OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Dynamic Network Security Mechanism Based on Trust Management in Wireless Sensor Networks
Guiping Zheng, Bei Gong, Yu Zhang
Wireless Communications and Mobile Computing (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 19

Showing 19 citing articles:

Embedding Trust in the Media Access Control Protocol for Wireless Networks
Chaminda Alocious, Hannan Xiao, Bruce Christianson, et al.
Sensors (2025) Vol. 25, Iss. 2, pp. 354-354
Open Access

Network intrusion detection in software defined networking with self-organized constraint-based intelligent learning framework
Anurag Bhardwaj, Ritu Tyagi, Neha Sharma, et al.
Measurement Sensors (2022) Vol. 24, pp. 100580-100580
Open Access | Times Cited: 19

A Dynamic Trust-Related Attack Detection Model for IoT Devices and Services Based on the Deep Long Short-Term Memory Technique
Yara Alghofaili, Murad A. Rassam
Sensors (2023) Vol. 23, Iss. 8, pp. 3814-3814
Open Access | Times Cited: 11

Utilising Acknowledge for the Trust in Wireless Sensor Networks
Hosam ALRahhal, Razan Jamous, Rabie Α. Ramadan, et al.
Applied Sciences (2022) Vol. 12, Iss. 4, pp. 2045-2045
Open Access | Times Cited: 15

Evaluating Trust Management Frameworks for Wireless Sensor Networks
Pranav Gangwani, Alexander Perez-Pons, Himanshu Upadhyay
Sensors (2024) Vol. 24, Iss. 9, pp. 2852-2852
Open Access | Times Cited: 1

Computer Network Information Security Monitoring System Based on Big Data Era
Yu Sun, Xiaorong Liu, Xiaoli Shen
Security and Communication Networks (2022) Vol. 2022, pp. 1-11
Open Access | Times Cited: 7

Towards Security Mechanism in D2D Wireless Communication: A 5G Network Approach
Divya Gupta, Shalli Rani, Aman Singh, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-9
Open Access | Times Cited: 4

Malicious Node Detection in Wireless Sensor Networks: Comparative Study
Lara Darwish, Mohammad Nassr, Fadi Ghosna, et al.
2022 4th International Youth Conference on Radio Electronics, Electrical and Power Engineering (REEPE) (2023), pp. 1-5
Closed Access | Times Cited: 2

LTEM: Lightweight Trust Evaluation Model in IoT Environment
Somya Abdulkarim Alhandi, Hazalila Kamaludin, Nayef Abdulwahab Mohammed Alduais, et al.
Qubahan Academic Journal (2024) Vol. 4, Iss. 2, pp. 477-497
Open Access

Trust-Aware and Improved Density Peaks Clustering Algorithm for Fast and Secure Models in Wireless Sensor Networks
Youjia Han, Huibin Wang, Yueheng Li, et al.
Pervasive and Mobile Computing (2024) Vol. 105, pp. 101993-101993
Closed Access

Experimentation and analysis of network anti-mapping security access techniques for illegal scanning
Rui Li, Zehui Liu, Min Guo, et al.
Applied Mathematics and Nonlinear Sciences (2024) Vol. 9, Iss. 1
Open Access

Intelligent Prediction and Rural Financial Development Based on Abnormal Detection of Sensor Data
Jiong Liu
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-12
Open Access | Times Cited: 2

Detection and Location of Malicious Nodes Based on Homomorphic Fingerprinting in Wireless Sensor Networks
Zhiming Zhang, Yu Yang, Wei Yang, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-12
Open Access | Times Cited: 2

A Trusted Remote Data Trading Scheme in Hybrid SDN for Intelligent Internet of Things
Yu Zhang, Bei Gong, Yong Wu, et al.
Wireless Communications and Mobile Computing (2023) Vol. 2023, pp. 1-16
Open Access

Research on computer network security protection technology based on a superiority algorithm
Zhenghui Wang
Applied Mathematics and Nonlinear Sciences (2023) Vol. 9, Iss. 1
Open Access

A comprehensive study of trust management system in wireless sensor networks
Amandeep Kaur, Virender Singh, Shweta Sharma
AIP conference proceedings (2023) Vol. 2843, pp. 020003-020003
Closed Access

Detection of Suspicious Node by a Status Table in a Wireless Sensor Network
M. S. Nidhya, Shivakumar Kagi, P. Lalitha Kumari, et al.
Lecture notes in networks and systems (2022), pp. 675-681
Closed Access

Page 1

Scroll to top