
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An energy-aware and Q-learning-based area coverage for oil pipeline monitoring systems using sensors and Internet of Things
Amir Masoud Rahmani, Saqib Ali, Mazhar Hussain Malik, et al.
Scientific Reports (2022) Vol. 12, Iss. 1
Open Access | Times Cited: 44
Amir Masoud Rahmani, Saqib Ali, Mazhar Hussain Malik, et al.
Scientific Reports (2022) Vol. 12, Iss. 1
Open Access | Times Cited: 44
Showing 1-25 of 44 citing articles:
Analysis Of Cost Prediction In Medical Insurance Using Modern Regression Models
Haitham M. Alzoubi, Nizar Sahawneh, Ahmad AlHamad, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 1-10
Closed Access | Times Cited: 59
Haitham M. Alzoubi, Nizar Sahawneh, Ahmad AlHamad, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 1-10
Closed Access | Times Cited: 59
A Systematic Literature Review of Security in 5G based Social Networks
Muhammad Alshurideh, Bader Yousef Obeidat, Victoria Vorobeva, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 1-5
Closed Access | Times Cited: 44
Muhammad Alshurideh, Bader Yousef Obeidat, Victoria Vorobeva, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 1-5
Closed Access | Times Cited: 44
Reinforcement Learning-Based Routing Protocols in Flying Ad Hoc Networks (FANET): A Review
Jan Lánský, Saqib Ali, Amir Masoud Rahmani, et al.
Mathematics (2022) Vol. 10, Iss. 16, pp. 3017-3017
Open Access | Times Cited: 39
Jan Lánský, Saqib Ali, Amir Masoud Rahmani, et al.
Mathematics (2022) Vol. 10, Iss. 16, pp. 3017-3017
Open Access | Times Cited: 39
Review on the challenges and strategies in oil and gas industry's transition towards carbon neutrality in China
Qi Zhang, Jiangfeng Liu, Zhihui Gao, et al.
Petroleum Science (2023) Vol. 20, Iss. 6, pp. 3931-3944
Open Access | Times Cited: 26
Qi Zhang, Jiangfeng Liu, Zhihui Gao, et al.
Petroleum Science (2023) Vol. 20, Iss. 6, pp. 3931-3944
Open Access | Times Cited: 26
A cluster-based trusted routing method using fire hawk optimizer (FHO) in wireless sensor networks (WSNs)
Mehdi Hosseinzadeh, Joon Yoo, Saqib Ali, et al.
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 25
Mehdi Hosseinzadeh, Joon Yoo, Saqib Ali, et al.
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 25
A Q-learning-based smart clustering routing method in flying Ad Hoc networks
Mehdi Hosseinzadeh, Jawad Tanveer, Amir Masoud Rahmani, et al.
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 1, pp. 101894-101894
Open Access | Times Cited: 7
Mehdi Hosseinzadeh, Jawad Tanveer, Amir Masoud Rahmani, et al.
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 1, pp. 101894-101894
Open Access | Times Cited: 7
Neurological Disorder Detection Using OCT Scan Image of Eye
Muhammad Arslan Aslam, Muhammad Zonain, Salman Muneer, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 01-13
Closed Access | Times Cited: 24
Muhammad Arslan Aslam, Muhammad Zonain, Salman Muneer, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 01-13
Closed Access | Times Cited: 24
Federated Reinforcement Learning in IoT: Applications, Opportunities and Open Challenges
Euclides Carlos Pinto Neto, Somayeh Sadeghi, Xichen Zhang, et al.
Applied Sciences (2023) Vol. 13, Iss. 11, pp. 6497-6497
Open Access | Times Cited: 15
Euclides Carlos Pinto Neto, Somayeh Sadeghi, Xichen Zhang, et al.
Applied Sciences (2023) Vol. 13, Iss. 11, pp. 6497-6497
Open Access | Times Cited: 15
A cluster-tree-based trusted routing algorithm using Grasshopper Optimization Algorithm (GOA) in Wireless Sensor Networks (WSNs)
Mehdi Hosseinzadeh, Omed Hassan Ahmed, Jan Lánský, et al.
PLoS ONE (2023) Vol. 18, Iss. 9, pp. e0289173-e0289173
Open Access | Times Cited: 12
Mehdi Hosseinzadeh, Omed Hassan Ahmed, Jan Lánský, et al.
PLoS ONE (2023) Vol. 18, Iss. 9, pp. e0289173-e0289173
Open Access | Times Cited: 12
An End-to-End Platform for Managing Third-Party Risks in Oil Pipelines
Edmundo Casas, Leo Ramos, Cristian Romero, et al.
IEEE Access (2024) Vol. 12, pp. 77831-77851
Open Access | Times Cited: 4
Edmundo Casas, Leo Ramos, Cristian Romero, et al.
IEEE Access (2024) Vol. 12, pp. 77831-77851
Open Access | Times Cited: 4
Monitoring Systems for CO2 Transport Pipelines: A Review of Optimization Problems and Methods
Teke Xu, Sergey Martynov, Haroun Mahgerefteh
SSRN Electronic Journal (2025)
Closed Access
Teke Xu, Sergey Martynov, Haroun Mahgerefteh
SSRN Electronic Journal (2025)
Closed Access
Computational Intelligence-Based Routing Schemes in Flying Ad-Hoc Networks (FANETs): A Review
Parisa Khoshvaght, Jawad Tanveer, Amir Masoud Rahmani, et al.
Vehicular Communications (2025), pp. 100913-100913
Closed Access
Parisa Khoshvaght, Jawad Tanveer, Amir Masoud Rahmani, et al.
Vehicular Communications (2025), pp. 100913-100913
Closed Access
Development of a Model for Spoofing Attacks in Internet of Things
Faheem Khan, Abdullah A. Al‐Atawi, Abdullah Alomari, et al.
Mathematics (2022) Vol. 10, Iss. 19, pp. 3686-3686
Open Access | Times Cited: 21
Faheem Khan, Abdullah A. Al‐Atawi, Abdullah Alomari, et al.
Mathematics (2022) Vol. 10, Iss. 19, pp. 3686-3686
Open Access | Times Cited: 21
An Intersection-Based Routing Scheme Using Q-Learning in Vehicular Ad Hoc Networks for Traffic Management in the Intelligent Transportation System
Muhammad Umair Khan, Mehdi Hosseinzadeh, Amir Mosavi
Mathematics (2022) Vol. 10, Iss. 20, pp. 3731-3731
Open Access | Times Cited: 21
Muhammad Umair Khan, Mehdi Hosseinzadeh, Amir Mosavi
Mathematics (2022) Vol. 10, Iss. 20, pp. 3731-3731
Open Access | Times Cited: 21
Machine Learning Based Prediction of Stock Exchange on NASDAQ 100: A Twitter Mining Approach
Saida Harguem, Zakariya Chabani, Samar Noaman, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 01-10
Closed Access | Times Cited: 19
Saida Harguem, Zakariya Chabani, Samar Noaman, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 01-10
Closed Access | Times Cited: 19
Path Following and Avoiding Obstacle for Mobile Robot Under Dynamic Environments Using Reinforcement Learning
Le Duc Hanh, Vo Duy Cong
Journal of Robotics and Control (JRC) (2023) Vol. 4, Iss. 2, pp. 157-164
Open Access | Times Cited: 10
Le Duc Hanh, Vo Duy Cong
Journal of Robotics and Control (JRC) (2023) Vol. 4, Iss. 2, pp. 157-164
Open Access | Times Cited: 10
Battle of Deep Fakes: Artificial Intelligence Set to Become a Major Threat to the Individual and National Security
Atif Ali, Khushboo Farid Khan Ghouri, Hina Naseem, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 1-5
Closed Access | Times Cited: 14
Atif Ali, Khushboo Farid Khan Ghouri, Hina Naseem, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 1-5
Closed Access | Times Cited: 14
Intelligent Hand Gesture Recognition System Empowered With CNN
Tamer Mohamed, Amer Ibrahim, Tauqeer Faiz, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 1-8
Closed Access | Times Cited: 13
Tamer Mohamed, Amer Ibrahim, Tauqeer Faiz, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 1-8
Closed Access | Times Cited: 13
The Threat of Deep Fake Technology to Trusted Identity Management
Atif Ali, Yasir Khan Jadoon, Zulqarnain Farid, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 1-5
Closed Access | Times Cited: 10
Atif Ali, Yasir Khan Jadoon, Zulqarnain Farid, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 1-5
Closed Access | Times Cited: 10
Optimizing k -coverage in energy-saving wireless sensor networks based on the Elite Global Growth Optimizer
Long Chen, Zishang Qiu, Ying Wu, et al.
Expert Systems with Applications (2024) Vol. 256, pp. 124878-124878
Closed Access | Times Cited: 1
Long Chen, Zishang Qiu, Ying Wu, et al.
Expert Systems with Applications (2024) Vol. 256, pp. 124878-124878
Closed Access | Times Cited: 1
Toward Reliability of Long Wireless Sensor Networks
Vladimir Shakhov, Denis A. Migov, Honglong Chen, et al.
IEEE Access (2024) Vol. 12, pp. 124506-124516
Open Access | Times Cited: 1
Vladimir Shakhov, Denis A. Migov, Honglong Chen, et al.
IEEE Access (2024) Vol. 12, pp. 124506-124516
Open Access | Times Cited: 1
Internet of Things-based Intelligent Environmental Monitoring and Alert System
Rabia Noor Enam, Huma Hasan Rizvi, Muzammil Ahmad Khan, et al.
Research Square (Research Square) (2024)
Open Access | Times Cited: 1
Rabia Noor Enam, Huma Hasan Rizvi, Muzammil Ahmad Khan, et al.
Research Square (Research Square) (2024)
Open Access | Times Cited: 1
Novel multiple access protocols against Q-learning-based tunnel monitoring using flying ad hoc networks
Bakri Awaji, M. M. Kamruzzaman, Ahmad Althuniabt, et al.
Wireless Networks (2023) Vol. 30, Iss. 2, pp. 987-1011
Closed Access | Times Cited: 3
Bakri Awaji, M. M. Kamruzzaman, Ahmad Althuniabt, et al.
Wireless Networks (2023) Vol. 30, Iss. 2, pp. 987-1011
Closed Access | Times Cited: 3
Estate Price Predictor for Multan City Townships Using Machine Learning
Barween Al Kurdi, Hammad Raza, Salman Muneer, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 1-5
Closed Access | Times Cited: 5
Barween Al Kurdi, Hammad Raza, Salman Muneer, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 1-5
Closed Access | Times Cited: 5
Customization of Bookkeeping system for Blockchain System Analysis: A Review
Kapil Joshi, Richa Pandey, Salil Bharany, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 1-5
Closed Access | Times Cited: 5
Kapil Joshi, Richa Pandey, Salil Bharany, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 1-5
Closed Access | Times Cited: 5