
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Robustness of Internet of Battlefield Things (IoBT): A Directed Network Perspective
Yuan Feng, Menglin Li, Chengyi Zeng, et al.
Entropy (2020) Vol. 22, Iss. 10, pp. 1166-1166
Open Access | Times Cited: 20
Yuan Feng, Menglin Li, Chengyi Zeng, et al.
Entropy (2020) Vol. 22, Iss. 10, pp. 1166-1166
Open Access | Times Cited: 20
Showing 20 citing articles:
A Systematic Literature Review of Zero Trust Architecture for UAV Security Systems in IoBT
Alanoud Alquwayzani, Abdullah Albuali
(2024)
Open Access | Times Cited: 5
Alanoud Alquwayzani, Abdullah Albuali
(2024)
Open Access | Times Cited: 5
The internet of battle things: a survey on communication challenges and recent solutions
Rachel Kufakunesu, Hermanus C. Myburgh, Allan De Freitas
Discover Internet of Things (2025) Vol. 5, Iss. 1
Open Access
Rachel Kufakunesu, Hermanus C. Myburgh, Allan De Freitas
Discover Internet of Things (2025) Vol. 5, Iss. 1
Open Access
Detection and isolation of wormhole nodes in wireless ad hoc networks based on post-wormhole actions
David Samuel Bhatti, Shahzad Saleem, Azhar Imran, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 3
David Samuel Bhatti, Shahzad Saleem, Azhar Imran, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 3
A Novel Deception-Based Scheme to Secure the Location Information for IoBT Entities
Basmh Alkanjr, Imad Mahgoub
IEEE Access (2023) Vol. 11, pp. 15540-15554
Open Access | Times Cited: 7
Basmh Alkanjr, Imad Mahgoub
IEEE Access (2023) Vol. 11, pp. 15540-15554
Open Access | Times Cited: 7
Searching High-value Edges Attack sequence through deep Reinforcement learning
Libin Chen, Luyao Wang, Chengyi Zeng, et al.
Knowledge-Based Systems (2023) Vol. 272, pp. 110562-110562
Closed Access | Times Cited: 5
Libin Chen, Luyao Wang, Chengyi Zeng, et al.
Knowledge-Based Systems (2023) Vol. 272, pp. 110562-110562
Closed Access | Times Cited: 5
The Role of Internet of Battlefield Things in Modern Warfare: A Cybersecurity Perspective
Shounak Sushil Savant, Sumit KR Sharma
International Journal for Research Publication and Seminars (2024) Vol. 15, Iss. 3, pp. 413-419
Closed Access | Times Cited: 1
Shounak Sushil Savant, Sumit KR Sharma
International Journal for Research Publication and Seminars (2024) Vol. 15, Iss. 3, pp. 413-419
Closed Access | Times Cited: 1
Internet of Things in military applications
Vlada Sokolović, Goran Marković
Vojnotehnicki glasnik (2023) Vol. 71, Iss. 4, pp. 1148-1171
Open Access | Times Cited: 3
Vlada Sokolović, Goran Marković
Vojnotehnicki glasnik (2023) Vol. 71, Iss. 4, pp. 1148-1171
Open Access | Times Cited: 3
Expandable Mix-Zones as a Deception Technique for Providing Location Privacy on Internet-of-Battlefield Things (IoBT)
İsmail Butun, Imad Mahgoub
(2024), pp. 1-7
Closed Access
İsmail Butun, Imad Mahgoub
(2024), pp. 1-7
Closed Access
EEPS: Optimizing energy-efficient path selection in the Internet of Battlefield Things (IoBT) utilizing SDN
Sumayah A. Almuntasheri, Mohammed J. F. Alenazi
Peer-to-Peer Networking and Applications (2024) Vol. 18, Iss. 1, pp. 1-23
Closed Access
Sumayah A. Almuntasheri, Mohammed J. F. Alenazi
Peer-to-Peer Networking and Applications (2024) Vol. 18, Iss. 1, pp. 1-23
Closed Access
Aviation armament system-of-systems modeling and identification method of vulnerable nodes based on interdependent network
Y.S. Wang, Bolin SHANG, Dexiang ZHOU, et al.
Chinese Journal of Aeronautics (2024)
Open Access
Y.S. Wang, Bolin SHANG, Dexiang ZHOU, et al.
Chinese Journal of Aeronautics (2024)
Open Access
DAIWN: Detection and Isolation of Wormhole Nodes in Wireless Ad Hoc Networks
David Samuel Bhatti, Shahzad Saleem, Azhar Imran, et al.
Research Square (Research Square) (2023)
Open Access | Times Cited: 1
David Samuel Bhatti, Shahzad Saleem, Azhar Imran, et al.
Research Square (Research Square) (2023)
Open Access | Times Cited: 1
Cybersecurity for Battlefield of Things — A Comprehensive Review
Anuraj Singh, Gaurav Sharma, Rajalakshmi Krishnamurthi, et al.
Journal of Circuits Systems and Computers (2022) Vol. 31, Iss. 17
Closed Access | Times Cited: 2
Anuraj Singh, Gaurav Sharma, Rajalakshmi Krishnamurthi, et al.
Journal of Circuits Systems and Computers (2022) Vol. 31, Iss. 17
Closed Access | Times Cited: 2
A Survey of Quantitative Comparative Research on Intrusion Detection Algorithms in Wireless Sensor Networks
Yahong Yang, Pan Wang, Zixuan Wang, et al.
2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech) (2022), pp. 1-6
Closed Access | Times Cited: 2
Yahong Yang, Pan Wang, Zixuan Wang, et al.
2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech) (2022), pp. 1-6
Closed Access | Times Cited: 2
Multilayer Network Modeling and Stability Analysis of Internet of Battlefield Things
Haihao Ding, Qingsong Zhao
2022 IEEE International Systems Conference (SysCon) (2022) Vol. 43, pp. 1-6
Closed Access | Times Cited: 1
Haihao Ding, Qingsong Zhao
2022 IEEE International Systems Conference (SysCon) (2022) Vol. 43, pp. 1-6
Closed Access | Times Cited: 1
Practical Applications to Prevent Cyberattacks on Internet on Battlefield Things (IoBT)
Pawankumar Sharma, Lotfollah Najjar, Sriram Srinivasan
(2023), pp. 17-24
Open Access
Pawankumar Sharma, Lotfollah Najjar, Sriram Srinivasan
(2023), pp. 17-24
Open Access
Semi-Autonomous Assistance for Telesurgery Under Communication Loss
Hisashi Ishida, Adnan Munawar, Russell H. Taylor, et al.
2021 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) (2023), pp. 8467-8473
Closed Access
Hisashi Ishida, Adnan Munawar, Russell H. Taylor, et al.
2021 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) (2023), pp. 8467-8473
Closed Access
MILPdM: A Predictive Maintenance Architecture for the Military Domain
Jovani Dalzochio, Rafael Kunst, Jorge Luís Victória Barbosa, et al.
(2023), pp. 2026-2032
Closed Access
Jovani Dalzochio, Rafael Kunst, Jorge Luís Victória Barbosa, et al.
(2023), pp. 2026-2032
Closed Access
Battlefield Health Surveillance with Soldier Tracking: A Privacy-Preserving Encrypted Approach
Kiran Ingale, Sanaya Vaze, Varad Uttarwar, et al.
(2023), pp. 896-903
Closed Access
Kiran Ingale, Sanaya Vaze, Varad Uttarwar, et al.
(2023), pp. 896-903
Closed Access
A Katonai Egységes Felhőalapú Eszközrendszer fogalmi rendszerének meghatározása
András Tóth
Hadtudomány (2022) Vol. 32, Iss. 4, pp. 112-125
Open Access
András Tóth
Hadtudomány (2022) Vol. 32, Iss. 4, pp. 112-125
Open Access
Ray-tracing based Channel Modeling for Rough-boundary Environments
Kyoung-Min Park, Eunji Lee, Jinwook Kim, et al.
MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM) (2021), pp. 629-634
Closed Access
Kyoung-Min Park, Eunji Lee, Jinwook Kim, et al.
MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM) (2021), pp. 629-634
Closed Access