheuristic algorithm
Fatma Ahsan, Faisal Anwer
International Journal of Information Technology (2024) Vol. 16, Iss. 6, pp. 3691-3701
Closed Access | Times Cited: 1

Substitution Box Construction Using Transfer‐Function Assisted Metaheuristic and Booster Algorithm: A Hybrid Approach
Mohammad Shadab, Md Saquib Jawed, Mohammad Sajid
Security and Privacy (2024)
Closed Access | Times Cited: 1

DLSEA-64: dynamic lightweight symmetric encryption algorithm for secure data transmission in IoT based pervasive sensing applications
Sohail Saif, Satirtha Halder, Suparna Biswas
Journal of Cyber Security Technology (2024), pp. 1-27
Closed Access | Times Cited: 1

Soft computing techniques in multi-criteria recommender systems: A comprehensive review
Khalid Anwar, Mohammed Wasid, Aasim Zafar, et al.
Applied Soft Computing (2024), pp. 112579-112579
Closed Access | Times Cited: 1

A systematic literature review on software security testing using metaheuristics
Fatma Ahsan, Faisal Anwer
Automated Software Engineering (2024) Vol. 31, Iss. 2
Closed Access | Times Cited: 1

Cryptanalysis of Lightweight Block Ciphers using Metaheuristic Algorithms in Cloud of Things (CoT)
Md Saquib Jawed, Mohammad Sajid
2021 International Conference on Data Analytics for Business and Industry (ICDABI) (2022), pp. 165-169
Closed Access | Times Cited: 4

Advancing Cryptographic Security With a New Delannoy-Derived Chaotic S-Box
Bayan Alabduallah, Abdulbasid S. Banga, Nadeem Iqbal, et al.
IEEE Access (2024) Vol. 12, pp. 82926-82937
Open Access

ChaosForge: a lightweight stream cipher fusion of chaotic dynamics and NLFSRs for secure IoT communication
Mohammad Ubaidullah Bokhari, Shahnwaz Afzal, Gaurav Yadav
International Journal of Information Technology (2024)
Closed Access

Generating Highly Nonlinear S-Boxes Using a Hybrid Approach With Particle Swarm Optimization
Mohammad Shadab, Md Saquib Jawed, Mohammad Sajid, et al.
Advances in computer and electrical engineering book series (2024), pp. 1-30
Closed Access

Page 1

Scroll to top