OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

ModChain: a hybridized secure and scaling blockchain framework for IoT environment
P. Pabitha, J. Chandra Priya, RVS Praveen, et al.
International Journal of Information Technology (2023) Vol. 15, Iss. 3, pp. 1741-1754
Closed Access | Times Cited: 42

Showing 1-25 of 42 citing articles:

ASK-RAM-IMOT: Autonomous Shared Keys based Remote Authentication Method for Internet of Medical Things Applications
RVS Praveen, P. Pabitha
Wireless Personal Communications (2023) Vol. 131, Iss. 1, pp. 273-293
Closed Access | Times Cited: 33

Hybrid Grey PIPRECIA and Grey OCRA method-based dynamic multi-criteria decision-making model for mitigating non-cooperating node attacks in WSNs
S. Madhavi, RVS Praveen, N. Jagadish Kumar, et al.
Peer-to-Peer Networking and Applications (2023) Vol. 16, Iss. 5, pp. 2607-2629
Closed Access | Times Cited: 31

An Integrated Z-Number and DEMATEL-Based Cooperation Enforcement Scheme for Thwarting Malicious Nodes in MANETs
S. M. Udhaya Sankar, N. Jagadish Kumar, G. Elangovan, et al.
Wireless Personal Communications (2023) Vol. 130, Iss. 4, pp. 2531-2563
Closed Access | Times Cited: 30

Exploring the Potential of Blockchain Technology in an IoT-Enabled Environment: A Review
Deepak Deepak, Preeti Gulia, Nasib Singh Gill, et al.
IEEE Access (2024) Vol. 12, pp. 31197-31227
Open Access | Times Cited: 11

Fuzzy ELECTRE multi-criteria decision-making technique for achieving reliable data dissemination in MANETs
S. M. Udhaya Sankar, RVS Praveen, N. Jagadish Kumar, et al.
International Journal of Information Technology (2023) Vol. 15, Iss. 4, pp. 1985-1998
Closed Access | Times Cited: 20

A Comparative Study of Deep Learning Models for ECG Signal-based User Classification
P. Pabitha, RVS Praveen, Kamma Cheruvu Jayaraja Chandana, et al.
(2023)
Closed Access | Times Cited: 17

An innovative and secured electronic voting system based on Elliptic Curved Signing Approach (ECDSA) and digital signatures
Chandra Shekhar, Rakesh Kumar Yadav
International Journal of Information Technology (2025)
Closed Access

An efficient ECC and fuzzy verifier based user authentication protocol for IoT enabled WSNs
T. Sudhakar, RVS Praveen, V. Natarajan
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access

Self-regulatory Fault Forbearing and Recuperation Scheduling Model in Uncertain Cloud Context
K. Nivitha, P. Pabitha, RVS Praveen
Lecture notes on data engineering and communications technologies (2023), pp. 269-293
Closed Access | Times Cited: 13

Applications of Blockchain Technology in Supply Chain Management
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in logistics, operations, and management science book series (2023), pp. 248-304
Closed Access | Times Cited: 12

Fortifying IoT against crimpling cyber-attacks: a systematic review
Usman Tariq, Irfan Ahmed, Muhammad Attique Khan, et al.
Karbala International Journal of Modern Science (2023) Vol. 9, Iss. 4
Open Access | Times Cited: 9

POSMETER: proof-of-stake blockchain for enhanced smart meter data security
Divya Singhal, Laxmi Ahuja, Ashish Seth
International Journal of Information Technology (2023) Vol. 16, Iss. 2, pp. 1171-1184
Closed Access | Times Cited: 9

Enabling a Secure IoT Environment Using a Blockchain-Based Local-Global Consensus Manager
Saleh Alghamdi, Aiiad Albeshri, Ahmed Alhusayni
Electronics (2023) Vol. 12, Iss. 17, pp. 3721-3721
Open Access | Times Cited: 8

Teaching Learning-Based Optimization for Medical IoT applications Service Placement in Fog Computing
R Baskar, E. Mohanraj, T Sneka, et al.
2020 IEEE International Students' Conference on Electrical,Electronics and Computer Science (SCEECS) (2024)
Closed Access | Times Cited: 2

Protected Data Sharing using Attribute Based Encryption for Remote Data Checking in Cloud Environment
M. Ramprasath, A. V. Kalpana, T. Nadana Ravishankar, et al.
(2023), pp. 1-8
Closed Access | Times Cited: 6

A Review on Machine Learning-based Malware Detection Techniques for Internet of Things (IoT) Environments
S. Sasikala, Sengathir Janakiraman
Wireless Personal Communications (2023) Vol. 132, Iss. 3, pp. 1961-1974
Closed Access | Times Cited: 5

LBA-PAKE: Lattice-Based Anonymous Password Based Authentication Key Exchange Scheme for VANET
Arman Ahmad, S. Jagatheswari
(2023), pp. 1-8
Closed Access | Times Cited: 5

THC-DFECC-based privacy preserved smart contract creation for cloud data security
Chandra S. Tiwari, Vijay Kumar Jha
International Journal of Information Technology (2024) Vol. 16, Iss. 7, pp. 4191-4207
Closed Access | Times Cited: 1

Tweets to Predict: LSTM Model for Crime Analysis Using Twitter Time Series Data
P. Kaladevi, M Gopalraj, K. N. Harish, et al.
(2024), pp. 1-6
Closed Access | Times Cited: 1

Smart electronic governance in international trade using blockchain and Naïve Bayes’ based text classification to prevent import duty frauds
Nitin Tyagi, Kanchan Tyagi
International Journal of Information Technology (2024)
Closed Access | Times Cited: 1

Securing Drones with Blockchain-Enabled Privacy-Preserving Authentication
P Saroopa, K Poongodi, V. Saranya, et al.
(2024), pp. 1-6
Closed Access | Times Cited: 1

Privacy-Preserving Brakerski-Gentry-Vaikuntanathan (BGV) Homomorphic Encryption for IoMT Data Security
V. Vinoth Kumar, P. Pabitha
(2024), pp. 1-6
Closed Access | Times Cited: 1

Detection of epileptic seizure using hybrid machine learning algorithms
P. Velvizhy, Ria Bas Len, N. Rajeshwari, et al.
(2023), pp. 1-7
Closed Access | Times Cited: 3

A Case Study Using Companies to Examine the Nmap Tool’s Applicability for Network Security Assessment
J. Asokan, A. Kaleel Rahuman, B. Suganthi, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 3

Enhancing IoT Data Security with Blockchain Based Inner Product Encryption Algorithm
Dr K Poongodi, C Gopica, Astuty Amrin, et al.
(2024), pp. 1-6
Closed Access

Page 1 - Next Page

Scroll to top