
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Design of a security-aware routing scheme in Mobile Ad-hoc Network using repeated game model
Subramanian Balaji, E. Golden Julie, Harold Robinson, et al.
Computer Standards & Interfaces (2019) Vol. 66, pp. 103358-103358
Closed Access | Times Cited: 54
Subramanian Balaji, E. Golden Julie, Harold Robinson, et al.
Computer Standards & Interfaces (2019) Vol. 66, pp. 103358-103358
Closed Access | Times Cited: 54
Showing 1-25 of 54 citing articles:
Energy efficient optimized rate based congestion control routing in wireless sensor network
Vikas Srivastava, Sachin Tripathi, Karan Singh, et al.
Journal of Ambient Intelligence and Humanized Computing (2019) Vol. 11, Iss. 3, pp. 1325-1338
Closed Access | Times Cited: 107
Vikas Srivastava, Sachin Tripathi, Karan Singh, et al.
Journal of Ambient Intelligence and Humanized Computing (2019) Vol. 11, Iss. 3, pp. 1325-1338
Closed Access | Times Cited: 107
A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense
Amrita Dahiya, Brij B. Gupta
Future Generation Computer Systems (2020) Vol. 117, pp. 193-204
Closed Access | Times Cited: 89
Amrita Dahiya, Brij B. Gupta
Future Generation Computer Systems (2020) Vol. 117, pp. 193-204
Closed Access | Times Cited: 89
Modified zone based intrusion detection system for security enhancement in mobile ad hoc networks
R. Santhana Krishnan, E. Golden Julie, Harold Robinson, et al.
Wireless Networks (2019) Vol. 26, Iss. 2, pp. 1275-1289
Closed Access | Times Cited: 59
R. Santhana Krishnan, E. Golden Julie, Harold Robinson, et al.
Wireless Networks (2019) Vol. 26, Iss. 2, pp. 1275-1289
Closed Access | Times Cited: 59
Improved Blowfish Algorithm-Based Secure Routing Technique in IoT-Based WSN
Majid Alotaibi
IEEE Access (2021) Vol. 9, pp. 159187-159197
Open Access | Times Cited: 41
Majid Alotaibi
IEEE Access (2021) Vol. 9, pp. 159187-159197
Open Access | Times Cited: 41
Effects of governmental policies on energy-efficiency improvement of hydrogen fuel cell cars: A game-theoretic approach
Hamed Jafari, Soroush Safarzadeh, Ehsan Azad‐Farsani
Energy (2022) Vol. 254, pp. 124394-124394
Closed Access | Times Cited: 29
Hamed Jafari, Soroush Safarzadeh, Ehsan Azad‐Farsani
Energy (2022) Vol. 254, pp. 124394-124394
Closed Access | Times Cited: 29
Secured Energy Efficient Chaotic Gazelle Based Optimized Routing Protocol in Mobile Ad-Hoc Network
Gajendra Kumar Ahirwar, Ratish Agarwal, Anjana Pandey
Sustainable Computing Informatics and Systems (2025), pp. 101086-101086
Closed Access
Gajendra Kumar Ahirwar, Ratish Agarwal, Anjana Pandey
Sustainable Computing Informatics and Systems (2025), pp. 101086-101086
Closed Access
Machine Learning Based Detection and a Novel EC-BRTT Algorithm Based Prevention of DoS Attacks in Wireless Sensor Networks
K. Lakshmi Narayanan, R. Santhana Krishnan, E. Golden Julie, et al.
Wireless Personal Communications (2021) Vol. 127, Iss. 1, pp. 479-503
Closed Access | Times Cited: 32
K. Lakshmi Narayanan, R. Santhana Krishnan, E. Golden Julie, et al.
Wireless Personal Communications (2021) Vol. 127, Iss. 1, pp. 479-503
Closed Access | Times Cited: 32
An intelligent intrusion detection and performance reliability evaluation mechanism in mobile ad-hoc networks
Mahendra Prasad, Sachin Tripathi, Keshav Dahal
Engineering Applications of Artificial Intelligence (2022) Vol. 119, pp. 105760-105760
Closed Access | Times Cited: 19
Mahendra Prasad, Sachin Tripathi, Keshav Dahal
Engineering Applications of Artificial Intelligence (2022) Vol. 119, pp. 105760-105760
Closed Access | Times Cited: 19
A Temperature-Aware Trusted Routing Scheme for Sensor Networks: Security Approach
Tayyab Khan, Karan Singh, Manisha Manjul, et al.
Computers & Electrical Engineering (2022) Vol. 98, pp. 107735-107735
Closed Access | Times Cited: 18
Tayyab Khan, Karan Singh, Manisha Manjul, et al.
Computers & Electrical Engineering (2022) Vol. 98, pp. 107735-107735
Closed Access | Times Cited: 18
Improving routing disruption attack detection in MANETs using efficient trust establishment
K. Anish Pon Yamini, Jesmitha Stephy, K. Suthendran, et al.
Transactions on Emerging Telecommunications Technologies (2022) Vol. 33, Iss. 5
Closed Access | Times Cited: 17
K. Anish Pon Yamini, Jesmitha Stephy, K. Suthendran, et al.
Transactions on Emerging Telecommunications Technologies (2022) Vol. 33, Iss. 5
Closed Access | Times Cited: 17
Notice of Violation of IEEE Publication Principles: Clustering Schemes in MANETs: Performance Evaluation, Open Challenges, and Proposed Solutions
Taj Rahman, Inam Ullah, Ateeq Ur Rehman, et al.
IEEE Access (2020) Vol. 8, pp. 25135-25158
Open Access | Times Cited: 26
Taj Rahman, Inam Ullah, Ateeq Ur Rehman, et al.
IEEE Access (2020) Vol. 8, pp. 25135-25158
Open Access | Times Cited: 26
Block chain based trusted distributed routing scheme using optimized dropout ensemble extreme learning neural network in MANET
V. Krishnakumar, R. Asokan
Peer-to-Peer Networking and Applications (2023) Vol. 16, Iss. 6, pp. 2696-2713
Closed Access | Times Cited: 6
V. Krishnakumar, R. Asokan
Peer-to-Peer Networking and Applications (2023) Vol. 16, Iss. 6, pp. 2696-2713
Closed Access | Times Cited: 6
Intelligent route discovery towards rushing attacks in ad hoc wireless networks
Udayakumar Allimuthu, K. Mahalakshmi
Journal of Ambient Intelligence and Humanized Computing (2021) Vol. 13, Iss. 2, pp. 921-960
Open Access | Times Cited: 15
Udayakumar Allimuthu, K. Mahalakshmi
Journal of Ambient Intelligence and Humanized Computing (2021) Vol. 13, Iss. 2, pp. 921-960
Open Access | Times Cited: 15
Hybrid PSGWO Algorithm for Trust-Based Secure Routing in MANET
Moresh Mukhedkar, Uttam D. Kolekar
Journal of Networking and Communication Systems (JNACS) (2019) Vol. 2, Iss. 3
Open Access | Times Cited: 15
Moresh Mukhedkar, Uttam D. Kolekar
Journal of Networking and Communication Systems (JNACS) (2019) Vol. 2, Iss. 3
Open Access | Times Cited: 15
Biometric template security using DNA codec based transformation
I. Jeena Jacob, P. Betty, P. Ebby Darney, et al.
Multimedia Tools and Applications (2020) Vol. 80, Iss. 5, pp. 7547-7566
Closed Access | Times Cited: 13
I. Jeena Jacob, P. Betty, P. Ebby Darney, et al.
Multimedia Tools and Applications (2020) Vol. 80, Iss. 5, pp. 7547-7566
Closed Access | Times Cited: 13
An Overview of Game Theory Approaches for Mobile Ad-Hoc Network’s Security
Hadjer Messabih, Chaker Abdelaziz Kerrache, Youssra Cheriguene, et al.
IEEE Access (2023) Vol. 11, pp. 107581-107604
Open Access | Times Cited: 4
Hadjer Messabih, Chaker Abdelaziz Kerrache, Youssra Cheriguene, et al.
IEEE Access (2023) Vol. 11, pp. 107581-107604
Open Access | Times Cited: 4
A Comprehensive Study for Security Mechanisms in Healthcare Information Systems Using Internet of Things
Harold Robinson, R. Santhana Krishnan, S. Raja
Intelligent systems reference library (2020), pp. 193-202
Closed Access | Times Cited: 12
Harold Robinson, R. Santhana Krishnan, S. Raja
Intelligent systems reference library (2020), pp. 193-202
Closed Access | Times Cited: 12
Enhanced certificate revocation scheme with justification facility in mobile ad-hoc networks
R. Santhana Krishnan, E. Golden Julie, Harold Robinson, et al.
Computers & Security (2020) Vol. 97, pp. 101962-101962
Closed Access | Times Cited: 12
R. Santhana Krishnan, E. Golden Julie, Harold Robinson, et al.
Computers & Security (2020) Vol. 97, pp. 101962-101962
Closed Access | Times Cited: 12
Trust‐oriented peered customized mechanism for malicious nodes isolation for flying ad hoc networks
Waqas Buksh, Ying Guo, Saleem Iqbal, et al.
Transactions on Emerging Telecommunications Technologies (2022) Vol. 35, Iss. 4
Open Access | Times Cited: 7
Waqas Buksh, Ying Guo, Saleem Iqbal, et al.
Transactions on Emerging Telecommunications Technologies (2022) Vol. 35, Iss. 4
Open Access | Times Cited: 7
Design a prototype for automated patient diagnosis in wireless sensor networks
Ayyasamy Ayyanar, Maruthavanan Archana, Harold Robinson, et al.
Medical & Biological Engineering & Computing (2019) Vol. 57, Iss. 11, pp. 2373-2387
Closed Access | Times Cited: 10
Ayyasamy Ayyanar, Maruthavanan Archana, Harold Robinson, et al.
Medical & Biological Engineering & Computing (2019) Vol. 57, Iss. 11, pp. 2373-2387
Closed Access | Times Cited: 10
GBMS: A New Centralized Graph Based Mirror System Approach to Prevent Evaders for Data Handling with Arithmetic Coding in Wireless Sensor Networks
Subramanian Balaji, Harold Robinson, Enoch Julie
Ingénierie des systèmes d information (2019) Vol. 24, Iss. 5, pp. 481-490
Open Access | Times Cited: 10
Subramanian Balaji, Harold Robinson, Enoch Julie
Ingénierie des systèmes d information (2019) Vol. 24, Iss. 5, pp. 481-490
Open Access | Times Cited: 10
Enhanced Hadoop Distribution File System for Providing Solution to Big Data Challenges
A. Essaki Muthu, R. Karthik Ganesh, R. Santhana Krishnan, et al.
Intelligent systems reference library (2021), pp. 71-83
Closed Access | Times Cited: 7
A. Essaki Muthu, R. Karthik Ganesh, R. Santhana Krishnan, et al.
Intelligent systems reference library (2021), pp. 71-83
Closed Access | Times Cited: 7
Cross Layer Security MAC Aware Routing Protocol for IoT Networks
Gunjan Kalyani, Shilpa Chaudhari
Wireless Personal Communications (2021) Vol. 123, Iss. 1, pp. 935-957
Closed Access | Times Cited: 7
Gunjan Kalyani, Shilpa Chaudhari
Wireless Personal Communications (2021) Vol. 123, Iss. 1, pp. 935-957
Closed Access | Times Cited: 7
A Survey and Taxonomy of Resource Allocation Methods in Wireless Networks
Hui Liang, Wei Zhang
Journal of Communications and Information Networks (2021) Vol. 6, Iss. 4, pp. 372-384
Open Access | Times Cited: 7
Hui Liang, Wei Zhang
Journal of Communications and Information Networks (2021) Vol. 6, Iss. 4, pp. 372-384
Open Access | Times Cited: 7
Efficient Mobile Ad Hoc Route Maintenance Against Social Distances Using Attacker Detection Automation
Udayakumar Allimuthu, K. Mahalakshmi
Mobile Networks and Applications (2022) Vol. 28, Iss. 1, pp. 128-159
Open Access | Times Cited: 5
Udayakumar Allimuthu, K. Mahalakshmi
Mobile Networks and Applications (2022) Vol. 28, Iss. 1, pp. 128-159
Open Access | Times Cited: 5