
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Comprehensive Review on Secure Biometric-Based Continuous Authentication and User Profiling
S. Ayeswarya, K. John Singh
IEEE Access (2024) Vol. 12, pp. 82996-83021
Open Access | Times Cited: 5
S. Ayeswarya, K. John Singh
IEEE Access (2024) Vol. 12, pp. 82996-83021
Open Access | Times Cited: 5
Showing 5 citing articles:
Enhancing Ad Hoc Network Security using Palm Vein Biometric Features
Abdelnasser Mohamed, A. A. Salama, Amr Ismail
Engineering Technology & Applied Science Research (2025) Vol. 15, Iss. 1, pp. 20034-20041
Open Access
Abdelnasser Mohamed, A. A. Salama, Amr Ismail
Engineering Technology & Applied Science Research (2025) Vol. 15, Iss. 1, pp. 20034-20041
Open Access
FacekeyID: an adaptive weighted sum score-based fusion framework for continuous user authentication
S. Ayeswarya, K. John Singh
Engineering Research Express (2024) Vol. 6, Iss. 4, pp. 045214-045214
Closed Access | Times Cited: 1
S. Ayeswarya, K. John Singh
Engineering Research Express (2024) Vol. 6, Iss. 4, pp. 045214-045214
Closed Access | Times Cited: 1
Enhancing Keystroke Dynamics Authentication with Ensemble Learning and Data Resampling Techniques
X. Wang, Daqing Hou
Electronics (2024) Vol. 13, Iss. 22, pp. 4559-4559
Open Access
X. Wang, Daqing Hou
Electronics (2024) Vol. 13, Iss. 22, pp. 4559-4559
Open Access
Social Media Privacy Dilemmas Addressing Security Challenges Through Continuous Authentication
K. John Singh, S. Ayeswarya
Advances in information security, privacy, and ethics book series (2024), pp. 295-310
Closed Access
K. John Singh, S. Ayeswarya
Advances in information security, privacy, and ethics book series (2024), pp. 295-310
Closed Access
Smartphone Continuous Authentication via Deep Behavioral Features and Isolation Forest
H. Ma, Zhongrui Li, Shiyu Mou
(2024), pp. 479-483
Closed Access
H. Ma, Zhongrui Li, Shiyu Mou
(2024), pp. 479-483
Closed Access