OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications
Mohammad Kamrul Hasan, Muhammad Shafiq, Shayla Islam, et al.
Complexity (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 92

Showing 1-25 of 92 citing articles:

A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet‐of‐Medical‐Things
Mohammad Kamrul Hasan, Taher M. Ghazal, Rashid A. Saeed, et al.
IET Communications (2021) Vol. 16, Iss. 5, pp. 421-432
Closed Access | Times Cited: 161

The effect of urban innovation performance of smart city construction policies: Evaluate by using a multiple period difference-in-differences model
Qingbin Guo, Jinrong Zhong
Technological Forecasting and Social Change (2022) Vol. 184, pp. 122003-122003
Closed Access | Times Cited: 139

Securing Smart Cities Using Blockchain Technology
Taher M. Ghazal, Mohammad Kamrul Hasan, Haitham M. Alzoubi, et al.
(2022), pp. 1-4
Closed Access | Times Cited: 124

Cyber Security Threats on Digital Banking
Haitham M. Alzoubi, Taher M. Ghazal, Mohammad Kamrul Hasan, et al.
(2022), pp. 1-4
Closed Access | Times Cited: 98

Blockchain Technology on Smart Grid, Energy Trading, and Big Data: Security Issues, Challenges, and Recommendations
Mohammad Kamrul Hasan, Ali Alkhalifah, Shayla Islam, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-26
Open Access | Times Cited: 90

Fischer Linear Discrimination and Quadratic Discrimination Analysis–Based Data Mining Technique for Internet of Things Framework for Healthcare
Mohammad Kamrul Hasan, Taher M. Ghazal, Ali Alkhalifah, et al.
Frontiers in Public Health (2021) Vol. 9
Open Access | Times Cited: 91

Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method
J. Stanly Jayaprakash, Kishore Balasubramanian, Rossilawati Sulaiman, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 72, Iss. 1, pp. 519-534
Open Access | Times Cited: 61

Evolution of Industry and Blockchain Era: Monitoring Price Hike and Corruption Using BIoT for Smart Government and Industry 4.0
Mohammad Kamrul Hasan, Md. Akhtaruzzaman, S. Rayhan Kabir, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 18, Iss. 12, pp. 9153-9161
Closed Access | Times Cited: 56

Federated Learning for Privacy Preservation of Healthcare Data From Smartphone-Based Side-Channel Attacks
Abdul Rehman, Imran Razzak, Guandong Xu
IEEE Journal of Biomedical and Health Informatics (2022) Vol. 27, Iss. 2, pp. 684-690
Closed Access | Times Cited: 41

COVID-19 health data analysis and personal data preserving: A homomorphic privacy enforcement approach
Chandramohan Dhasarathan, Mohammad Kamrul Hasan, Shayla Islam, et al.
Computer Communications (2022) Vol. 199, pp. 87-97
Open Access | Times Cited: 41

Fused Weighted Federated Deep Extreme Machine Learning Based on Intelligent Lung Cancer Disease Prediction Model for Healthcare 5.0
Sagheer Abbas, Ghassan F. Issa, Areej Fatima, et al.
International Journal of Intelligent Systems (2023) Vol. 2023, pp. 1-14
Open Access | Times Cited: 26

Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction
Fatma Foad Ashrif, Elankovan Sundararajan, Rami Ahmad, et al.
Journal of Network and Computer Applications (2023) Vol. 221, pp. 103759-103759
Open Access | Times Cited: 25

Adaptive secure malware efficient machine learning algorithm for healthcare data
Mazin Abed Mohammed, Abdullah Lakhan, Dilovan Asaad Zebari, et al.
CAAI Transactions on Intelligence Technology (2023)
Open Access | Times Cited: 24

A lightweight security model for ensuring patient privacy and confidentiality in telehealth applications
Zhang Wenhua, Mohammad Kamrul Hasan, Norleyza Binti Jailani, et al.
Computers in Human Behavior (2024) Vol. 153, pp. 108134-108134
Closed Access | Times Cited: 11

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring
Md. Motaharul Islam, Mohammad Kamrul Hasan, Shayla Islam, et al.
CAAI Transactions on Intelligence Technology (2024)
Open Access | Times Cited: 9

Novel image pixel scrambling technique for efficient color image encryption in resource-constrained IoT devices
Cemile İnce, Kenan İNCE, Davut Hanbay
Multimedia Tools and Applications (2024) Vol. 83, Iss. 29, pp. 72789-72817
Open Access | Times Cited: 8

A comprehensive review on the users’ identity privacy for 5G networks
Mamoon M. Saeed, Mohammad Kamrul Hasan, Ahmed J. Obaid, et al.
IET Communications (2022) Vol. 16, Iss. 5, pp. 384-399
Open Access | Times Cited: 30

ECG Classification for Detecting ECG Arrhythmia Empowered with Deep Learning Approaches
Atta Rahman, Rizwana Naz Asif, Kiran Sultan, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-12
Open Access | Times Cited: 30

An Explainable Ensemble Deep Learning Approach for Intrusion Detection in Industrial Internet of Things
Mousa'B Mohammad Shtayat, Mohammad Kamrul Hasan, Rossilawati Sulaiman, et al.
IEEE Access (2023) Vol. 11, pp. 115047-115061
Open Access | Times Cited: 20

Large scale foundation models for intelligent manufacturing applications: a survey
Haotian Zhang, Stuart Dereck Semujju, Zhicheng Wang, et al.
Journal of Intelligent Manufacturing (2025)
Open Access

A Multi‐cluster Security Framework for Healthcare IoT: The Synergy of Redundant Byzantine Fault Tolerance with Extensions and Coati‐Based Network
Rohit Beniwal, Vinod Kumar, Vishal Sharma
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 3
Closed Access

A Novel Symbolic Model for Analyzing Internet of Things Protocols Based on Event Logic
Zehuan Li, Meihua Xiao, Y. P. Xu, et al.
Computers & Security (2025), pp. 104440-104440
Open Access

An Empirical Model to Predict the Diabetic Positive Using Stacked Ensemble Approach
R. Sivashankari, M. Sudha, Mohammad Kamrul Hasan, et al.
Frontiers in Public Health (2022) Vol. 9
Open Access | Times Cited: 26

DVAEGMM: Dual Variational Autoencoder With Gaussian Mixture Model for Anomaly Detection on Attributed Networks
Wasim Khan, Mohammad Haroon, Ahmad Neyaz Khan, et al.
IEEE Access (2022) Vol. 10, pp. 91160-91176
Open Access | Times Cited: 22

Robust and lightweight symmetric key exchange algorithm for next-generation IoE
Zeeshan Ashraf, Adnan Sohail, Muhammad Yousaf
Internet of Things (2023) Vol. 22, pp. 100703-100703
Closed Access | Times Cited: 13

Page 1 - Next Page

Scroll to top