
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Malicious Node Identification Strategy With Environmental Parameters
Zhijun Teng, Baohe Pang, Chunqiu Du, et al.
IEEE Access (2020) Vol. 8, pp. 149522-149530
Open Access | Times Cited: 16
Zhijun Teng, Baohe Pang, Chunqiu Du, et al.
IEEE Access (2020) Vol. 8, pp. 149522-149530
Open Access | Times Cited: 16
Showing 16 citing articles:
An Overview of Cyber Threats, Attacks and Countermeasures on the Primary Domains of Smart Cities
Vasiliki Demertzi, Stavros Demertzis, Konstantinos Demertzis
Applied Sciences (2023) Vol. 13, Iss. 2, pp. 790-790
Open Access | Times Cited: 50
Vasiliki Demertzi, Stavros Demertzis, Konstantinos Demertzis
Applied Sciences (2023) Vol. 13, Iss. 2, pp. 790-790
Open Access | Times Cited: 50
Employ DBSCAN and Neighbor Voting to Screen Selective Forwarding Attack Under Variable Environment in Event-Driven Wireless Sensor Networks
Yinghong Liu, Yuanming Wu
IEEE Access (2021) Vol. 9, pp. 77090-77105
Open Access | Times Cited: 22
Yinghong Liu, Yuanming Wu
IEEE Access (2021) Vol. 9, pp. 77090-77105
Open Access | Times Cited: 22
Trust Based DoS Attack Detection in Wireless Sensor Networks for Reliable Data Transmission
C. Anand, N. Vasuki
Wireless Personal Communications (2021) Vol. 121, Iss. 4, pp. 2911-2926
Closed Access | Times Cited: 21
C. Anand, N. Vasuki
Wireless Personal Communications (2021) Vol. 121, Iss. 4, pp. 2911-2926
Closed Access | Times Cited: 21
Multihop Trust Evaluation Using Memory Integrity in Wireless Sensor Networks
S. Sundeep Desai, Manisha J. Nene
IEEE Transactions on Information Forensics and Security (2021) Vol. 16, pp. 4092-4100
Open Access | Times Cited: 16
S. Sundeep Desai, Manisha J. Nene
IEEE Transactions on Information Forensics and Security (2021) Vol. 16, pp. 4092-4100
Open Access | Times Cited: 16
Optimized deep learning‐based intrusion detection for wireless sensor networks
Gowdhaman Vembu, Dhanapal Ramasamy
International Journal of Communication Systems (2022) Vol. 36, Iss. 13
Closed Access | Times Cited: 9
Gowdhaman Vembu, Dhanapal Ramasamy
International Journal of Communication Systems (2022) Vol. 36, Iss. 13
Closed Access | Times Cited: 9
An Iterative Convolutional Neural Network Based Malicious Node Detection (ICNNMND) Protocol For Internet of Things
Moemedi Moka, Karabo Serome, Rajalakshmi Selvaraj
Wireless Personal Communications (2024) Vol. 137, Iss. 2, pp. 1217-1232
Closed Access | Times Cited: 1
Moemedi Moka, Karabo Serome, Rajalakshmi Selvaraj
Wireless Personal Communications (2024) Vol. 137, Iss. 2, pp. 1217-1232
Closed Access | Times Cited: 1
Blockchain-Machine Learning Fusion for Enhanced Malicious Node Detection in Wireless Sensor Networks
Osama A. Khashan
Knowledge-Based Systems (2024), pp. 112557-112557
Open Access | Times Cited: 1
Osama A. Khashan
Knowledge-Based Systems (2024), pp. 112557-112557
Open Access | Times Cited: 1
Multi agent dynamic weight based cluster trust estimation for hierarchical wireless sensor networks
Rahul K. Das, Mona Dwivedi
Peer-to-Peer Networking and Applications (2022) Vol. 15, Iss. 3, pp. 1505-1520
Closed Access | Times Cited: 6
Rahul K. Das, Mona Dwivedi
Peer-to-Peer Networking and Applications (2022) Vol. 15, Iss. 3, pp. 1505-1520
Closed Access | Times Cited: 6
A Survey on Detection of Malicious Nodes in Wireless Sensor Networks
Minakshi Sahu, Nilambar Sethi, Susanta Das
2022 6th International Conference on Trends in Electronics and Informatics (ICOEI) (2022), pp. 710-715
Closed Access | Times Cited: 4
Minakshi Sahu, Nilambar Sethi, Susanta Das
2022 6th International Conference on Trends in Electronics and Informatics (ICOEI) (2022), pp. 710-715
Closed Access | Times Cited: 4
Malicious Node Detection Model with Enhanced QoS Mechanisms in Wireless Sensor Network for Secure Data Transmission
Orchu Aruna, Midhunchakkaravarthy
(2024), pp. 520-524
Closed Access
Orchu Aruna, Midhunchakkaravarthy
(2024), pp. 520-524
Closed Access
An Iterative Convolutional Neural Network Based Malicious Node Detection (ICNN-MND) Protocol For Internet of Things
Moemedi Moka, Karabo Serome, Rajalakshmi Selvaraj
Research Square (Research Square) (2023)
Open Access | Times Cited: 1
Moemedi Moka, Karabo Serome, Rajalakshmi Selvaraj
Research Square (Research Square) (2023)
Open Access | Times Cited: 1
A Robot–Sensor Network Security Architecture for Monitoring Applications
F.J. Fernández-Jiménez, José Ramiro Martínez‐de Dios
IEEE Internet of Things Journal (2021) Vol. 9, Iss. 8, pp. 6288-6304
Open Access | Times Cited: 2
F.J. Fernández-Jiménez, José Ramiro Martínez‐de Dios
IEEE Internet of Things Journal (2021) Vol. 9, Iss. 8, pp. 6288-6304
Open Access | Times Cited: 2
Intrusion Detection in Wireless Sensor Networks using Optics Algorithm
N Dharini, J Sowndharya, P Sudha
2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC) (2022), pp. 1265-1272
Closed Access | Times Cited: 1
N Dharini, J Sowndharya, P Sudha
2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC) (2022), pp. 1265-1272
Closed Access | Times Cited: 1
A Brief Survey on Enhanced Quality of Service Mechanisms in Wireless Sensor Network for Secure Data Transmission
Pavan Vamsi Mohan Movva, Radhika Rani Chintala
Lecture notes in networks and systems (2023), pp. 303-314
Closed Access
Pavan Vamsi Mohan Movva, Radhika Rani Chintala
Lecture notes in networks and systems (2023), pp. 303-314
Closed Access
Efficient malicious node detection system for forest fire monitoring by trust calculation using EDENN algorithm in WSN environment
Jamuna Rani M, Azhagu Jaisudhan Pazhani A
Research Square (Research Square) (2022)
Open Access
Jamuna Rani M, Azhagu Jaisudhan Pazhani A
Research Square (Research Square) (2022)
Open Access
Node authentication using the voting scheme for clustered network
Bushra Jaber M. Jawad, Saif Al-Alak
2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME) (2022), pp. 1-6
Closed Access
Bushra Jaber M. Jawad, Saif Al-Alak
2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME) (2022), pp. 1-6
Closed Access