
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A network security evaluation method based on fuzzy and RST
Zhang Li-juan, Qingxian Wang
(2010), pp. V2-44
Closed Access | Times Cited: 10
Zhang Li-juan, Qingxian Wang
(2010), pp. V2-44
Closed Access | Times Cited: 10
Showing 10 citing articles:
A Pythagorean fuzzy Petri net based security assessment model for civil aviation airport security inspection information system
Hongyu Yang, Yuhao Feng
International Journal of Intelligent Systems (2021) Vol. 36, Iss. 5, pp. 2122-2143
Open Access | Times Cited: 14
Hongyu Yang, Yuhao Feng
International Journal of Intelligent Systems (2021) Vol. 36, Iss. 5, pp. 2122-2143
Open Access | Times Cited: 14
Multidisciplinary in Cryptology
Sattar B. Sadkhan, Nidaa A. Abbas
Advances in information security, privacy, and ethics book series (2014), pp. 1-28
Closed Access | Times Cited: 5
Sattar B. Sadkhan, Nidaa A. Abbas
Advances in information security, privacy, and ethics book series (2014), pp. 1-28
Closed Access | Times Cited: 5
COMPREHENSIVE APPROACH TO INFORMATION SHARING FOR INCREASED NETWORK SECURITY AND SURVIVABILITY
Michał Choraś
Cybernetics & Systems (2013) Vol. 44, Iss. 6-7, pp. 550-568
Closed Access | Times Cited: 5
Michał Choraś
Cybernetics & Systems (2013) Vol. 44, Iss. 6-7, pp. 550-568
Closed Access | Times Cited: 5
Hybrid Network Defense Model Based on Fuzzy Evaluation
Ying-Chiang Cho, Jen‐Yi Pan
The Scientific World JOURNAL (2014) Vol. 2014, pp. 1-12
Open Access | Times Cited: 4
Ying-Chiang Cho, Jen‐Yi Pan
The Scientific World JOURNAL (2014) Vol. 2014, pp. 1-12
Open Access | Times Cited: 4
A efficient key strategy for prolonging network lifetime in wireless network
Neha Gupta, Anurag Jain, Harsh Kumar Singh
2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT) (2013), pp. 1-4
Closed Access | Times Cited: 3
Neha Gupta, Anurag Jain, Harsh Kumar Singh
2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT) (2013), pp. 1-4
Closed Access | Times Cited: 3
Analysis of Models of Security to Mitigate the Risks, Vulnerabilities and Threats in a Company of Services of Telecommunications
Segundo Moisés Toapanta Toapanta, Luis Enrique Mafla Gallegos, Maria Jose Chevez Moran, et al.
(2020), pp. 445-450
Closed Access | Times Cited: 3
Segundo Moisés Toapanta Toapanta, Luis Enrique Mafla Gallegos, Maria Jose Chevez Moran, et al.
(2020), pp. 445-450
Closed Access | Times Cited: 3
Analysis of security algorithms towards secured communication in wireless networks
E. Jai Kumari, A. Kannammal
(2012), pp. 1-6
Closed Access | Times Cited: 2
E. Jai Kumari, A. Kannammal
(2012), pp. 1-6
Closed Access | Times Cited: 2
Network security risk analysis using attacker's behavioral parameters
Hoora Ketabdar, Razieh Rezaee, Abbas Ghaemi‐Bafghi, et al.
(2016), pp. 325-330
Closed Access | Times Cited: 1
Hoora Ketabdar, Razieh Rezaee, Abbas Ghaemi‐Bafghi, et al.
(2016), pp. 325-330
Closed Access | Times Cited: 1
A Design of the Network Security Evaluation System
Zi Yan Shi, Guo Lin Zhao, Qiao Lin Hu
Applied Mechanics and Materials (2014) Vol. 686, pp. 458-462
Closed Access
Zi Yan Shi, Guo Lin Zhao, Qiao Lin Hu
Applied Mechanics and Materials (2014) Vol. 686, pp. 458-462
Closed Access
AUTHENTICATION METHOD WPA/WPA2 KEY PARAMETERS’ DEFINITION FOR IEEE 802.11 BASED HONEYPOT
Роман Банах
Radio Electronics Computer Science Control (2018), Iss. 1, pp. 110-118
Open Access
Роман Банах
Radio Electronics Computer Science Control (2018), Iss. 1, pp. 110-118
Open Access