
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Simulative Survey of Flooding Attacks in Intermittently Connected Vehicular Delay Tolerant Networks
Waqar Khalid, Naveed Ahmed, Suleman Khan, et al.
IEEE Access (2023) Vol. 11, pp. 75628-75656
Open Access | Times Cited: 12
Waqar Khalid, Naveed Ahmed, Suleman Khan, et al.
IEEE Access (2023) Vol. 11, pp. 75628-75656
Open Access | Times Cited: 12
Showing 12 citing articles:
Enhancing Energy Efficiency of Sensors and Communication Devices in Opportunistic Networks Through Human Mobility Interaction Prediction
Ambreen Memon, Sardar M. N. Islam, Muhammad Nadeem Ali, et al.
Sensors (2025) Vol. 25, Iss. 5, pp. 1414-1414
Open Access
Ambreen Memon, Sardar M. N. Islam, Muhammad Nadeem Ali, et al.
Sensors (2025) Vol. 25, Iss. 5, pp. 1414-1414
Open Access
A Sustainable Data Dissemination Approach by Utilizing the Internet of Moving Things
Ambreen Memon, Muhammad Nadeem Ali, Byung-Seo Kim
IEEE Access (2024) Vol. 12, pp. 26581-26590
Open Access | Times Cited: 3
Ambreen Memon, Muhammad Nadeem Ali, Byung-Seo Kim
IEEE Access (2024) Vol. 12, pp. 26581-26590
Open Access | Times Cited: 3
Optimized Feature Selection for DDoS Attack Recognition and Mitigation in SD-VANETs
Usman Tariq
World Electric Vehicle Journal (2024) Vol. 15, Iss. 9, pp. 395-395
Open Access | Times Cited: 2
Usman Tariq
World Electric Vehicle Journal (2024) Vol. 15, Iss. 9, pp. 395-395
Open Access | Times Cited: 2
Reliable data transmission for a VANET-IoIT architecture: A DNN approach
Joydev Ghosh, Neeraj Kumar, Khaled A. Al-Utaibi, et al.
Internet of Things (2024) Vol. 25, pp. 101129-101129
Closed Access | Times Cited: 2
Joydev Ghosh, Neeraj Kumar, Khaled A. Al-Utaibi, et al.
Internet of Things (2024) Vol. 25, pp. 101129-101129
Closed Access | Times Cited: 2
JamholeHunter: On detecting new wormhole attack in Opportunistic Mobile Networks
Ala Altaweel, Sidra Aslam, Ibrahim Kamel
Journal of Network and Computer Applications (2024) Vol. 230, pp. 103953-103953
Closed Access | Times Cited: 2
Ala Altaweel, Sidra Aslam, Ibrahim Kamel
Journal of Network and Computer Applications (2024) Vol. 230, pp. 103953-103953
Closed Access | Times Cited: 2
Novel Authenticated Strategy for Security Enhancement in VANET System using Block Chain Assisted Novel Routing Protocol
Anand N. Patil, Sujata V. Mallapur
Scalable Computing Practice and Experience (2024) Vol. 25, Iss. 1, pp. 593-605
Open Access | Times Cited: 1
Anand N. Patil, Sujata V. Mallapur
Scalable Computing Practice and Experience (2024) Vol. 25, Iss. 1, pp. 593-605
Open Access | Times Cited: 1
A Novel Model for Vehicular Delay Tolerant Networks Using Deterministic Bundle Relaying Scheme
Pradeep Kumar Tiwari, Shiv Prakash, Animesh Tripathi, et al.
IEEE Access (2024) Vol. 12, pp. 68916-68925
Open Access | Times Cited: 1
Pradeep Kumar Tiwari, Shiv Prakash, Animesh Tripathi, et al.
IEEE Access (2024) Vol. 12, pp. 68916-68925
Open Access | Times Cited: 1
Content Based Email Spam Filtering and Detection using Hybrid Supervised Learning Approach
Najam U. Saquib, Waqar Khalid, Sahibzadi Annum Shaheen, et al.
(2024) Vol. abs/2005.08773, pp. 319-323
Closed Access | Times Cited: 1
Najam U. Saquib, Waqar Khalid, Sahibzadi Annum Shaheen, et al.
(2024) Vol. abs/2005.08773, pp. 319-323
Closed Access | Times Cited: 1
A New Approach for Prevention of Malicious Attack in Post Disaster Using Delay Tolerant Network
Chandrima Chakrabarti, Saptarshi Bal, R. C. Jaiswal, et al.
(2024), pp. 1-6
Closed Access
Chandrima Chakrabarti, Saptarshi Bal, R. C. Jaiswal, et al.
(2024), pp. 1-6
Closed Access
A Novel Approach for Detection of Malicious Attack during Post Disaster Using UAV Assisted Delay Tolerant Network
Chandrima Chakrabarti
(2024), pp. 1-6
Closed Access
Chandrima Chakrabarti
(2024), pp. 1-6
Closed Access
Cyber-Threat-Intelligence: Detection of Selective Packet Drops and Fake Packet Attacks in Opportunistic Networks (DOSFAN)
Waqar Khalid, Naveed Ahmad, Yasir Javed, et al.
(2024), pp. 50-56
Closed Access
Waqar Khalid, Naveed Ahmad, Yasir Javed, et al.
(2024), pp. 50-56
Closed Access
Autonomous Areial Surveillance System For Flood Rescue Operations
Elangovan Vellaichamy, R Hemanathan, T Shobhana, et al.
(2024), pp. 1-5
Closed Access
Elangovan Vellaichamy, R Hemanathan, T Shobhana, et al.
(2024), pp. 1-5
Closed Access