
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Innovative Energy-Efficient Proxy Re-Encryption for Secure Data Exchange in Wireless Sensor Networks
Osama A. Khashan, Nour M. Khafajah, Waleed Alomoush, et al.
IEEE Access (2024) Vol. 12, pp. 23290-23304
Open Access | Times Cited: 11
Osama A. Khashan, Nour M. Khafajah, Waleed Alomoush, et al.
IEEE Access (2024) Vol. 12, pp. 23290-23304
Open Access | Times Cited: 11
Showing 11 citing articles:
Enhancing intrusion detection in IoT networks using machine learning-based feature selection and ensemble models
Ayoob Almotairi, Samer Atawneh, Osama A. Khashan, et al.
Systems Science & Control Engineering (2024) Vol. 12, Iss. 1
Open Access | Times Cited: 16
Ayoob Almotairi, Samer Atawneh, Osama A. Khashan, et al.
Systems Science & Control Engineering (2024) Vol. 12, Iss. 1
Open Access | Times Cited: 16
An Enhanced Encryption Scheme for IoT ‐Based Wireless Sensor Network Using DNA Enclosed Fully Homomorphic Approach
Alka P. Sawlikar, Devashri Raich, B. Ganguly, et al.
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 3
Closed Access
Alka P. Sawlikar, Devashri Raich, B. Ganguly, et al.
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 3
Closed Access
Development of Heuristic Strategy With Hybrid Encryption for Energy Efficient and Secure Data Storage Scheme in Blockchain‐Based Mobile Edge Computing
Khaled Matrouk, Punithavathi Rasappan, Priyanka Bhutani, et al.
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 2
Closed Access
Khaled Matrouk, Punithavathi Rasappan, Priyanka Bhutani, et al.
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 2
Closed Access
Ensuring Fair Data Trading via Passive Proxy Re-encryption with Smart Contracts
Peng Zhang, Jiaquan Wei, Yuhong Liu, et al.
Lecture notes in computer science (2025), pp. 257-266
Closed Access
Peng Zhang, Jiaquan Wei, Yuhong Liu, et al.
Lecture notes in computer science (2025), pp. 257-266
Closed Access
Aligning security and energy-efficiency using change detection and partial encryption for wireless camera networks
Osama A. Khashan
Engineering Science and Technology an International Journal (2024) Vol. 53, pp. 101689-101689
Open Access | Times Cited: 3
Osama A. Khashan
Engineering Science and Technology an International Journal (2024) Vol. 53, pp. 101689-101689
Open Access | Times Cited: 3
Smart Energy-Efficient Encryption for Wireless Multimedia Sensor Networks Using Deep Learning
Osama A. Khashan, Nour M. Khafajah, Waleed Alomoush, et al.
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 5745-5763
Open Access | Times Cited: 3
Osama A. Khashan, Nour M. Khafajah, Waleed Alomoush, et al.
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 5745-5763
Open Access | Times Cited: 3
Blockchain-Machine Learning Fusion for Enhanced Malicious Node Detection in Wireless Sensor Networks
Osama A. Khashan
Knowledge-Based Systems (2024), pp. 112557-112557
Open Access | Times Cited: 1
Osama A. Khashan
Knowledge-Based Systems (2024), pp. 112557-112557
Open Access | Times Cited: 1
Performance, privacy, and security issues of TCP/IP at the application layer: A comprehensive survey
Timothy Murkomen
GSC Advanced Research and Reviews (2024) Vol. 18, Iss. 3, pp. 234-264
Open Access
Timothy Murkomen
GSC Advanced Research and Reviews (2024) Vol. 18, Iss. 3, pp. 234-264
Open Access
Research on Optimization of Communication Network Security and Intelligent Supervision Model in Urban Community Aging Adaptation Renovation
Liu Yang
International Journal of Communication Networks and Information Security (IJCNIS) (2024)
Open Access
Liu Yang
International Journal of Communication Networks and Information Security (IJCNIS) (2024)
Open Access
A metaheuristic approach for hierarchical wireless sensor networks using particle swarm optimisation‐based Enhanced LEACH protocol
Punith Bekal, Pramod Kumar, Pallavi R. Mane
IET Wireless Sensor Systems (2024) Vol. 14, Iss. 6, pp. 410-426
Open Access
Punith Bekal, Pramod Kumar, Pallavi R. Mane
IET Wireless Sensor Systems (2024) Vol. 14, Iss. 6, pp. 410-426
Open Access
Dual-Stage Machine Learning Approach for Advanced Malicious Node Detection in WSNs
Osama A. Khashan
Ad Hoc Networks (2024), pp. 103672-103672
Closed Access
Osama A. Khashan
Ad Hoc Networks (2024), pp. 103672-103672
Closed Access