
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Pythagorean Fuzzy Sets-based VIKOR and TOPSIS-based multi-criteria decision-making model for mitigating resource deletion attacks in WSNs
S. Madhavi, N.C. Santhosh, Sarvesh Rajkumar, et al.
Journal of Intelligent & Fuzzy Systems (2023) Vol. 44, Iss. 6, pp. 9441-9459
Closed Access | Times Cited: 30
S. Madhavi, N.C. Santhosh, Sarvesh Rajkumar, et al.
Journal of Intelligent & Fuzzy Systems (2023) Vol. 44, Iss. 6, pp. 9441-9459
Closed Access | Times Cited: 30
Showing 1-25 of 30 citing articles:
ASK-RAM-IMOT: Autonomous Shared Keys based Remote Authentication Method for Internet of Medical Things Applications
RVS Praveen, P. Pabitha
Wireless Personal Communications (2023) Vol. 131, Iss. 1, pp. 273-293
Closed Access | Times Cited: 34
RVS Praveen, P. Pabitha
Wireless Personal Communications (2023) Vol. 131, Iss. 1, pp. 273-293
Closed Access | Times Cited: 34
Hybrid Grey PIPRECIA and Grey OCRA method-based dynamic multi-criteria decision-making model for mitigating non-cooperating node attacks in WSNs
S. Madhavi, RVS Praveen, N. Jagadish Kumar, et al.
Peer-to-Peer Networking and Applications (2023) Vol. 16, Iss. 5, pp. 2607-2629
Closed Access | Times Cited: 31
S. Madhavi, RVS Praveen, N. Jagadish Kumar, et al.
Peer-to-Peer Networking and Applications (2023) Vol. 16, Iss. 5, pp. 2607-2629
Closed Access | Times Cited: 31
An Integrated Z-Number and DEMATEL-Based Cooperation Enforcement Scheme for Thwarting Malicious Nodes in MANETs
S. M. Udhaya Sankar, N. Jagadish Kumar, G. Elangovan, et al.
Wireless Personal Communications (2023) Vol. 130, Iss. 4, pp. 2531-2563
Closed Access | Times Cited: 30
S. M. Udhaya Sankar, N. Jagadish Kumar, G. Elangovan, et al.
Wireless Personal Communications (2023) Vol. 130, Iss. 4, pp. 2531-2563
Closed Access | Times Cited: 30
Fuzzy ELECTRE multi-criteria decision-making technique for achieving reliable data dissemination in MANETs
S. M. Udhaya Sankar, RVS Praveen, N. Jagadish Kumar, et al.
International Journal of Information Technology (2023) Vol. 15, Iss. 4, pp. 1985-1998
Closed Access | Times Cited: 23
S. M. Udhaya Sankar, RVS Praveen, N. Jagadish Kumar, et al.
International Journal of Information Technology (2023) Vol. 15, Iss. 4, pp. 1985-1998
Closed Access | Times Cited: 23
Improved Green Anaconda Optimization Algorithm-based Coverage Path Planning Mechanism for heterogeneous unmanned aerial vehicles
K. Karthik, C. Balasubramanian
Sustainable Computing Informatics and Systems (2024) Vol. 42, pp. 100961-100961
Closed Access | Times Cited: 7
K. Karthik, C. Balasubramanian
Sustainable Computing Informatics and Systems (2024) Vol. 42, pp. 100961-100961
Closed Access | Times Cited: 7
A hybrid fennec fox and sand cat optimization algorithm for clustering scheme in VANETs
V. Krishna Meera, C. Balasubramanian
Sustainable Computing Informatics and Systems (2024) Vol. 42, pp. 100983-100983
Closed Access | Times Cited: 4
V. Krishna Meera, C. Balasubramanian
Sustainable Computing Informatics and Systems (2024) Vol. 42, pp. 100983-100983
Closed Access | Times Cited: 4
Applications of Multi Criteria Decision Making Methods in Cyber Security
Seema Gupta Bhol
Studies in big data (2025), pp. 233-258
Closed Access
Seema Gupta Bhol
Studies in big data (2025), pp. 233-258
Closed Access
AI-Driven decision-making for personalized elderly care: a fuzzy MCDM-based framework for enhancing treatment recommendations
Abeer Aljohani
BMC Medical Informatics and Decision Making (2025) Vol. 25, Iss. 1
Open Access
Abeer Aljohani
BMC Medical Informatics and Decision Making (2025) Vol. 25, Iss. 1
Open Access
A chameleon and remora search optimization algorithm for handling task scheduling uncertainty problem in cloud computing
P. Pabitha, K. Nivitha, C. Gunavathi, et al.
Sustainable Computing Informatics and Systems (2023) Vol. 41, pp. 100944-100944
Closed Access | Times Cited: 12
P. Pabitha, K. Nivitha, C. Gunavathi, et al.
Sustainable Computing Informatics and Systems (2023) Vol. 41, pp. 100944-100944
Closed Access | Times Cited: 12
Komodo Mlipir Algorithm-based optimal route determination mechanism for improving Quality of Service in Vehicular ad hoc network
R.K. Soundarayaa, C. Balasubramanian
Sustainable Computing Informatics and Systems (2024) Vol. 42, pp. 100956-100956
Closed Access | Times Cited: 2
R.K. Soundarayaa, C. Balasubramanian
Sustainable Computing Informatics and Systems (2024) Vol. 42, pp. 100956-100956
Closed Access | Times Cited: 2
Teaching Learning-Based Optimization for Medical IoT applications Service Placement in Fog Computing
R Baskar, E. Mohanraj, T Sneka, et al.
2020 IEEE International Students' Conference on Electrical,Electronics and Computer Science (SCEECS) (2024)
Closed Access | Times Cited: 2
R Baskar, E. Mohanraj, T Sneka, et al.
2020 IEEE International Students' Conference on Electrical,Electronics and Computer Science (SCEECS) (2024)
Closed Access | Times Cited: 2
Multiple attribute decision making based on score function of q-connection numbers, q-CNPWG aggregation operator of q-connection numbers, and set pair analysis theory in the environments of q-rung orthopair fuzzy numbers
Kamal Kumar, Shyi‐Ming Chen
Information Sciences (2024) Vol. 678, pp. 120985-120985
Closed Access | Times Cited: 1
Kamal Kumar, Shyi‐Ming Chen
Information Sciences (2024) Vol. 678, pp. 120985-120985
Closed Access | Times Cited: 1
Tweets to Predict: LSTM Model for Crime Analysis Using Twitter Time Series Data
P. Kaladevi, M Gopalraj, K. N. Harish, et al.
(2024), pp. 1-6
Closed Access | Times Cited: 1
P. Kaladevi, M Gopalraj, K. N. Harish, et al.
(2024), pp. 1-6
Closed Access | Times Cited: 1
A Novel Generalization of Q-Rung Orthopair Fuzzy Aczel Alsina Aggregation Operators and Their Application in Wireless Sensor Networks
Wajid Ali, Tanzeela Shaheen, Iftikhar Ul Haq, et al.
Sensors (2023) Vol. 23, Iss. 19, pp. 8105-8105
Open Access | Times Cited: 4
Wajid Ali, Tanzeela Shaheen, Iftikhar Ul Haq, et al.
Sensors (2023) Vol. 23, Iss. 19, pp. 8105-8105
Open Access | Times Cited: 4
A comprehensive decision assessment for trust evaluation in wireless sensor networks
Thilagasree Chakkarapani Sumathi, Jayakumar Thippan, Brainy Joseph Raj Vikilal Joice, et al.
Yugoslav journal of operations research (2024), Iss. 00, pp. 11-11
Open Access
Thilagasree Chakkarapani Sumathi, Jayakumar Thippan, Brainy Joseph Raj Vikilal Joice, et al.
Yugoslav journal of operations research (2024), Iss. 00, pp. 11-11
Open Access
Predictive Power of Logistic Regression in Cryptocurrency Price Analysis
R Poonkuzhali, J Hitesh Paliwal, Govind Hariharan, et al.
(2024), pp. 1-6
Closed Access
R Poonkuzhali, J Hitesh Paliwal, Govind Hariharan, et al.
(2024), pp. 1-6
Closed Access
Enhanced Extreme Learning Machine for Energy Efficient Vampire Attack Detection in Wireless Sensor Networks
Ibrahim Saud Khaleel, Bilal Mishaal Mohammed, Ahmed Adnan
Journal Européen des Systèmes Automatisés (2024) Vol. 57, Iss. 6, pp. 1649-1657
Closed Access
Ibrahim Saud Khaleel, Bilal Mishaal Mohammed, Ahmed Adnan
Journal Européen des Systèmes Automatisés (2024) Vol. 57, Iss. 6, pp. 1649-1657
Closed Access
NeuroCluster: Neural Networks for Intelligent Energy-Aware Clustering in IIoT
R. Sujatha, Raghavan Gopalakrishnan, V Shreemitha, et al.
(2024), pp. 1-6
Closed Access
R. Sujatha, Raghavan Gopalakrishnan, V Shreemitha, et al.
(2024), pp. 1-6
Closed Access
Efficient Breast Cancer Detection using Lightweight Multimodal Approach
P. Kaladevi, P Vivekananthan, Bubathi Muruganatham M.A. Sanjith, et al.
(2024), pp. 1-6
Closed Access
P. Kaladevi, P Vivekananthan, Bubathi Muruganatham M.A. Sanjith, et al.
(2024), pp. 1-6
Closed Access
Intelligent Decision-making Algorithm for IoT Enabled Smart shopping
J Mythili, S T Menmoli, S Dhanusuya, et al.
2022 International Conference on Communication, Computing and Internet of Things (IC3IoT) (2024), pp. 1-7
Closed Access
J Mythili, S T Menmoli, S Dhanusuya, et al.
2022 International Conference on Communication, Computing and Internet of Things (IC3IoT) (2024), pp. 1-7
Closed Access
Sailfish Optimizer Algorithm for Effective Toxic Gas Detection Sensor Placement in IIoT
P Senthilraja, S Ponkaviarasu, K V Vijayabharathi, et al.
(2024), pp. 1-6
Closed Access
P Senthilraja, S Ponkaviarasu, K V Vijayabharathi, et al.
(2024), pp. 1-6
Closed Access
Epileptic Seizure Diagnosis using Bayesian Belief Network and T-CNN
S Poovarasu, R. Gopinath, A Mohanraj, et al.
(2024), pp. 1-6
Closed Access
S Poovarasu, R. Gopinath, A Mohanraj, et al.
(2024), pp. 1-6
Closed Access
Enhancing Cybersecurity in IIoT Smart Grids: Leveraging HGAMPO for PMU Data Manipulation Detection
B. Janani, S. Keerthana, S. Subathra, et al.
(2024), pp. 1-6
Closed Access
B. Janani, S. Keerthana, S. Subathra, et al.
(2024), pp. 1-6
Closed Access
An Approach for Securing IoT Data using Blockchain and Proxy Re-Encryption
M. Saradha, B Keerthivasan, Mpl Arunachalam, et al.
(2024), pp. 1-6
Closed Access
M. Saradha, B Keerthivasan, Mpl Arunachalam, et al.
(2024), pp. 1-6
Closed Access
Recycling as a Service: IoT Enabled Smart Waste Management System with Machine Learning
R. Poonkuzhali, M Karamath, S. Poonkuzhali, et al.
(2024) Vol. 12, pp. 1-6
Closed Access
R. Poonkuzhali, M Karamath, S. Poonkuzhali, et al.
(2024) Vol. 12, pp. 1-6
Closed Access