OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Cryptanalysis of Biometric Based Secure User Authentication Protocol for IoT Applications
RVS Praveen, P. Pabitha
(2022), pp. 1-6
Closed Access | Times Cited: 23

Showing 23 citing articles:

ASK-RAM-IMOT: Autonomous Shared Keys based Remote Authentication Method for Internet of Medical Things Applications
RVS Praveen, P. Pabitha
Wireless Personal Communications (2023) Vol. 131, Iss. 1, pp. 273-293
Closed Access | Times Cited: 35

A Comparative Study of Deep Learning Models for ECG Signal-based User Classification
P. Pabitha, RVS Praveen, Kamma Cheruvu Jayaraja Chandana, et al.
(2023)
Closed Access | Times Cited: 17

A Review on Machine Learning-based Malware Detection Techniques for Internet of Things (IoT) Environments
S. Sasikala, Sengathir Janakiraman
Wireless Personal Communications (2023) Vol. 132, Iss. 3, pp. 1961-1974
Closed Access | Times Cited: 6

Teaching Learning-Based Optimization for Medical IoT applications Service Placement in Fog Computing
R Baskar, E. Mohanraj, T Sneka, et al.
2020 IEEE International Students' Conference on Electrical,Electronics and Computer Science (SCEECS) (2024)
Closed Access | Times Cited: 2

LBA-PAKE: Lattice-Based Anonymous Password Based Authentication Key Exchange Scheme for VANET
Arman Ahmad, S. Jagatheswari
(2023), pp. 1-8
Closed Access | Times Cited: 5

Privacy-Preserving Brakerski-Gentry-Vaikuntanathan (BGV) Homomorphic Encryption for IoMT Data Security
V. Vinoth Kumar, P. Pabitha
(2024), pp. 1-6
Closed Access | Times Cited: 1

A Case Study Using Companies to Examine the Nmap Tool’s Applicability for Network Security Assessment
J. Asokan, A. Kaleel Rahuman, B. Suganthi, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 3

NeuroCluster: Neural Networks for Intelligent Energy-Aware Clustering in IIoT
R. Sujatha, Raghavan Gopalakrishnan, V Shreemitha, et al.
(2024), pp. 1-6
Closed Access

Intelligent Decision-making Algorithm for IoT Enabled Smart shopping
J Mythili, S T Menmoli, S Dhanusuya, et al.
2022 International Conference on Communication, Computing and Internet of Things (IC3IoT) (2024), pp. 1-7
Closed Access

Epileptic Seizure Diagnosis using Bayesian Belief Network and T-CNN
S Poovarasu, R. Gopinath, A Mohanraj, et al.
(2024), pp. 1-6
Closed Access

Enhancing Cyber-Attack Detection in IoT Networks through Deep Reinforcement Learning
T Subalaxmi, R Akalya, R Kaviya, et al.
(2024), pp. 1-6
Closed Access

Hybrid LSTM-RNN and Lion Optimization Algorithm for IoT-based Proactive Healthcare Data Management
R. Kabila, Shruthi Balaji, V Vikraam, et al.
(2024), pp. 1-7
Closed Access

Differential Privacy in Spatial Task Assignment for Cloud Crowdsourcing
S Santhosh, S. M. Vadivel, Prana Yoga, et al.
(2024), pp. 1-6
Closed Access

Designing an Authentication Methodology in IoT Using Energy Consumption Patterns
Edi Marian Timofte, Alexandra Ligia Balan, Teodor Iftime
(2024), pp. 64-70
Closed Access

An IoT-based Smart Grains Warehouse Monitoring System
R. Arun, J. Manju, A. G. Balamurugan, et al.
AIP conference proceedings (2024) Vol. 3075, pp. 020144-020144
Closed Access

An Approach for Securing IoT Data using Blockchain and Proxy Re-Encryption
M. Saradha, B Keerthivasan, Mpl Arunachalam, et al.
(2024), pp. 1-6
Closed Access

Improving Healthcare Data Security Using Cheon-Kim-Kim-Song (CKKS) Homomorphic Encryption
P. Sathishkumar, K Pugalarasan, C Ponnparamaguru, et al.
(2024), pp. 1-6
Closed Access

Recycling as a Service: IoT Enabled Smart Waste Management System with Machine Learning
R. Poonkuzhali, M Karamath, S. Poonkuzhali, et al.
(2024) Vol. 12, pp. 1-6
Closed Access

Predictive Power of Logistic Regression in Cryptocurrency Price Analysis
R Poonkuzhali, J Hitesh Paliwal, Govind Hariharan, et al.
(2024), pp. 1-6
Closed Access

Enhancing IoT Data Security with Blockchain Based Inner Product Encryption Algorithm
Dr K Poongodi, C Gopica, Astuty Amrin, et al.
(2024), pp. 1-6
Closed Access

Enhanced Cloud Data Security with Lightweight Chaotic Map and Quantum Key Distribution
M. V. Anjana Devi, G Aasha, Pandey Vimal, et al.
(2024), pp. 1-6
Closed Access

Page 1

Scroll to top