
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Energy-Aware Intrusion Detection Model for Internet of Vehicles Using Machine Learning Methods
Lu Lihua
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-8
Open Access | Times Cited: 11
Lu Lihua
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-8
Open Access | Times Cited: 11
Showing 11 citing articles:
Intrusion Detection Model for Internet of Vehicles Using GRIPCA and OWELM
Kai‐Jun Zhang, Jiayu Yang, Yangfei Shao, et al.
IEEE Access (2024) Vol. 12, pp. 28911-28925
Open Access | Times Cited: 7
Kai‐Jun Zhang, Jiayu Yang, Yangfei Shao, et al.
IEEE Access (2024) Vol. 12, pp. 28911-28925
Open Access | Times Cited: 7
Big data applications in intelligent transport systems: a bibliometric analysis and review
Mahbub Hassan, Hridoy Deb Mahin, Abdullah Al Nafees, et al.
Deleted Journal (2025) Vol. 2, Iss. 1
Open Access
Mahbub Hassan, Hridoy Deb Mahin, Abdullah Al Nafees, et al.
Deleted Journal (2025) Vol. 2, Iss. 1
Open Access
Comprehensive systematic review of intelligent approaches in UAV-based intrusion detection, blockchain, and network security
Ahmed Burhan Mohammed, Lamia Chaari Fourati, Ahmed M. Fakhrudeen
Computer Networks (2023) Vol. 239, pp. 110140-110140
Closed Access | Times Cited: 14
Ahmed Burhan Mohammed, Lamia Chaari Fourati, Ahmed M. Fakhrudeen
Computer Networks (2023) Vol. 239, pp. 110140-110140
Closed Access | Times Cited: 14
Intelligent analytics algorithms in breach detection systems for securing VANETs and data for smart transportation management
J Bhuvana, M. Hashmi, Rachit Adhvaryu, et al.
Soft Computing (2023)
Closed Access | Times Cited: 2
J Bhuvana, M. Hashmi, Rachit Adhvaryu, et al.
Soft Computing (2023)
Closed Access | Times Cited: 2
Microgrid based VANET monitoring and energy management in 5G networks by reinforcement deep learning techniques
A. Selvakumar, S. Ramesh, T. Manikandan, et al.
Computers & Electrical Engineering (2023) Vol. 111, pp. 108933-108933
Closed Access | Times Cited: 2
A. Selvakumar, S. Ramesh, T. Manikandan, et al.
Computers & Electrical Engineering (2023) Vol. 111, pp. 108933-108933
Closed Access | Times Cited: 2
Evaluating the Security of Distributed and Cooperative Media Algorithms in Networks
Rakesh Kumar Yadav, Deeplata Sharma, Amba Mishra, et al.
Lecture notes in electrical engineering (2024), pp. 360-366
Closed Access
Rakesh Kumar Yadav, Deeplata Sharma, Amba Mishra, et al.
Lecture notes in electrical engineering (2024), pp. 360-366
Closed Access
Internet of vehicles intrusion detection method based on CFS-COA feature selection and spatio-temporal feature extraction
Zhongjun Yang, J.X. Zhang, Borcherng Su
The Computer Journal (2024)
Closed Access
Zhongjun Yang, J.X. Zhang, Borcherng Su
The Computer Journal (2024)
Closed Access
IDS-based Machine Learning Model Specific for Secure Data Transmission within the Frame of IoT Network Infrastructure
Dejana Gladić, Jelena Petrovački, Srdjan Sladojević, et al.
(2024), pp. 75-81
Closed Access
Dejana Gladić, Jelena Petrovački, Srdjan Sladojević, et al.
(2024), pp. 75-81
Closed Access
An Automation Innovation of Gearbox Vehicle Control by Using Machine Learning Based Robotic Operation
M.M. Ramakrishna, Nageswara Rao Atyam, Nikhil Chaurasia, et al.
(2023), pp. 88-93
Closed Access
M.M. Ramakrishna, Nageswara Rao Atyam, Nikhil Chaurasia, et al.
(2023), pp. 88-93
Closed Access
Development of Machine Learning Model for Detection and Diagnosis of Alzheimer's disease. A Comprehensive Review
Safdar Sardar Khan, Sunil Patil
(2023), pp. 1-8
Closed Access
Safdar Sardar Khan, Sunil Patil
(2023), pp. 1-8
Closed Access
Cyber-Attack Detection in Autonomous Vehicle Networks by Energy Aware Optimal Data Transmission with Game Fuzzy Q-Learning based Heuristic Routing Protocol
Waleed Fekry Faris
International Journal on Future Revolution in Computer Science & Communication Engineering (2022) Vol. 8, Iss. 3, pp. 75-85
Open Access
Waleed Fekry Faris
International Journal on Future Revolution in Computer Science & Communication Engineering (2022) Vol. 8, Iss. 3, pp. 75-85
Open Access