
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques
Manju Khari, Aditya Garg, Amir H. Gandomi, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2019) Vol. 50, Iss. 1, pp. 73-80
Closed Access | Times Cited: 134
Manju Khari, Aditya Garg, Amir H. Gandomi, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2019) Vol. 50, Iss. 1, pp. 73-80
Closed Access | Times Cited: 134
Showing 1-25 of 134 citing articles:
Encryption and steganography-based text extraction in IoT using the EWCTS optimizer
Binay Kumar Pandey, Digvijay Pandey, Vinay Kumar Nassa, et al.
The Imaging Science Journal (2021) Vol. 69, Iss. 1-4, pp. 38-56
Closed Access | Times Cited: 156
Binay Kumar Pandey, Digvijay Pandey, Vinay Kumar Nassa, et al.
The Imaging Science Journal (2021) Vol. 69, Iss. 1-4, pp. 38-56
Closed Access | Times Cited: 156
Secure Data Transmission and Trustworthiness Judgement Approaches Against Cyber-Physical Attacks in an Integrated Data-Driven Framework
Yuchen Jiang, Shimeng Wu, Hongyan Yang, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2022) Vol. 52, Iss. 12, pp. 7799-7809
Closed Access | Times Cited: 94
Yuchen Jiang, Shimeng Wu, Hongyan Yang, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2022) Vol. 52, Iss. 12, pp. 7799-7809
Closed Access | Times Cited: 94
SSII: Secured and High-Quality Steganography Using Intelligent Hybrid Optimization Algorithms for IoT
Sachin Dhawan, Chinmay Chakraborty, Jaroslav Frnda, et al.
IEEE Access (2021) Vol. 9, pp. 87563-87578
Open Access | Times Cited: 71
Sachin Dhawan, Chinmay Chakraborty, Jaroslav Frnda, et al.
IEEE Access (2021) Vol. 9, pp. 87563-87578
Open Access | Times Cited: 71
Smart contract token-based privacy-preserving access control system for industrial Internet of Things
Weizheng Wang, Huakun Huang, Zhimeng Yin, et al.
Digital Communications and Networks (2022) Vol. 9, Iss. 2, pp. 337-346
Open Access | Times Cited: 44
Weizheng Wang, Huakun Huang, Zhimeng Yin, et al.
Digital Communications and Networks (2022) Vol. 9, Iss. 2, pp. 337-346
Open Access | Times Cited: 44
A Blockchain Framework to Secure Personal Health Record (PHR) in IBM Cloud-Based Data Lake
Arvind Panwar, Vishal Bhatnagar, Manju Khari, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-19
Open Access | Times Cited: 43
Arvind Panwar, Vishal Bhatnagar, Manju Khari, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-19
Open Access | Times Cited: 43
Security of Internet of Things (IoT) using federated learning and deep learning — Recent advancements, issues and prospects
Vinay Gugueoth, Sunitha Safavat, Sachin Shetty
ICT Express (2023) Vol. 9, Iss. 5, pp. 941-960
Open Access | Times Cited: 39
Vinay Gugueoth, Sunitha Safavat, Sachin Shetty
ICT Express (2023) Vol. 9, Iss. 5, pp. 941-960
Open Access | Times Cited: 39
Lightweight Biomedical Image Encryption Approach
Manjit Kaur, Ahmad Ali AlZubi, Dilbag Singh, et al.
IEEE Access (2023) Vol. 11, pp. 74048-74057
Open Access | Times Cited: 30
Manjit Kaur, Ahmad Ali AlZubi, Dilbag Singh, et al.
IEEE Access (2023) Vol. 11, pp. 74048-74057
Open Access | Times Cited: 30
EGCrypto: A Low-Complexity Elliptic Galois Cryptography Model for Secure Data Transmission in IoT
Manjit Kaur, Ahmad Ali AlZubi, Tarandeep Singh Walia, et al.
IEEE Access (2023) Vol. 11, pp. 90739-90748
Open Access | Times Cited: 30
Manjit Kaur, Ahmad Ali AlZubi, Tarandeep Singh Walia, et al.
IEEE Access (2023) Vol. 11, pp. 90739-90748
Open Access | Times Cited: 30
E-Healthcare Monitoring System using IoT with Machine Learning Approaches
Brahmaji Godi, Sangeeta Viswanadham, Appala Srinuvasu Muttipati, et al.
2020 International Conference on Computer Science, Engineering and Applications (ICCSEA) (2020), pp. 1-5
Closed Access | Times Cited: 52
Brahmaji Godi, Sangeeta Viswanadham, Appala Srinuvasu Muttipati, et al.
2020 International Conference on Computer Science, Engineering and Applications (ICCSEA) (2020), pp. 1-5
Closed Access | Times Cited: 52
Decentralized Autonomous Operations and Organizations in TransVerse: Federated Intelligence for Smart Mobility
Chen Zhao, Xingyuan Dai, Yisheng Lv, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2022) Vol. 53, Iss. 4, pp. 2062-2072
Open Access | Times Cited: 34
Chen Zhao, Xingyuan Dai, Yisheng Lv, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2022) Vol. 53, Iss. 4, pp. 2062-2072
Open Access | Times Cited: 34
A Systematic Review of IoT Security: Research Potential, Challenges, and Future Directions
Wen Fei, Hiroyuki Ohno, Srinivas Sampalli
ACM Computing Surveys (2023) Vol. 56, Iss. 5, pp. 1-40
Closed Access | Times Cited: 18
Wen Fei, Hiroyuki Ohno, Srinivas Sampalli
ACM Computing Surveys (2023) Vol. 56, Iss. 5, pp. 1-40
Closed Access | Times Cited: 18
Improving the efficiency of using multivalued logic tools
Ibragim Suleimenov, Yelizaveta Vitulyova, Sherniyaz B. Kabdushev, et al.
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 16
Ibragim Suleimenov, Yelizaveta Vitulyova, Sherniyaz B. Kabdushev, et al.
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 16
Crypto-Stegno based model for securing medical information on IOMT platform
Roseline Oluwaseun Ogundokun, Joseph Bamidele Awotunde, Abidemi Emmanuel Adeniyi, et al.
Multimedia Tools and Applications (2021) Vol. 80, Iss. 21-23, pp. 31705-31727
Closed Access | Times Cited: 40
Roseline Oluwaseun Ogundokun, Joseph Bamidele Awotunde, Abidemi Emmanuel Adeniyi, et al.
Multimedia Tools and Applications (2021) Vol. 80, Iss. 21-23, pp. 31705-31727
Closed Access | Times Cited: 40
FPGA implementation of EEG based hardware optimized data encryption technique for IoT applications
Hari Krishna Kharidu, V. Sudha
Integration (2025), pp. 102381-102381
Closed Access
Hari Krishna Kharidu, V. Sudha
Integration (2025), pp. 102381-102381
Closed Access
A reliable and secure video steganography method based on 4d-logistic mapping
Mohemmed Sha
Multimedia Tools and Applications (2025)
Closed Access
Mohemmed Sha
Multimedia Tools and Applications (2025)
Closed Access
Physical layer security for massive access in cellular Internet of Things
Qiao Qi, Xiaoming Chen, Caijun Zhong, et al.
Science China Information Sciences (2020) Vol. 63, Iss. 2
Closed Access | Times Cited: 37
Qiao Qi, Xiaoming Chen, Caijun Zhong, et al.
Science China Information Sciences (2020) Vol. 63, Iss. 2
Closed Access | Times Cited: 37
Proof-of-PUF Enabled Blockchain: Concurrent Data and Device Security for Internet-of-Energy
Rameez Asif, Kinan Ghanem, James Irvine
Sensors (2020) Vol. 21, Iss. 1, pp. 28-28
Open Access | Times Cited: 35
Rameez Asif, Kinan Ghanem, James Irvine
Sensors (2020) Vol. 21, Iss. 1, pp. 28-28
Open Access | Times Cited: 35
Metaverses-Based Parallel Oil Fields in CPSS: A Framework and Methodology
Xingxia Wang, Xiang Cheng, Jingwei Lu, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2022) Vol. 53, Iss. 4, pp. 2138-2147
Open Access | Times Cited: 21
Xingxia Wang, Xiang Cheng, Jingwei Lu, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2022) Vol. 53, Iss. 4, pp. 2138-2147
Open Access | Times Cited: 21
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
Yasir Ali, Habib Ullah Khan, Muhammad Khalid
Journal Of Big Data (2023) Vol. 10, Iss. 1
Open Access | Times Cited: 12
Yasir Ali, Habib Ullah Khan, Muhammad Khalid
Journal Of Big Data (2023) Vol. 10, Iss. 1
Open Access | Times Cited: 12
BERT-Based Chinese Relation Extraction for Public Security
Jiaqi Hou, Xin Li, Haipeng Yao, et al.
IEEE Access (2020) Vol. 8, pp. 132367-132375
Open Access | Times Cited: 31
Jiaqi Hou, Xin Li, Haipeng Yao, et al.
IEEE Access (2020) Vol. 8, pp. 132367-132375
Open Access | Times Cited: 31
A Low-Cost Distributed Denial-of-Service Attack Architecture
Kaifan Huang, Lu‐Xing Yang, Xiaofan Yang, et al.
IEEE Access (2020) Vol. 8, pp. 42111-42119
Open Access | Times Cited: 30
Kaifan Huang, Lu‐Xing Yang, Xiaofan Yang, et al.
IEEE Access (2020) Vol. 8, pp. 42111-42119
Open Access | Times Cited: 30
A Systematic Survey on IoT Security Issues, Vulnerability and Open Challenges
Ranjit Patnaik, Neelamadhab Padhy, K. Srujan Raju
Advances in intelligent systems and computing (2020), pp. 723-730
Closed Access | Times Cited: 28
Ranjit Patnaik, Neelamadhab Padhy, K. Srujan Raju
Advances in intelligent systems and computing (2020), pp. 723-730
Closed Access | Times Cited: 28
Lightweight Secure Message Delivery for E2E S2S Communication in the IoT-Cloud System
Mustafa A. Al Sibahee, Songfeng Lu, Zaid Ameen Abduljabbar, et al.
IEEE Access (2020) Vol. 8, pp. 218331-218347
Open Access | Times Cited: 28
Mustafa A. Al Sibahee, Songfeng Lu, Zaid Ameen Abduljabbar, et al.
IEEE Access (2020) Vol. 8, pp. 218331-218347
Open Access | Times Cited: 28
IOT Based Fault Detection of Underground Cables through Node MCU Module
Laxmi Goswami, Manish Kumar Kaushik, Rishi Sikka, et al.
2020 International Conference on Computer Science, Engineering and Applications (ICCSEA) (2020), pp. 1-6
Closed Access | Times Cited: 27
Laxmi Goswami, Manish Kumar Kaushik, Rishi Sikka, et al.
2020 International Conference on Computer Science, Engineering and Applications (ICCSEA) (2020), pp. 1-6
Closed Access | Times Cited: 27
Cooperative and feedback based authentic routing protocol for energy efficient IoT systems
A. Gayathri, A. V. Prabu, S. Rajasoundaran, et al.
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 11
Closed Access | Times Cited: 18
A. Gayathri, A. V. Prabu, S. Rajasoundaran, et al.
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 11
Closed Access | Times Cited: 18