OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Intelligent authentication of 5G healthcare devices: A survey
Ali Hassan Sodhro, Ali Ismail Awad, Jaap van de Beek, et al.
Internet of Things (2022) Vol. 20, pp. 100610-100610
Open Access | Times Cited: 54

Showing 1-25 of 54 citing articles:

AI-powered biometrics for Internet of Things security: A review and future vision
Ali Ismail Awad, Aiswarya Babu, Ezedin Barka, et al.
Journal of Information Security and Applications (2024) Vol. 82, pp. 103748-103748
Closed Access | Times Cited: 28

Community-based virtual power plants’ technology and circular economy models in the energy sector: A Techno-economy study
Haonan Xie, Tanveer Ahmad, Dongdong Zhang, et al.
Renewable and Sustainable Energy Reviews (2023) Vol. 192, pp. 114189-114189
Closed Access | Times Cited: 24

Health informatics to enhance the healthcare industry's culture: An extensive analysis of its features, contributions, applications and limitations
Mohd Javaid, Abid Haleem, Ravi Pratap Singh
Informatics and Health (2024) Vol. 1, Iss. 2, pp. 123-148
Open Access | Times Cited: 13

Comprehensive survey: Biometric user authentication application, evaluation, and discussion
Reem Alrawili, Ali Abdullah S. AlQahtani, Muhammad Khurram Khan
Computers & Electrical Engineering (2024) Vol. 119, pp. 109485-109485
Open Access | Times Cited: 11

Security Level Significance in DApps Blockchain-Based Document Authentication
Qurotul Aini, Danny Manongga, Untung Rahardja, et al.
Aptisi Transactions On Technopreneurship (ATT) (2022) Vol. 4, Iss. 3, pp. 292-305
Open Access | Times Cited: 28

An AI-Assisted Smart Healthcare System Using 5G Communication
Buddhadeb Pradhan, Shiplu Das, Diptendu Sinha Roy, et al.
IEEE Access (2023) Vol. 11, pp. 108339-108355
Open Access | Times Cited: 20

Bridging healthcare gaps: a scoping review on the role of artificial intelligence, deep learning, and large language models in alleviating problems in medical deserts
Zdeslav Strika, Karlo Petković, Robert Likić, et al.
Postgraduate Medical Journal (2024)
Closed Access | Times Cited: 6

Industrial Internet of Things Ecosystems Security and Digital Forensics: Achievements, Open Challenges, and Future Directions
Victor R. Kebande, Ali Ismail Awad
ACM Computing Surveys (2023) Vol. 56, Iss. 5, pp. 1-37
Closed Access | Times Cited: 13

A Novel Health Monitoring System Utilizing IoT and Machine Learning Techniques for Elderly Patient Care
Amit Kumar Mishra, Alok Kumar Yadav, Jagendra Singh, et al.
SpringerBriefs in applied sciences and technology (2025), pp. 1-8
Closed Access

ARP-PROBE: An ARP spoofing detector for Internet of Things networks using explainable deep learning
Mohammed M. Alani, Ali Ismail Awad, Ezedin Barka
Internet of Things (2023) Vol. 23, pp. 100861-100861
Closed Access | Times Cited: 11

Internet of Things Authentication Protocols: Comparative Study
Souhayla Dargaoui, Mourade Azrour, Ahmad El Allaoui, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 1, pp. 65-91
Open Access | Times Cited: 4

Unleashing the prospective of blockchain-federated learning fusion for IoT security: A comprehensive review
Mansi Gupta, Mohit Kumar, Renu Dhir
Computer Science Review (2024) Vol. 54, pp. 100685-100685
Closed Access | Times Cited: 4

GBEAKA: Group-based efficient authentication and key agreement protocol for LPIoMT using 5G
Garima Singh
Internet of Things (2023) Vol. 22, pp. 100688-100688
Closed Access | Times Cited: 9

LETM-IoT: A lightweight and efficient trust mechanism for Sybil attacks in Internet of Things networks
Jawad Hassan, Adnan Sohail, Ali Ismail Awad, et al.
Ad Hoc Networks (2024) Vol. 163, pp. 103576-103576
Open Access | Times Cited: 3

Internet of Things for diabetics: Identifying adoption issues
Signe Marie Cleveland, Moutaz Haddara
Internet of Things (2023) Vol. 22, pp. 100798-100798
Open Access | Times Cited: 8

Development and Implementation of an Intelligent Health Monitoring System using IoT and Advanced Machine Learning Techniques
C. Pabitha, V. Kalpana, Evangelin Sonia SV, et al.
Journal of Machine and Computing (2023), pp. 456-464
Open Access | Times Cited: 7

An Exhaustive Survey on Authentication Classes in the IoT Environments
Souhayla Dargaoui, Mourade Azrour, Ahmad El Allaoui, et al.
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) (2024) Vol. 12, Iss. 1
Open Access | Times Cited: 2

Efficient Approach for Anomaly Detection in IoT Using System Calls
Nouman Shamim, Muhammad Asim, Thar Baker, et al.
Sensors (2023) Vol. 23, Iss. 2, pp. 652-652
Open Access | Times Cited: 6

MSSAMTO-IoV: modified sparrow search algorithm for multi-hop task offloading for IoV
Marya Alseid, Ali A. El‐Moursy, Oruba Alfawaz, et al.
The Journal of Supercomputing (2023) Vol. 79, Iss. 18, pp. 20769-20789
Closed Access | Times Cited: 6

Toward QoS Monitoring in IoT Edge Devices Driven Healthcare—A Systematic Literature Review
Muhammad Younas, Muhammad Jawed Iqbal, Abdul Aziz, et al.
Sensors (2023) Vol. 23, Iss. 21, pp. 8885-8885
Open Access | Times Cited: 6

Utilizing Blockchain and Deep Learning for Decentralized Discovery of Deceptive Practices in Healthcare Insurance
Nazeer Shaik, Nihar Ranjan Kar, Blessy Thankachan, et al.
(2023)
Closed Access | Times Cited: 5

A Decentralized Trust Establishment Protocol for Smart IoT Systems
Driss El Majdoubi, Hanan El Bakkali, Mohamed Bensaih, et al.
Internet of Things (2022) Vol. 20, pp. 100634-100634
Closed Access | Times Cited: 8

Improving Healthcare Facilities in Remote Areas Using Cutting-Edge Technologies
Mamoona Humayun, Maram Fahaad Almufareh, Fatima Al-Quayed, et al.
Applied Sciences (2023) Vol. 13, Iss. 11, pp. 6479-6479
Open Access | Times Cited: 4

Theory and practice in secure software development lifecycle: A comprehensive survey
Martin Otieno, David Odera, Jairus Ekume Ounza
World Journal of Advanced Research and Reviews (2023) Vol. 18, Iss. 3, pp. 053-078
Open Access | Times Cited: 4

Page 1 - Next Page

Scroll to top