
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
SliceBlock: Context-Aware Authentication Handover and Secure Network Slicing Using DAG-Blockchain in Edge-Assisted SDN/NFV-6G Environment
Ihsan H. Abdulqadder, Shijie Zhou
IEEE Internet of Things Journal (2022) Vol. 9, Iss. 18, pp. 18079-18097
Closed Access | Times Cited: 40
Ihsan H. Abdulqadder, Shijie Zhou
IEEE Internet of Things Journal (2022) Vol. 9, Iss. 18, pp. 18079-18097
Closed Access | Times Cited: 40
Showing 1-25 of 40 citing articles:
Toward Software-Defined Networking-Based IoT Frameworks: A Systematic Literature Review, Taxonomy, Open Challenges and Prospects
Shahbaz Siddiqui, Sufian Hameed, Syed Attique Shah, et al.
IEEE Access (2022) Vol. 10, pp. 70850-70901
Open Access | Times Cited: 69
Shahbaz Siddiqui, Sufian Hameed, Syed Attique Shah, et al.
IEEE Access (2022) Vol. 10, pp. 70850-70901
Open Access | Times Cited: 69
A Survey on Machine Learning-Based Misbehavior Detection Systems for 5G and Beyond Vehicular Networks
Abdelwahab Boualouache, Thomas Engel
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 2, pp. 1128-1172
Open Access | Times Cited: 60
Abdelwahab Boualouache, Thomas Engel
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 2, pp. 1128-1172
Open Access | Times Cited: 60
Impacts of blockchain in software‐defined Internet of Things ecosystem with Network Function Virtualization for smart applications: Present perspectives and future directions
Anichur Rahman, Jahidul Islam, Dipanjali Kundu, et al.
International Journal of Communication Systems (2023)
Closed Access | Times Cited: 37
Anichur Rahman, Jahidul Islam, Dipanjali Kundu, et al.
International Journal of Communication Systems (2023)
Closed Access | Times Cited: 37
Software-Defined UAV Networks for 6G Systems: Requirements, Opportunities, Emerging Techniques, Challenges, and Research Directions
Md. Abu Baker Siddiki Abir, Mostafa Zaman Chowdhury, Yeong Min Jang
IEEE Open Journal of the Communications Society (2023) Vol. 4, pp. 2487-2547
Open Access | Times Cited: 26
Md. Abu Baker Siddiki Abir, Mostafa Zaman Chowdhury, Yeong Min Jang
IEEE Open Journal of the Communications Society (2023) Vol. 4, pp. 2487-2547
Open Access | Times Cited: 26
Blockchain-Driven Intelligent Scheme for IoT-Based Public Safety System beyond 5G Networks
Tejal Rathod, Nilesh Kumar Jadav, Sudeep Tanwar, et al.
Sensors (2023) Vol. 23, Iss. 2, pp. 969-969
Open Access | Times Cited: 24
Tejal Rathod, Nilesh Kumar Jadav, Sudeep Tanwar, et al.
Sensors (2023) Vol. 23, Iss. 2, pp. 969-969
Open Access | Times Cited: 24
Emerging Technologies for 6G Communication Networks: Machine Learning Approaches
Annisa Anggun Puspitasari, To Truong An, Mohammed H. Alsharif, et al.
Sensors (2023) Vol. 23, Iss. 18, pp. 7709-7709
Open Access | Times Cited: 24
Annisa Anggun Puspitasari, To Truong An, Mohammed H. Alsharif, et al.
Sensors (2023) Vol. 23, Iss. 18, pp. 7709-7709
Open Access | Times Cited: 24
A Review of Blockchain Technology in Knowledge-Defined Networking, Its Application, Benefits, and Challenges
Patikiri Arachchige Don Shehan Nilmantha Wijesekara, Subodha Gunawardena
Network (2023) Vol. 3, Iss. 3, pp. 343-421
Open Access | Times Cited: 18
Patikiri Arachchige Don Shehan Nilmantha Wijesekara, Subodha Gunawardena
Network (2023) Vol. 3, Iss. 3, pp. 343-421
Open Access | Times Cited: 18
SC-CAAC: A Smart-Contract-Based Context-Aware Access Control Scheme for Blockchain-Enabled IoT Systems
Mpyana Mwamba Merlec, Hoh Peter In
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 11, pp. 19866-19881
Open Access | Times Cited: 7
Mpyana Mwamba Merlec, Hoh Peter In
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 11, pp. 19866-19881
Open Access | Times Cited: 7
Contemporary advances in multi-access edge computing: A survey of fundamentals, architecture, technologies, deployment cases, security, challenges, and directions
Mobasshir Mahbub, Raed M. Shubair
Journal of Network and Computer Applications (2023) Vol. 219, pp. 103726-103726
Open Access | Times Cited: 15
Mobasshir Mahbub, Raed M. Shubair
Journal of Network and Computer Applications (2023) Vol. 219, pp. 103726-103726
Open Access | Times Cited: 15
Metaheuristic Algorithms for 6G wireless communications: Recent advances and applications
Ammar Kamal Abasi, Moayad Aloqaily, Mohsen Guizani, et al.
Ad Hoc Networks (2024) Vol. 158, pp. 103474-103474
Closed Access | Times Cited: 4
Ammar Kamal Abasi, Moayad Aloqaily, Mohsen Guizani, et al.
Ad Hoc Networks (2024) Vol. 158, pp. 103474-103474
Closed Access | Times Cited: 4
On challenges of sixth-generation (6G) wireless networks: A comprehensive survey of requirements, applications, and security issues
Muhammad Sajjad Akbar, Zawar Hussain, Muhammad Ikram, et al.
Journal of Network and Computer Applications (2024) Vol. 233, pp. 104040-104040
Open Access | Times Cited: 4
Muhammad Sajjad Akbar, Zawar Hussain, Muhammad Ikram, et al.
Journal of Network and Computer Applications (2024) Vol. 233, pp. 104040-104040
Open Access | Times Cited: 4
Piranha Foraging Optimization Algorithm with Deep Learning Enabled Fault Detection in Blockchain-Assisted Sustainable IoT Environment
Haitham Assiri
Sustainability (2025) Vol. 17, Iss. 4, pp. 1362-1362
Open Access
Haitham Assiri
Sustainability (2025) Vol. 17, Iss. 4, pp. 1362-1362
Open Access
Role of blockchain-enabled Secure Supply Chain management using IIoT for Anomaly detection in 6G
Fateh Bahadur Kunwar, Hitendra Singh Singh, Rakesh Kumar Yadav Yadav
Research Square (Research Square) (2024)
Open Access | Times Cited: 3
Fateh Bahadur Kunwar, Hitendra Singh Singh, Rakesh Kumar Yadav Yadav
Research Square (Research Square) (2024)
Open Access | Times Cited: 3
A Maturity Framework for Zero-Trust Security in Multiaccess Edge Computing
Belal Ali, Simsam Hijjawi, Leith H Campbell, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-14
Open Access | Times Cited: 15
Belal Ali, Simsam Hijjawi, Leith H Campbell, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-14
Open Access | Times Cited: 15
Toward an Efficient and Dynamic Allocation of Radio Access Network Slicing Resources for 5G Era
Xiaolei Chang, Tian Ji, Runsu Zhu, et al.
IEEE Access (2023) Vol. 11, pp. 95037-95050
Open Access | Times Cited: 7
Xiaolei Chang, Tian Ji, Runsu Zhu, et al.
IEEE Access (2023) Vol. 11, pp. 95037-95050
Open Access | Times Cited: 7
Application Study on the Reinforcement Learning Strategies in the Network Awareness Risk Perception and Prevention
Junwei Xie
International Journal of Computational Intelligence Systems (2024) Vol. 17, Iss. 1
Open Access | Times Cited: 2
Junwei Xie
International Journal of Computational Intelligence Systems (2024) Vol. 17, Iss. 1
Open Access | Times Cited: 2
The security and privacy challenges toward cybersecurity of 6G networks: A comprehensive review
Yanlu Li, Yufeng Xiao, Wei Liang, et al.
Computer Science and Information Systems (2024) Vol. 21, Iss. 3, pp. 851-897
Open Access | Times Cited: 2
Yanlu Li, Yufeng Xiao, Wei Liang, et al.
Computer Science and Information Systems (2024) Vol. 21, Iss. 3, pp. 851-897
Open Access | Times Cited: 2
Deep Learning in the Ubiquitous Human–Computer Interactive 6G Era: Applications, Principles and Prospects
Chunlei Chen, Huixiang Zhang, Jinkui Hou, et al.
Biomimetics (2023) Vol. 8, Iss. 4, pp. 343-343
Open Access | Times Cited: 5
Chunlei Chen, Huixiang Zhang, Jinkui Hou, et al.
Biomimetics (2023) Vol. 8, Iss. 4, pp. 343-343
Open Access | Times Cited: 5
A Review on Deploying Blockchain Technology for Network Mobility Management
Patikiri Arachchige Don Shehan Nilmantha Wijesekara
Deleted Journal (2024) Vol. 3, Iss. 1, pp. 1-33
Open Access | Times Cited: 1
Patikiri Arachchige Don Shehan Nilmantha Wijesekara
Deleted Journal (2024) Vol. 3, Iss. 1, pp. 1-33
Open Access | Times Cited: 1
SKAP-NS: A Symmetric Key-Based Authentication Protocol for 5G Network Slicing
Awaneesh Kumar Yadav
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 11, pp. 13363-13372
Closed Access | Times Cited: 1
Awaneesh Kumar Yadav
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 11, pp. 13363-13372
Closed Access | Times Cited: 1
A Comprehensive Survey on Generative AI Solutions in IoT Security
Juan Luis López Delgado, Juan Antonio López Ramos
Electronics (2024) Vol. 13, Iss. 24, pp. 4965-4965
Open Access | Times Cited: 1
Juan Luis López Delgado, Juan Antonio López Ramos
Electronics (2024) Vol. 13, Iss. 24, pp. 4965-4965
Open Access | Times Cited: 1
SDN as a defence mechanism: a comprehensive survey
Believe Ayodele, Victor Buttigieg
International Journal of Information Security (2023) Vol. 23, Iss. 1, pp. 141-185
Open Access | Times Cited: 4
Believe Ayodele, Victor Buttigieg
International Journal of Information Security (2023) Vol. 23, Iss. 1, pp. 141-185
Open Access | Times Cited: 4
An intelligent intrusion prediction and prevention system for software defined internet of things cloud networks
S. Kranthi, M. Kanchana, Suneetha Manne
Peer-to-Peer Networking and Applications (2022) Vol. 16, Iss. 1, pp. 210-225
Closed Access | Times Cited: 6
S. Kranthi, M. Kanchana, Suneetha Manne
Peer-to-Peer Networking and Applications (2022) Vol. 16, Iss. 1, pp. 210-225
Closed Access | Times Cited: 6
An adaptive context-aware vertical handover decision algorithm for heterogeneous networks
Pratyashi Satapathy, Judhistir Mahapatro
Computer Communications (2023) Vol. 209, pp. 188-202
Open Access | Times Cited: 3
Pratyashi Satapathy, Judhistir Mahapatro
Computer Communications (2023) Vol. 209, pp. 188-202
Open Access | Times Cited: 3
A Survey on Securing 6G Wireless Communications based Optimization Techniques
Ammar Kamal Abasi, Moayad Aloqaily, Bassem Ouni, et al.
2022 International Wireless Communications and Mobile Computing (IWCMC) (2023)
Closed Access | Times Cited: 3
Ammar Kamal Abasi, Moayad Aloqaily, Bassem Ouni, et al.
2022 International Wireless Communications and Mobile Computing (IWCMC) (2023)
Closed Access | Times Cited: 3