
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Secure and Reliable WSN for Internet of Things: Challenges and Enabling Technologies
Sonam Lata, Shabana Mehfuz, Shabana Urooj
IEEE Access (2021) Vol. 9, pp. 161103-161128
Open Access | Times Cited: 51
Sonam Lata, Shabana Mehfuz, Shabana Urooj
IEEE Access (2021) Vol. 9, pp. 161103-161128
Open Access | Times Cited: 51
Showing 1-25 of 51 citing articles:
Internet of Things and Wireless Sensor Networks for Smart Agriculture Applications: A Survey
Md. Najmul Mowla, Neazmul Mowla, A. F. M. Shahen Shah, et al.
IEEE Access (2023) Vol. 11, pp. 145813-145852
Open Access | Times Cited: 57
Md. Najmul Mowla, Neazmul Mowla, A. F. M. Shahen Shah, et al.
IEEE Access (2023) Vol. 11, pp. 145813-145852
Open Access | Times Cited: 57
An enhanced energy efficient protocol for large-scale IoT-based heterogeneous WSNs
Antar Shaddad H. Abdul-Qawy, Nayef Abdulwahab Mohammed Alduais, Abdul‐Malik H. Y. Saad, et al.
Scientific African (2023) Vol. 21, pp. e01807-e01807
Open Access | Times Cited: 22
Antar Shaddad H. Abdul-Qawy, Nayef Abdulwahab Mohammed Alduais, Abdul‐Malik H. Y. Saad, et al.
Scientific African (2023) Vol. 21, pp. e01807-e01807
Open Access | Times Cited: 22
Detection and prevention of sinkhole attacks in MANETS based routing protocol using hybrid AdaBoost-Random forest algorithm
Sherril Sophie Maria Vincent, N. Duraipandian
Expert Systems with Applications (2024) Vol. 249, pp. 123765-123765
Closed Access | Times Cited: 7
Sherril Sophie Maria Vincent, N. Duraipandian
Expert Systems with Applications (2024) Vol. 249, pp. 123765-123765
Closed Access | Times Cited: 7
An extended evaluation on machine learning techniques for Denial-of-Service detection in Wireless Sensor Networks
Silvio E. Quincozes, Juliano F. Kazienko, Vagner E. Quincozes
Internet of Things (2023) Vol. 22, pp. 100684-100684
Closed Access | Times Cited: 13
Silvio E. Quincozes, Juliano F. Kazienko, Vagner E. Quincozes
Internet of Things (2023) Vol. 22, pp. 100684-100684
Closed Access | Times Cited: 13
Current research on Internet of Things (IoT) security protocols: A survey
Raghavendra Mishra, Ankita Mishra
Computers & Security (2025), pp. 104310-104310
Closed Access
Raghavendra Mishra, Ankita Mishra
Computers & Security (2025), pp. 104310-104310
Closed Access
Optimizing Mobile Base Station Placement for Prolonging Wireless Sensor Network Lifetime in IoT Applications
Sahar S. A. Abbas, Tamer Dağ, Tansal Güçlüoğlu
Applied Sciences (2025) Vol. 15, Iss. 3, pp. 1421-1421
Open Access
Sahar S. A. Abbas, Tamer Dağ, Tansal Güçlüoğlu
Applied Sciences (2025) Vol. 15, Iss. 3, pp. 1421-1421
Open Access
Evaluating the Role of Wireless Sensor Networks (Wsn) and Predictive Analysis in Enhancing Road Safety and Logistics in Bogotá, Colombia
Luz Ángela Martínez, Saúl Rick Fernández Hurtado
(2025)
Closed Access
Luz Ángela Martínez, Saúl Rick Fernández Hurtado
(2025)
Closed Access
Chapman Kolmogorov and Deep Recurrent Network Based Seamless Mobility for IOT Data Transmission in Wireless Network
Somashekhara Reddy, N. Thrimoorthy, G. Kadiravan, et al.
Wireless Personal Communications (2025)
Closed Access
Somashekhara Reddy, N. Thrimoorthy, G. Kadiravan, et al.
Wireless Personal Communications (2025)
Closed Access
Insights on the internet of things: past, present, and future directions
Tole Sutikno, Daniël Thalmann
TELKOMNIKA (Telecommunication Computing Electronics and Control) (2022) Vol. 20, Iss. 6, pp. 1399-1399
Open Access | Times Cited: 20
Tole Sutikno, Daniël Thalmann
TELKOMNIKA (Telecommunication Computing Electronics and Control) (2022) Vol. 20, Iss. 6, pp. 1399-1399
Open Access | Times Cited: 20
Knowledge-Based Adaptive Routing for Energy Efficiency and Attack Detection in Ad Hoc Wireless Sensor Networks
M. Joselin Kavitha, M.R. Geetha, R. Isaac Sajan
Computer Networks (2025), pp. 111086-111086
Closed Access
M. Joselin Kavitha, M.R. Geetha, R. Isaac Sajan
Computer Networks (2025), pp. 111086-111086
Closed Access
Energy-Efficient and Secure Double RIS-Aided Wireless Sensor Networks: A QoS-Aware Fuzzy Deep Reinforcement Learning Approach
Sarvenaz Sadat Khatami, Mehrdad Shoeibi, Reza Salehi, et al.
Journal of Sensor and Actuator Networks (2025) Vol. 14, Iss. 1, pp. 18-18
Open Access
Sarvenaz Sadat Khatami, Mehrdad Shoeibi, Reza Salehi, et al.
Journal of Sensor and Actuator Networks (2025) Vol. 14, Iss. 1, pp. 18-18
Open Access
Two-stage robust wireless body area network design
Mohammad Ali Raayatpanah, Atefeh Abdolah Abyaneh, Jocelyne Elias, et al.
Internet of Things (2025), pp. 101540-101540
Open Access
Mohammad Ali Raayatpanah, Atefeh Abdolah Abyaneh, Jocelyne Elias, et al.
Internet of Things (2025), pp. 101540-101540
Open Access
Build–Launch–Consolidate Framework and Toolkit for Impact Analysis on Wireless Sensor Networks
Rakan Alghofaili, Hussah Albinali, Farag Azzedin
Journal of Sensor and Actuator Networks (2024) Vol. 13, Iss. 1, pp. 17-17
Open Access | Times Cited: 3
Rakan Alghofaili, Hussah Albinali, Farag Azzedin
Journal of Sensor and Actuator Networks (2024) Vol. 13, Iss. 1, pp. 17-17
Open Access | Times Cited: 3
Secure Transmission in Wireless Sensor Networks via Reconfigurable Intelligent Surface
Asmaa Amer, Fathi E. Abd El‐Samie, A. Abdelaziz Salem, et al.
Digital Signal Processing (2023) Vol. 140, pp. 104083-104083
Closed Access | Times Cited: 7
Asmaa Amer, Fathi E. Abd El‐Samie, A. Abdelaziz Salem, et al.
Digital Signal Processing (2023) Vol. 140, pp. 104083-104083
Closed Access | Times Cited: 7
Enhancing intrusion detection in wireless sensor networks through deep hybrid network empowered by SC-attention mechanism
Veeranna Gatate, Jayashree Agarkhed
Iran Journal of Computer Science (2024) Vol. 7, Iss. 2, pp. 229-240
Open Access | Times Cited: 2
Veeranna Gatate, Jayashree Agarkhed
Iran Journal of Computer Science (2024) Vol. 7, Iss. 2, pp. 229-240
Open Access | Times Cited: 2
Enhanced Hybrid Intrusion Detection System with Attention Mechanism using Deep Learning
Pundalik Chavan, Harish Hanumanthappa, E. G. Satish, et al.
SN Computer Science (2024) Vol. 5, Iss. 5
Closed Access | Times Cited: 2
Pundalik Chavan, Harish Hanumanthappa, E. G. Satish, et al.
SN Computer Science (2024) Vol. 5, Iss. 5
Closed Access | Times Cited: 2
Cybersecurity Enhancement in IoT Wireless Sensor Networks using Machine Learning
Elise El Ahmar, Ali Rachini, Hani Attar
WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS (2024) Vol. 21, pp. 480-487
Open Access | Times Cited: 2
Elise El Ahmar, Ali Rachini, Hani Attar
WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS (2024) Vol. 21, pp. 480-487
Open Access | Times Cited: 2
Optimal reliable design of energy-efficient Wireless Body Area Networks
Mohammad Ali Raayatpanah, Atefeh Abdolah Abyaneh, Jocelyne Elias, et al.
Internet of Things (2023) Vol. 22, pp. 100727-100727
Closed Access | Times Cited: 5
Mohammad Ali Raayatpanah, Atefeh Abdolah Abyaneh, Jocelyne Elias, et al.
Internet of Things (2023) Vol. 22, pp. 100727-100727
Closed Access | Times Cited: 5
Blockchain-Based Key Management and Authentication Scheme for IoT Networks With Chaotic Scrambling
Jieheng Zheng, Lin Zhang, Yan Feng, et al.
IEEE Transactions on Network Science and Engineering (2022) Vol. 10, Iss. 1, pp. 178-188
Closed Access | Times Cited: 8
Jieheng Zheng, Lin Zhang, Yan Feng, et al.
IEEE Transactions on Network Science and Engineering (2022) Vol. 10, Iss. 1, pp. 178-188
Closed Access | Times Cited: 8
Enhanced Active Eavesdroppers Detection System for Multihop WSNs in Tactical IoT Applications
Masih Abedini, Irfan Al‐Anbagi
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 4, pp. 6748-6760
Closed Access | Times Cited: 4
Masih Abedini, Irfan Al‐Anbagi
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 4, pp. 6748-6760
Closed Access | Times Cited: 4
Novel methods in utilizing wireless sensor networks with blockchain technology: A review
A. Mounika Bhargavi Giridi, L. Jhansi, D. Trishika Sharon, et al.
MATEC Web of Conferences (2024) Vol. 392, pp. 01148-01148
Open Access | Times Cited: 1
A. Mounika Bhargavi Giridi, L. Jhansi, D. Trishika Sharon, et al.
MATEC Web of Conferences (2024) Vol. 392, pp. 01148-01148
Open Access | Times Cited: 1
PathGuard: Trustworthy Routing for Sustainable and Secure IoT-WSN Networks
Neeraj Kumar, Sanjeev Sharma
Wireless Personal Communications (2024) Vol. 136, Iss. 1, pp. 469-487
Open Access | Times Cited: 1
Neeraj Kumar, Sanjeev Sharma
Wireless Personal Communications (2024) Vol. 136, Iss. 1, pp. 469-487
Open Access | Times Cited: 1
Replay attacks in RPL-based Internet of Things: Comparative and empirical study
Hussah Albinali, Farag Azzedin
Computer Networks (2024), pp. 110996-110996
Closed Access | Times Cited: 1
Hussah Albinali, Farag Azzedin
Computer Networks (2024), pp. 110996-110996
Closed Access | Times Cited: 1
An Effective Detection and Classification Approach for DoS Attacks in Wireless Sensor Networks Using Deep Transfer Learning Models and Majority Voting
Safa Ben Atitallah, Maha Driss, Wadii Boulila, et al.
Communications in computer and information science (2022), pp. 180-192
Closed Access | Times Cited: 6
Safa Ben Atitallah, Maha Driss, Wadii Boulila, et al.
Communications in computer and information science (2022), pp. 180-192
Closed Access | Times Cited: 6
Honeynet Implementation in Cyber Security Attack Prevention with Data Monitoring System Using AI Technique and IoT 4G Networks
Kushnian Kour, Subhashish Goswami, M. Sharma, et al.
International Journal of Communication Networks and Information Security (IJCNIS) (2022) Vol. 14, Iss. 3, pp. 163-175
Open Access | Times Cited: 6
Kushnian Kour, Subhashish Goswami, M. Sharma, et al.
International Journal of Communication Networks and Information Security (IJCNIS) (2022) Vol. 14, Iss. 3, pp. 163-175
Open Access | Times Cited: 6