
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
IoT empowered smart cybersecurity framework for intrusion detection in internet of drones
Syeda Nazia Ashraf, Selvakumar Manickam, Syed Saood Zia, et al.
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 7
Syeda Nazia Ashraf, Selvakumar Manickam, Syed Saood Zia, et al.
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 7
Showing 7 citing articles:
Unmanned Aerial Vehicle Intrusion Detection: Deep-Meta-Heuristic System
Shangting Miao, Quan Pan, Dongxiao Zheng, et al.
Vehicular Communications (2024), pp. 100726-100726
Closed Access | Times Cited: 3
Shangting Miao, Quan Pan, Dongxiao Zheng, et al.
Vehicular Communications (2024), pp. 100726-100726
Closed Access | Times Cited: 3
Security and Threat Detection through Cloud-Based Wazuh Deployment
Syed Moiz, Abdul Hameed Abdul Majid, Abdul Basit, et al.
(2024) Vol. 1, pp. 1-5
Closed Access | Times Cited: 1
Syed Moiz, Abdul Hameed Abdul Majid, Abdul Basit, et al.
(2024) Vol. 1, pp. 1-5
Closed Access | Times Cited: 1
Security Analysis of Meteorological Support Software for UAS Flight Planning
Maxim Ivanytskyi, Yuliya Averyanova, Yevheniia Znakovska
Lecture notes in networks and systems (2024), pp. 487-497
Closed Access
Maxim Ivanytskyi, Yuliya Averyanova, Yevheniia Znakovska
Lecture notes in networks and systems (2024), pp. 487-497
Closed Access
UAV Swarm GNSS Spoofing Defense Method Based on Consensus Artificial Potential Field
Zhaojun Gu, Huan Zhao, Hengjun Wang Nianwen Yingying Liu Cheng Chen, et al.
Research Square (Research Square) (2024)
Closed Access
Zhaojun Gu, Huan Zhao, Hengjun Wang Nianwen Yingying Liu Cheng Chen, et al.
Research Square (Research Square) (2024)
Closed Access
Comparative analysis of lattice-based cryptographic schemes for secure IoT communications
Alvary Kefas Kwala, Shri Kant, Alpna Mishra
Discover Internet of Things (2024) Vol. 4, Iss. 1
Open Access
Alvary Kefas Kwala, Shri Kant, Alpna Mishra
Discover Internet of Things (2024) Vol. 4, Iss. 1
Open Access
Robust Security Framework for IoT-Enabled Smart Cities: Leveraging Ensemble Machine Learning Techniques in Fog Computing Environments
Radhika Kumari, Kiranbir Kaur
Research Square (Research Square) (2024)
Open Access
Radhika Kumari, Kiranbir Kaur
Research Square (Research Square) (2024)
Open Access
IoT-Empowered Drones: Smart Cyber security Framework with Machine Learning Perspective
Aditya Mahamkali, Manvitha Gali, Muniyandy Elangovan, et al.
(2023), pp. 1-9
Closed Access | Times Cited: 1
Aditya Mahamkali, Manvitha Gali, Muniyandy Elangovan, et al.
(2023), pp. 1-9
Closed Access | Times Cited: 1