OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Network mining techniques to analyze the risk of the occupational accident via bayesian network
Nihar Ranjan Nayak, Sumit Kumar, Deepak Gupta, et al.
International Journal of Systems Assurance Engineering and Management (2022) Vol. 13, Iss. S1, pp. 633-641
Closed Access | Times Cited: 53

Showing 1-25 of 53 citing articles:

Light Weighted CNN Model to Detect DDoS Attack over Distributed Scenario
Harish Kumar, Yassine Aoudni, Geovanny Genaro Reiván Ortiz, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-10
Open Access | Times Cited: 32

Investigating the impact of emerging technologies on construction safety performance
Esra Dobrucalı, Sevilay Demirkesen, Emel Sadikoglu, et al.
Engineering Construction & Architectural Management (2022) Vol. 31, Iss. 3, pp. 1322-1347
Closed Access | Times Cited: 30

Adaptability evaluation of conceptual design for smart product-service system: An integrated rough DEMATEL and Bayesian network model
Di Feng, Jianping Zhou, Liting Jing, et al.
Journal of Cleaner Production (2023) Vol. 417, pp. 137999-137999
Closed Access | Times Cited: 12

Optimizing neural network based on cuckoo search and invasive weed optimization using extreme learning machine approach
Nilesh Rathod, Sunil Wankhade
Neuroscience Informatics (2022) Vol. 2, Iss. 3, pp. 100075-100075
Open Access | Times Cited: 11

Future Trends of Blockchain Technology in the Technological Fields
Farah Hida Sharin, Martin Sparaggon Hernandez, Ilham Sentosa
(2023), pp. 1307-1313
Closed Access | Times Cited: 6

The Block Chain Technology to protect Data Access using Intelligent Contracts Mechanism Security Framework for 5G Networks
Ranjeet Yadav, Ritambhara, Karthik Kumar Vaigandla, et al.
(2022), pp. 108-112
Closed Access | Times Cited: 8

A New Method of Optical Spectrum Analysis for Advanced Wireless Communications
Ramakrishnan Raman, Rotash Kumar, Sachin Ghai, et al.
(2023), pp. 1719-1723
Closed Access | Times Cited: 4

Faster-BNI: Fast Parallel Exact Inference on Bayesian Networks
Jiantong Jiang, Zeyi Wen, Atif Bin Mansoor, et al.
IEEE Transactions on Parallel and Distributed Systems (2024) Vol. 35, Iss. 8, pp. 1444-1455
Closed Access | Times Cited: 1

A novel Bayesian Pay-As-You-Drive insurance model with risk prediction and causal mapping
Bingyang Wanga, Ying Chenb, Zichao Lic
Decision Analytics Journal (2024), pp. 100522-100522
Open Access | Times Cited: 1

Deep Learning Solution to Various Issues of Finance, A Productive Research Approach
Ramakrishnan Raman, Dharam Buddhi, Mehul Gor, et al.
(2023), pp. 1020-1025
Closed Access | Times Cited: 3

Recursive CNN Model to Detect Anomaly Detection in X-Ray Security Image
Senthil Kumar R, Syed Musthafa. A, A. Balaji, et al.
2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM) (2022), pp. 742-747
Closed Access | Times Cited: 5

IoT based Volcano Multipara meter Surveillance Method
Pratik Patel, Arvind Kumar Pandey
(2023), pp. 2277-2281
Closed Access | Times Cited: 2

Blockchain Technology Implementation In Various Governance Domains: A Systematic Review Approach
Sakher A. I. Al-Bazaiah
(2023), pp. 1290-1296
Closed Access | Times Cited: 2

A Technique Based on Ensemble Machine Learning for The Analysis of Electronic Nose Signals
Amit Taneja, Santhosh Kumar Rajamani, Deepika Shekhawat, et al.
(2023), pp. 1733-1737
Open Access | Times Cited: 2

Computational Intelligence Techniques for Behavioral Research on the Analysis of Investment Decisions in the Commercial Realty Market
S. Siva Venkata Ramana, T. Mydhili, Ponduri Siddardha, et al.
Disruptive technologies and digital transformations for society 5.0 (2023), pp. 47-62
Closed Access | Times Cited: 2

A Metaheuristic Approach for Encrypting Blockchain Data Attributes Using Ciphertext Policy Technique
Nabamita Deb, Mohamed A. Elashiri, T. Veeramakali, et al.
Mathematical Problems in Engineering (2022) Vol. 2022, pp. 1-10
Open Access | Times Cited: 4

Addressing the Real World Problem of Managing Wireless Communication Systems Using Explainable AI-Based Models through Correlation Analysis
S. Surya, Sumeet Gupta, Abolfazl Mehbodniya, et al.
Mathematical Problems in Engineering (2022) Vol. 2022, pp. 1-6
Open Access | Times Cited: 3

Privacy Preservation Using Block chain for Credit Card Data
Siva Alagesh S, Bhavna Bajpai, Swati Atre, et al.
2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM) (2022), pp. 725-730
Closed Access | Times Cited: 3

Yapay Sinir Ağı Kullanılarak Petrol Sektöründe Yaşanan İş Kazalarının İncelenmesi
Önder Künteş, Özlem Bezek Güre
Iğdır Üniversitesi Fen Bilimleri Enstitüsü Dergisi (2024) Vol. 14, Iss. 3, pp. 1000-1012
Open Access

Leveraging Social Network Analysis for Enhancing Safety Reporting in the Workplace
Paramitha Puspa Widya, Rita Ambarwati, Dedy Dedy, et al.
Deleted Journal (2024) Vol. 26, Iss. 1, pp. 9-24
Open Access

Modeling Human Error Factors with Security Incidents in Industrial Control Systems: A Bayesian Belief Network Approach
Pushparaj Bhosale, Wolfgang Kästner, Thilo Sauter
Proceedings of the 17th International Conference on Availability, Reliability and Security (2024), pp. 1-9
Closed Access

PAPR Reduction Analysis by Implementing IFFT using Peak Windowing technique for Wireless Communication System
Himanshu Sharma, Sarabpreet Kaur, Imad Saeed Abdulrahman, et al.
(2023), pp. 819-823
Closed Access | Times Cited: 1

Publicly Verifiable Attribute-Based Encryption and Distributed Decryption
Padmaja Tripathy, Pratik Patel
(2023), pp. 2438-2442
Closed Access | Times Cited: 1

Addressing Network Security Concerns
Urvashi Rawat, M. P. Karthikeyan
(2023), pp. 2068-2071
Closed Access | Times Cited: 1

Page 1 - Next Page

Scroll to top