
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Blockchain security enhancement: an approach towards hybrid consensus algorithms and machine learning techniques
K. Venkatesan, Syarifah Bahiyah Rahayu
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 37
K. Venkatesan, Syarifah Bahiyah Rahayu
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 37
Showing 1-25 of 37 citing articles:
Environmental stewardship in the oil and gas sector: Current practices and future directions
Peter Simpa, Nko Okina Solomon, Olubunmi Adeolu Adenekan, et al.
International Journal of Applied Research in Social Sciences (2024) Vol. 6, Iss. 5, pp. 903-926
Open Access | Times Cited: 18
Peter Simpa, Nko Okina Solomon, Olubunmi Adeolu Adenekan, et al.
International Journal of Applied Research in Social Sciences (2024) Vol. 6, Iss. 5, pp. 903-926
Open Access | Times Cited: 18
A comprehensive review of machine learning's role in enhancing network security and threat detection
Akoh Atadoga, Enoch Oluwademilade Sodiya, Uchenna Joseph Umoga, et al.
World Journal of Advanced Research and Reviews (2024) Vol. 21, Iss. 2, pp. 877-886
Open Access | Times Cited: 10
Akoh Atadoga, Enoch Oluwademilade Sodiya, Uchenna Joseph Umoga, et al.
World Journal of Advanced Research and Reviews (2024) Vol. 21, Iss. 2, pp. 877-886
Open Access | Times Cited: 10
Enhancing network intrusion detection: a dual-ensemble approach with CTGAN-balanced data and weak classifiers
Mohammad Reza Abbaszadeh Bavil Soflaei, Arash Salehpour, Karim Samadzamini
The Journal of Supercomputing (2024) Vol. 80, Iss. 11, pp. 16301-16333
Closed Access | Times Cited: 7
Mohammad Reza Abbaszadeh Bavil Soflaei, Arash Salehpour, Karim Samadzamini
The Journal of Supercomputing (2024) Vol. 80, Iss. 11, pp. 16301-16333
Closed Access | Times Cited: 7
Towards sustainable industry 4.0: A survey on greening IoE in 6G networks
Saeed Hamood Alsamhi, Ammar Hawbani, Radhya Sahal, et al.
Ad Hoc Networks (2024) Vol. 165, pp. 103610-103610
Open Access | Times Cited: 6
Saeed Hamood Alsamhi, Ammar Hawbani, Radhya Sahal, et al.
Ad Hoc Networks (2024) Vol. 165, pp. 103610-103610
Open Access | Times Cited: 6
Economic Fraud and Associated Risks: An Integrated Bibliometric Analysis Approach
Kamer-Ainur Aivaz, Iulia Oana Florea, Ionela Munteanu
Risks (2024) Vol. 12, Iss. 5, pp. 74-74
Open Access | Times Cited: 5
Kamer-Ainur Aivaz, Iulia Oana Florea, Ionela Munteanu
Risks (2024) Vol. 12, Iss. 5, pp. 74-74
Open Access | Times Cited: 5
Innovative AI ensemble model for robust and optimized blockchain-based healthcare systems
Abdulwahab Ali Almazroi
Network Modeling Analysis in Health Informatics and Bioinformatics (2025) Vol. 14, Iss. 1
Closed Access
Abdulwahab Ali Almazroi
Network Modeling Analysis in Health Informatics and Bioinformatics (2025) Vol. 14, Iss. 1
Closed Access
A literature review on transformative impacts of blockchain technology on manufacturing management and industrial engineering practices
Dharmendra Hariyani, Poonam Hariyani, Sanjeev Mishra, et al.
Green Technologies and Sustainability (2025), pp. 100169-100169
Open Access
Dharmendra Hariyani, Poonam Hariyani, Sanjeev Mishra, et al.
Green Technologies and Sustainability (2025), pp. 100169-100169
Open Access
Peer-to-peer energy management of distributed ledgers in renewable smart energy systems
Ramin Sadooghi, Taher Niknam, Morteza Sheikh, et al.
Electric Power Systems Research (2025) Vol. 242, pp. 111451-111451
Closed Access
Ramin Sadooghi, Taher Niknam, Morteza Sheikh, et al.
Electric Power Systems Research (2025) Vol. 242, pp. 111451-111451
Closed Access
Consortium Blockchain-Based Secure and Verifiable Knowledge Sharing for Federated Learning
Mochan Fan, Gang Sun, Hongfang Yu
Smart innovation, systems and technologies (2025), pp. 73-84
Closed Access
Mochan Fan, Gang Sun, Hongfang Yu
Smart innovation, systems and technologies (2025), pp. 73-84
Closed Access
Understanding the Financial Transaction Security through Blockchain and Machine Learning for Fraud Detection in Data Privacy and Security
Seaam Bin Masud, Md. Masud Rana, Hossain Jaman Sohag, et al.
SSRN Electronic Journal (2025)
Closed Access
Seaam Bin Masud, Md. Masud Rana, Hossain Jaman Sohag, et al.
SSRN Electronic Journal (2025)
Closed Access
Security Enhancement in 5G Networks by Identifying Attacks Using Optimized Cosine Convolutional Neural Network
Premalatha Santhanamari, K. Vijayakumar, L. Subramanian, et al.
Internet Technology Letters (2025) Vol. 8, Iss. 2
Closed Access
Premalatha Santhanamari, K. Vijayakumar, L. Subramanian, et al.
Internet Technology Letters (2025) Vol. 8, Iss. 2
Closed Access
Understanding the Drivers of Cryptocurrency Acceptance: An Empirical Study of Individual Adoption
Máté Hidegföldi, Gergely Laszlo Csizmazia, Justina Karpavičė
Procedia Computer Science (2025) Vol. 256, pp. 547-556
Open Access
Máté Hidegföldi, Gergely Laszlo Csizmazia, Justina Karpavičė
Procedia Computer Science (2025) Vol. 256, pp. 547-556
Open Access
Evaluating the Trade-offs between Wireless Security and Performance in IoT Networks: A Case Study of Web Applications in AI-Driven Home Appliances
Christopher Uzoma Asonze, Olumide Samuel Ogungbemi, Favour Amarachi Ezeugwa, et al.
Journal of Engineering Research and Reports (2024) Vol. 26, Iss. 8, pp. 411-432
Open Access | Times Cited: 4
Christopher Uzoma Asonze, Olumide Samuel Ogungbemi, Favour Amarachi Ezeugwa, et al.
Journal of Engineering Research and Reports (2024) Vol. 26, Iss. 8, pp. 411-432
Open Access | Times Cited: 4
Harnessing the power of blockchain to strengthen cybersecurity measures: a review
Nidal Turab, Hamza Abu Owida, Jamal Al-Nabulsi
Indonesian Journal of Electrical Engineering and Computer Science (2024) Vol. 35, Iss. 1, pp. 593-593
Open Access | Times Cited: 3
Nidal Turab, Hamza Abu Owida, Jamal Al-Nabulsi
Indonesian Journal of Electrical Engineering and Computer Science (2024) Vol. 35, Iss. 1, pp. 593-593
Open Access | Times Cited: 3
Digital sustainability and eco‐environmental sustainability: A review of emerging technologies, resource challenges, and policy implications
Roman Meinhold, Christoph Wagner, Bablu Kumar Dhar
Sustainable Development (2024)
Closed Access | Times Cited: 3
Roman Meinhold, Christoph Wagner, Bablu Kumar Dhar
Sustainable Development (2024)
Closed Access | Times Cited: 3
Security Aspects of Blockchain Technology
Naga Venkata Yaswanth Lankadasu, Devendra Babu Pesarlanka, Ajay Sharma, et al.
Advances in computer and electrical engineering book series (2024), pp. 259-277
Closed Access | Times Cited: 2
Naga Venkata Yaswanth Lankadasu, Devendra Babu Pesarlanka, Ajay Sharma, et al.
Advances in computer and electrical engineering book series (2024), pp. 259-277
Closed Access | Times Cited: 2
Modeling the Dynamic Behaviors of Bank Account Fraudsters Using Combined Simultaneous Game Theory with Neural Networks
Abdullahi Ubale Usman, Sunusi Bala Abdullahi, Jin Ran, et al.
Research Square (Research Square) (2024)
Open Access | Times Cited: 1
Abdullahi Ubale Usman, Sunusi Bala Abdullahi, Jin Ran, et al.
Research Square (Research Square) (2024)
Open Access | Times Cited: 1
An Abnormal Account Identification Method by Topology Feature Analysis for Blockchain-Based Transaction Network
Yuyu Yue, Jixin Zhang, Mingwu Zhang, et al.
Electronics (2024) Vol. 13, Iss. 8, pp. 1416-1416
Open Access | Times Cited: 1
Yuyu Yue, Jixin Zhang, Mingwu Zhang, et al.
Electronics (2024) Vol. 13, Iss. 8, pp. 1416-1416
Open Access | Times Cited: 1
Elliptic Crypt With Secured Blockchain Assisted Federated Q-Learning Framework for Smart Healthcare
Sudhakaran Gajendran, M. Revathi, Krithiga Ravi, et al.
IEEE Access (2024) Vol. 12, pp. 45923-45935
Open Access | Times Cited: 1
Sudhakaran Gajendran, M. Revathi, Krithiga Ravi, et al.
IEEE Access (2024) Vol. 12, pp. 45923-45935
Open Access | Times Cited: 1
Enhancing Wireless Sensor Network Security Through Mutual Information Analysis for Intrusion Detection and Resilience
M.Sahaya Sheela
Deleted Journal (2024) Vol. 20, Iss. 5s, pp. 1957-1965
Open Access | Times Cited: 1
M.Sahaya Sheela
Deleted Journal (2024) Vol. 20, Iss. 5s, pp. 1957-1965
Open Access | Times Cited: 1
Leadership and safety culture in drilling operations: strategies for zero incidents
Ayemere Ukato, Dazok Donald Jambol, Chinwe Ozowe, et al.
International Journal of Management & Entrepreneurship Research (2024) Vol. 6, Iss. 6, pp. 1824-1841
Open Access | Times Cited: 1
Ayemere Ukato, Dazok Donald Jambol, Chinwe Ozowe, et al.
International Journal of Management & Entrepreneurship Research (2024) Vol. 6, Iss. 6, pp. 1824-1841
Open Access | Times Cited: 1
Blockchain-Enabled Transformation: Decentralized Planning and Secure Peer-to-Peer Trading in Local Energy Networks
B Wang, Xiaolin Guo
Sustainable Energy Grids and Networks (2024) Vol. 40, pp. 101556-101556
Closed Access | Times Cited: 1
B Wang, Xiaolin Guo
Sustainable Energy Grids and Networks (2024) Vol. 40, pp. 101556-101556
Closed Access | Times Cited: 1
DEVELOPMENT OF NETWORK SIMULATION MODEL FOR EVALUATING THE EFFICIENCY OF DISTRIBUTED CONSENSUS TAKING INTO ACCOUNT THE INSTABILITY OF NETWORK CONNECTIONS
Stanislav Zhuravel
Information and communication technologies electronic engineering (2024) Vol. 4, Iss. 1, pp. 10-19
Closed Access
Stanislav Zhuravel
Information and communication technologies electronic engineering (2024) Vol. 4, Iss. 1, pp. 10-19
Closed Access
Spam Mail Detection Using Blockchai
Niraj patil
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT (2024) Vol. 08, Iss. 05, pp. 1-5
Open Access
Niraj patil
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT (2024) Vol. 08, Iss. 05, pp. 1-5
Open Access
Mitigating MEV attacks with a two-tiered architecture utilizing verifiable decryption
Mustafa Ibrahim Alnajjar, Mehmet Sabır Kiraz, Ali H. Al‐Bayatti, et al.
EURASIP Journal on Wireless Communications and Networking (2024) Vol. 2024, Iss. 1
Open Access
Mustafa Ibrahim Alnajjar, Mehmet Sabır Kiraz, Ali H. Al‐Bayatti, et al.
EURASIP Journal on Wireless Communications and Networking (2024) Vol. 2024, Iss. 1
Open Access