
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A lightweight energy consumption ensemble-based botnet detection model for IoT/6G networks
Jincheng Zhou, Tao Hai, Dayang N. A. Jawawi, et al.
Sustainable Energy Technologies and Assessments (2023) Vol. 60, pp. 103454-103454
Closed Access | Times Cited: 8
Jincheng Zhou, Tao Hai, Dayang N. A. Jawawi, et al.
Sustainable Energy Technologies and Assessments (2023) Vol. 60, pp. 103454-103454
Closed Access | Times Cited: 8
Showing 8 citing articles:
Energy-efficient trajectory design for secure SWIPT systems assisted by UAV-IRS
Zhao Li, Shaocheng Qu, Hongbo Xu, et al.
Vehicular Communications (2024) Vol. 45, pp. 100725-100725
Closed Access | Times Cited: 39
Zhao Li, Shaocheng Qu, Hongbo Xu, et al.
Vehicular Communications (2024) Vol. 45, pp. 100725-100725
Closed Access | Times Cited: 39
Modeling and analysis of data corruption attacks and energy consumption effects on edge servers using concurrent stochastic games
Abdelhakim Baouya, Brahim Hamid, Levent Gürgen, et al.
Soft Computing (2025)
Closed Access
Abdelhakim Baouya, Brahim Hamid, Levent Gürgen, et al.
Soft Computing (2025)
Closed Access
A Resilience Engineering Approach for the Risk Assessment of IT Services
Mario Fargnoli, Luca Murgianu
Applied Sciences (2023) Vol. 13, Iss. 20, pp. 11132-11132
Open Access | Times Cited: 2
Mario Fargnoli, Luca Murgianu
Applied Sciences (2023) Vol. 13, Iss. 20, pp. 11132-11132
Open Access | Times Cited: 2
Analyzing the Effectiveness of Ensemble Based Analysis in Wireless Sensor Networks
Seng Phil Hong
Journal of Machine and Computing (2024), pp. 200-209
Open Access
Seng Phil Hong
Journal of Machine and Computing (2024), pp. 200-209
Open Access
Tackling Evolving Botnet Threats: A Gradual Self-Training Neural Network Approach
Ta-Chun Lo, Jyh‐Biau Chang, Shao-Hsuan Lo, et al.
IEEE Access (2024) Vol. 12, pp. 69397-69409
Closed Access
Ta-Chun Lo, Jyh‐Biau Chang, Shao-Hsuan Lo, et al.
IEEE Access (2024) Vol. 12, pp. 69397-69409
Closed Access
Artificial Intelligence Integration For Extension Of Big Data For Decision-Making
Khaoula Fatnassi, Sahbi Zahaf, Faı̈ez Gargouri
Future Generation Computer Systems (2024), pp. 107635-107635
Closed Access
Khaoula Fatnassi, Sahbi Zahaf, Faı̈ez Gargouri
Future Generation Computer Systems (2024), pp. 107635-107635
Closed Access
Forward Secrecy Attack on Privacy Preserving Machine Authenticated Key Agreement for Internet of Things
Batamu Anderson Chiphiko, Hyunsung Kim, Patrick Ali, et al.
Archives of Advanced Engineering Science (2023)
Open Access | Times Cited: 1
Batamu Anderson Chiphiko, Hyunsung Kim, Patrick Ali, et al.
Archives of Advanced Engineering Science (2023)
Open Access | Times Cited: 1
A Firmware Vulnerability Detection Method Based on Feature Filtering
Bing Xia, Chongjun Tang, Wenbo Liu, et al.
(2023), pp. 1069-1076
Closed Access
Bing Xia, Chongjun Tang, Wenbo Liu, et al.
(2023), pp. 1069-1076
Closed Access