OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Intelligent drone-assisted robust lightweight multi-factor authentication for military zone surveillance in the 6G era
B. D. Deebak, Seong Oun Hwang
Computer Networks (2023) Vol. 225, pp. 109664-109664
Closed Access | Times Cited: 17

Showing 17 citing articles:

Future Trends and Emerging Threats in Drone Cybersecurity
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 148-195
Closed Access | Times Cited: 7

A Lightweight and Anonymous Application-Aware Authentication and Key Agreement Protocol for the Internet of Drones
Image Bhattarai, Cong Pu, Kim‐Kwang Raymond Choo, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 11, pp. 19790-19803
Closed Access | Times Cited: 4

Combining Software-Defined and Delay-Tolerant Networking Concepts With Deep Reinforcement Learning Technology to Enhance Vehicular Networks
Olivia Nakayima, Mostafa I. Soliman, Kazunori Ueda, et al.
IEEE Open Journal of Vehicular Technology (2024) Vol. 5, pp. 721-736
Open Access | Times Cited: 4

Privacy Preserving Based on Seamless Authentication With Provable Key Verification Using mIoMT for B5G-Enabled Healthcare Systems
B. D. Deebak, Seong Oun Hwang
IEEE Transactions on Services Computing (2024) Vol. 17, Iss. 3, pp. 1097-1113
Closed Access | Times Cited: 3

IoT cybersecurity in 5G and beyond: a systematic literature review
Sandeep Pirbhulal, Sabarathinam Chockalingam, Ankur Shukla, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2827-2879
Closed Access | Times Cited: 2

Quadrotor Cascade Control System Design Based on Linear Active Disturbance Rejection Control
Zheng Qiao, Guixin Zhu, Tong Zhao
Applied Sciences (2023) Vol. 13, Iss. 12, pp. 6904-6904
Open Access | Times Cited: 4

Designing Secure Big Data Analytics Mechanism Using Authentication for Drones-Assisted Military Applications
Sourav Saha, Ashok Kumar Das, Saksham Mittal, et al.
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (2024), pp. 1-6
Closed Access

Robust Multi-Factor Authentication for WSNs with Dynamic Password Recovery
Liufu Zhu, Ding Wang
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 8398-8413
Closed Access

A Review and Bibliometric Analysis of the Current Studies for the 6G Networks
Qusay Medhat Salih, Md. Arafatur Rahman, Ahmad Firdaus, et al.
Computer Modeling in Engineering & Sciences (2024) Vol. 140, Iss. 3, pp. 2165-2206
Open Access

Enhancing Security Through the Utilization of Multifactor Security Algorithms
Chandra Prakash Lora, Suhas Ballal, Jasbir Singh Dhanjal
(2024), pp. 1-6
Closed Access

A review on unmanned aerial vehicle used for 360° surveillance
A. Vimal, Nicholas Js, Rahul Kumar, et al.
AIP conference proceedings (2024) Vol. 3232, pp. 030011-030011
Closed Access

Cybersecurity Testing in Drones domain: a Systematic Literature Review
Eda Marchetti, Tauheed Waheed, Antonello Calabrò
IEEE Access (2024) Vol. 12, pp. 171166-171184
Open Access

Facets of security and safety problems and paradigms for smart aerial mobility and intelligent logistics
Simeon Okechukwu Ajakwe, Vivian Ukamaka Ihekoronye
IET Intelligent Transport Systems (2024)
Open Access

Military Communications in the 6G Era: Finnish Perspective
Harri Saarnisaari, Marko Höyhtyä, Heikki Rantanen, et al.
MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM) (2024), pp. 135-140
Closed Access

Challenge/Response-Lifecycle development for Multi-Factor Self-Sovereign Identity Authentication
Aleksandr Kormiltsyn, Vimal Dwivedi, Alex Norta
(2024), pp. 36-41
Closed Access

Lightweight two-factor authentication framework with privacy preserving for smart eHealth
Patruni Muralidhara Rao, B. D. Deebak
Peer-to-Peer Networking and Applications (2023) Vol. 17, Iss. 1, pp. 373-396
Closed Access | Times Cited: 1

Securing the skies: A comprehensive survey on internet of drones security challenges and solutions
Oroo Oyondi Felix
World Journal of Advanced Research and Reviews (2023) Vol. 20, Iss. 3, pp. 780-800
Open Access

Page 1

Scroll to top