
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Data cryptography in the Internet of Things using the artificial bee colony algorithm in a smart irrigation system
Seyyed Keyvan Mousavi, Ali Ghaffari
Journal of Information Security and Applications (2021) Vol. 61, pp. 102945-102945
Closed Access | Times Cited: 22
Seyyed Keyvan Mousavi, Ali Ghaffari
Journal of Information Security and Applications (2021) Vol. 61, pp. 102945-102945
Closed Access | Times Cited: 22
Showing 22 citing articles:
Review of artificial intelligence and internet of things technologies in land and water management research during 1991–2021: A bibliometric analysis
A. Patel, Kethavath Ajaykumar, Nand Lal Kushwaha, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 123, pp. 106335-106335
Closed Access | Times Cited: 41
A. Patel, Kethavath Ajaykumar, Nand Lal Kushwaha, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 123, pp. 106335-106335
Closed Access | Times Cited: 41
THEORETICAL INSIGHTS INTO SECURING REMOTE MONITORING SYSTEMS IN WATER DISTRIBUTION NETWORKS: LESSONS LEARNED FROM AFRICA-US PROJECTS
Fatai Adeshina Adelani, Enyinaya Stefano Okafor, Boma Sonimiteim Jacks, et al.
Engineering Science & Technology Journal (2024) Vol. 5, Iss. 3, pp. 995-1007
Open Access | Times Cited: 29
Fatai Adeshina Adelani, Enyinaya Stefano Okafor, Boma Sonimiteim Jacks, et al.
Engineering Science & Technology Journal (2024) Vol. 5, Iss. 3, pp. 995-1007
Open Access | Times Cited: 29
A Novel Chaos-Based Cryptography Algorithm and Its Performance Analysis
Ahmed A. Abd El‐Latif, R. Janarthanan, Bassem Abd-El-Atty, et al.
Mathematics (2022) Vol. 10, Iss. 14, pp. 2434-2434
Open Access | Times Cited: 27
Ahmed A. Abd El‐Latif, R. Janarthanan, Bassem Abd-El-Atty, et al.
Mathematics (2022) Vol. 10, Iss. 14, pp. 2434-2434
Open Access | Times Cited: 27
Multi-discrete genetic algorithm in hopfield neural network with weighted random k satisfiability
Nur Ezlin Zamri, Siti Aishah Azhar, Siti Syatirah Muhammad Sidik, et al.
Neural Computing and Applications (2022) Vol. 34, Iss. 21, pp. 19283-19311
Closed Access | Times Cited: 26
Nur Ezlin Zamri, Siti Aishah Azhar, Siti Syatirah Muhammad Sidik, et al.
Neural Computing and Applications (2022) Vol. 34, Iss. 21, pp. 19283-19311
Closed Access | Times Cited: 26
QoS-based routing protocol and load balancing in wireless sensor networks using the markov model and the artificial bee colony algorithm
Seyed Salar Sefati, Mehrdad Abdi, Ali Ghaffari
Peer-to-Peer Networking and Applications (2023) Vol. 16, Iss. 3, pp. 1499-1512
Closed Access | Times Cited: 13
Seyed Salar Sefati, Mehrdad Abdi, Ali Ghaffari
Peer-to-Peer Networking and Applications (2023) Vol. 16, Iss. 3, pp. 1499-1512
Closed Access | Times Cited: 13
Shahnwaz Afzal, Mohammad Ubaidullah Bokhari
Security and Privacy (2025) Vol. 8, Iss. 3
Closed Access
A Multi-Objective Bee Foraging Learning-Based Particle Swarm Optimization Algorithm for Enhancing the Security of Healthcare Data in Cloud System
Reyazur Rashid Irshad, Shahab Saquib Sohail, Shahid Hussain, et al.
IEEE Access (2023) Vol. 11, pp. 113410-113421
Open Access | Times Cited: 10
Reyazur Rashid Irshad, Shahab Saquib Sohail, Shahid Hussain, et al.
IEEE Access (2023) Vol. 11, pp. 113410-113421
Open Access | Times Cited: 10
The Application of Hybrid Krill Herd Artificial Hummingbird Algorithm for Scientific Workflow Scheduling in Fog Computing
Aveen Othman Abdalrahman, Daniel Pilevarzadeh, Shafi Ghafouri, et al.
Journal of Bionic Engineering (2023) Vol. 20, Iss. 5, pp. 2443-2464
Closed Access | Times Cited: 10
Aveen Othman Abdalrahman, Daniel Pilevarzadeh, Shafi Ghafouri, et al.
Journal of Bionic Engineering (2023) Vol. 20, Iss. 5, pp. 2443-2464
Closed Access | Times Cited: 10
Time Synchronized Multivariate Regressive Convolution Deep Neural Network Model for Sinkhole Attack Detection in WSN
Ahmed M. Khedr, P. V. Pravija Raj, Sapna Rani
Wireless Personal Communications (2024) Vol. 134, Iss. 1, pp. 361-382
Closed Access | Times Cited: 3
Ahmed M. Khedr, P. V. Pravija Raj, Sapna Rani
Wireless Personal Communications (2024) Vol. 134, Iss. 1, pp. 361-382
Closed Access | Times Cited: 3
A Dynamic Light-Weight Symmetric Encryption Algorithm for Secure Data Transmission via BLE Beacons
Sam Banani, Surapa Thiemjarus, Kitti Wongthavarawat, et al.
Journal of Sensor and Actuator Networks (2021) Vol. 11, Iss. 1, pp. 2-2
Open Access | Times Cited: 16
Sam Banani, Surapa Thiemjarus, Kitti Wongthavarawat, et al.
Journal of Sensor and Actuator Networks (2021) Vol. 11, Iss. 1, pp. 2-2
Open Access | Times Cited: 16
Energy efficient and multi-hop routing for constrained wireless sensor networks
K. Phani Rama Krishna, Ramakrishna Thirumuru
Sustainable Computing Informatics and Systems (2023) Vol. 38, pp. 100866-100866
Closed Access | Times Cited: 6
K. Phani Rama Krishna, Ramakrishna Thirumuru
Sustainable Computing Informatics and Systems (2023) Vol. 38, pp. 100866-100866
Closed Access | Times Cited: 6
A New Hybrid Approach Using GWO and MFO Algorithms to Detect Network Attack
Hasan Dalmaz, Erdal Erdal, Halil Murat 躰ver
Computer Modeling in Engineering & Sciences (2023) Vol. 136, Iss. 2, pp. 1277-1314
Open Access | Times Cited: 5
Hasan Dalmaz, Erdal Erdal, Halil Murat 躰ver
Computer Modeling in Engineering & Sciences (2023) Vol. 136, Iss. 2, pp. 1277-1314
Open Access | Times Cited: 5
DLSEA-64: dynamic lightweight symmetric encryption algorithm for secure data transmission in IoT based pervasive sensing applications
Sohail Saif, Satirtha Halder, Suparna Biswas
Journal of Cyber Security Technology (2024), pp. 1-27
Closed Access | Times Cited: 1
Sohail Saif, Satirtha Halder, Suparna Biswas
Journal of Cyber Security Technology (2024), pp. 1-27
Closed Access | Times Cited: 1
A screen-shooting resilient data-hiding algorithm based on two-level singular value decomposition
Bin Ma, Kaixin Du, Jian Xu, et al.
Journal of Information Security and Applications (2023) Vol. 78, pp. 103605-103605
Closed Access | Times Cited: 2
Bin Ma, Kaixin Du, Jian Xu, et al.
Journal of Information Security and Applications (2023) Vol. 78, pp. 103605-103605
Closed Access | Times Cited: 2
Towards improving the security of wireless networks using secured session keys
N. G. Nageswari Amma, T. Jayaraj, N. G. Bhuvaneswari Amma
Information Security Journal A Global Perspective (2024), pp. 1-14
Closed Access
N. G. Nageswari Amma, T. Jayaraj, N. G. Bhuvaneswari Amma
Information Security Journal A Global Perspective (2024), pp. 1-14
Closed Access
An energy‐efficient method using PSO clustering and fuzzy routing to reduce energy consumption in IoT
Homayun Motameni
International Journal of Communication Systems (2024) Vol. 37, Iss. 14
Closed Access
Homayun Motameni
International Journal of Communication Systems (2024) Vol. 37, Iss. 14
Closed Access
ChaosForge: a lightweight stream cipher fusion of chaotic dynamics and NLFSRs for secure IoT communication
Mohammad Ubaidullah Bokhari, Shahnwaz Afzal, Gaurav Yadav
International Journal of Information Technology (2024)
Closed Access
Mohammad Ubaidullah Bokhari, Shahnwaz Afzal, Gaurav Yadav
International Journal of Information Technology (2024)
Closed Access
Securing IoT healthcare platform with lightweight encryption
Saja Kareem Ismael, Mohamed Ibrahim Shujaa, Ahmed Bahaaulddin A. Alwahhab
AIP conference proceedings (2024) Vol. 3232, pp. 020014-020014
Closed Access
Saja Kareem Ismael, Mohamed Ibrahim Shujaa, Ahmed Bahaaulddin A. Alwahhab
AIP conference proceedings (2024) Vol. 3232, pp. 020014-020014
Closed Access
Cyber Security in Internet of Things using Optimization algorithms: A Systematic Mapping of Literature
Kumar Vaibhav Bhatnagar, Rashmi Kushwah
(2023), pp. 610-615
Closed Access | Times Cited: 1
Kumar Vaibhav Bhatnagar, Rashmi Kushwah
(2023), pp. 610-615
Closed Access | Times Cited: 1
Low-Cost Stand-Alone Smart Irrigation System: A Case Study
Farzana Haque Chowdhury, Roksana Akter Raisa, Md. Sharif Uddin Azad, et al.
Lecture notes in networks and systems (2022), pp. 349-356
Closed Access | Times Cited: 1
Farzana Haque Chowdhury, Roksana Akter Raisa, Md. Sharif Uddin Azad, et al.
Lecture notes in networks and systems (2022), pp. 349-356
Closed Access | Times Cited: 1
Securing IoT Smart Irrigation Systems with Adapted Blockchain Based Approach
Rabaie Benameur, Bouabdellah Kechar, Zahia Bidai, et al.
(2023), pp. 1-6
Closed Access
Rabaie Benameur, Bouabdellah Kechar, Zahia Bidai, et al.
(2023), pp. 1-6
Closed Access
Swarm intelligence and internet of everything optimization solutions
Amit Prakash Singh
AIP conference proceedings (2023) Vol. 2821, pp. 120005-120005
Closed Access
Amit Prakash Singh
AIP conference proceedings (2023) Vol. 2821, pp. 120005-120005
Closed Access
Balancing Crop Priorities: PSO-Based Equitable Irrigation Water Distribution for Efficient Resource Management
Abdelouafi Ikidid, Abdelaziz El Fazziki, N. Baba
2021 International Conference on INnovations in Intelligent SysTems and Applications (INISTA) (2023), pp. 1-6
Closed Access
Abdelouafi Ikidid, Abdelaziz El Fazziki, N. Baba
2021 International Conference on INnovations in Intelligent SysTems and Applications (INISTA) (2023), pp. 1-6
Closed Access