OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A comprehensive study on DNA based Security scheme Using Deep Learning in Healthcare
Sehrish Aqeel, Adnan Shahid Khan, Zeeshan Ahmad, et al.
EDPACS (2021) Vol. 66, Iss. 3, pp. 1-17
Closed Access | Times Cited: 14

Showing 14 citing articles:

Machine learning and deep learning-based approach in smart healthcare: Recent advances, applications, challenges and opportunities
Anichur Rahman, Tanoy Debnath, Dipanjali Kundu, et al.
AIMS Public Health (2024) Vol. 11, Iss. 1, pp. 58-109
Open Access | Times Cited: 33

TPAAD: Two‐phase authentication system for denial of service attack detection and mitigation using machine learning in software‐defined network
Najmun Nisa, Adnan Shahid Khan, Zeeshan Ahmad, et al.
International Journal of Network Management (2024) Vol. 34, Iss. 3
Open Access | Times Cited: 4

Blockchain-based Multifactor Authentication for Future 6G Cellular Networks: A Systematic Review
Jamil Asim, Adnan Shahid Khan, Rashad Mahmood Saqib, et al.
Applied Sciences (2022) Vol. 12, Iss. 7, pp. 3551-3551
Open Access | Times Cited: 18

Lightweight Multifactor Authentication Scheme for NextGen Cellular Networks
Adnan Shahid Khan, Yasir Javed, Rashad Mahmood Saqib, et al.
IEEE Access (2022) Vol. 10, pp. 31273-31288
Open Access | Times Cited: 18

A Survey on 6G Enabled Light Weight Authentication Protocol for UAVs, Security, Open Research Issues and Future Directions
Adnan Shahid Khan, Muhammad Ali Sattar, Kashif Nisar, et al.
Applied Sciences (2022) Vol. 13, Iss. 1, pp. 277-277
Open Access | Times Cited: 15

MS‐ADS: Multistage Spectrogram image‐based Anomaly Detection System for IoT security
Zeeshan Ahmad, Adnan Shahid Khan, Karti­nah Zen, et al.
Transactions on Emerging Telecommunications Technologies (2023) Vol. 34, Iss. 8
Open Access | Times Cited: 6

S-ADS: Spectrogram Image-based Anomaly Detection System for IoT networks
Zeeshan Ahmad, Adnan Shahid Khan, Sehrish Aqeel, et al.
(2022), pp. 105-110
Closed Access | Times Cited: 6

Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure
Nayeem Ahmad Khan, Adnan Shahid Khan, Hushmat Amin Kar, et al.
(2022), pp. 126-130
Closed Access | Times Cited: 5

AutoBots: A Botnet Intrusion Detection Scheme Using Deep Autoencoders
Ashwin Verma, Pronaya Bhattacharya, Vivek Kumar Prasad, et al.
Lecture notes in networks and systems (2023), pp. 873-886
Closed Access | Times Cited: 2

Utilization of Deep Learning Models for Safe Human‐Friendly Computing in Cloud, Fog, and Mobile Edge Networks
Diego M.R. Tudesco, Anand Deshpande, Asif Ali Laghari, et al.
(2024), pp. 221-248
Closed Access

Assessment of Water Quality Using Multi-Layered Mamdani Fuzzy Inference Expert System
G.F. Ahmad, Sehrish Aqeel, Zobia Zafar, et al.
Advances in systems analysis, software engineering, and high performance computing book series (2024), pp. 334-352
Closed Access

DNA encoding schemes herald a new age in cybersecurity for safeguarding digital assets
Sehrish Aqeel, Sajid Ullah Khan, Adnan Shahid Khan, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access

Conceptual Review of DoS Attacks in Software Defined Networks
Najmun Nisa, Adnan Shahid Khan, Zeeshan Ahmad, et al.
(2022), pp. 154-158
Closed Access | Times Cited: 1

Evaluation of Usability of E-Commerce Websites in Pakistan Using System Usability Scale and Heuristics Methods
Awais Ashraf, Sehrish Aqeel, AbdulHafeez Muhammad
Advances in information security, privacy, and ethics book series (2023), pp. 162-175
Closed Access

Page 1

Scroll to top