
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Layered Approach to Threat Modeling for 5G-Based Systems
Muhammad Najmul Islam Farooqui, Junaid Arshad, Muhammad Mubashir Khan
Electronics (2022) Vol. 11, Iss. 12, pp. 1819-1819
Open Access | Times Cited: 12
Muhammad Najmul Islam Farooqui, Junaid Arshad, Muhammad Mubashir Khan
Electronics (2022) Vol. 11, Iss. 12, pp. 1819-1819
Open Access | Times Cited: 12
Showing 12 citing articles:
Survey on Joint Paradigm of 5G and SDN Emerging Mobile Technologies: Architecture, Security, Challenges and Research Directions
Syed Hussain Ali Kazmi, Faizan Qamar, Rosilah Hassan, et al.
Wireless Personal Communications (2023) Vol. 130, Iss. 4, pp. 2753-2800
Open Access | Times Cited: 36
Syed Hussain Ali Kazmi, Faizan Qamar, Rosilah Hassan, et al.
Wireless Personal Communications (2023) Vol. 130, Iss. 4, pp. 2753-2800
Open Access | Times Cited: 36
Security Concepts in Emerging 6G Communication: Threats, Countermeasures, Authentication Techniques and Research Directions
Syed Hussain Ali Kazmi, Rosilah Hassan, Faizan Qamar, et al.
Symmetry (2023) Vol. 15, Iss. 6, pp. 1147-1147
Open Access | Times Cited: 31
Syed Hussain Ali Kazmi, Rosilah Hassan, Faizan Qamar, et al.
Symmetry (2023) Vol. 15, Iss. 6, pp. 1147-1147
Open Access | Times Cited: 31
Securing 5G virtual networks: a critical analysis of SDN, NFV, and network slicing security
Abdulrahman K. Alnaim
International Journal of Information Security (2024) Vol. 23, Iss. 6, pp. 3569-3589
Open Access | Times Cited: 4
Abdulrahman K. Alnaim
International Journal of Information Security (2024) Vol. 23, Iss. 6, pp. 3569-3589
Open Access | Times Cited: 4
Security Analysis of Critical 5G Interfaces
Mohammed Mahyoub, AbdulAziz AbdulGhaffar, Emmanuel Alalade, et al.
IEEE Communications Surveys & Tutorials (2024) Vol. 26, Iss. 4, pp. 2382-2410
Open Access | Times Cited: 3
Mohammed Mahyoub, AbdulAziz AbdulGhaffar, Emmanuel Alalade, et al.
IEEE Communications Surveys & Tutorials (2024) Vol. 26, Iss. 4, pp. 2382-2410
Open Access | Times Cited: 3
“Work-in-Progress” Structuring the Complexity: An Ontological Approach to Analyze the Cybersecurity of a 5G Service
Andrea Bernardini, Francesco D'Alterio, Leonardo Sagratella, et al.
(2024), pp. 691-700
Closed Access | Times Cited: 1
Andrea Bernardini, Francesco D'Alterio, Leonardo Sagratella, et al.
(2024), pp. 691-700
Closed Access | Times Cited: 1
Theory and practice in secure software development lifecycle: A comprehensive survey
Martin Otieno, David Odera, Jairus Ekume Ounza
World Journal of Advanced Research and Reviews (2023) Vol. 18, Iss. 3, pp. 053-078
Open Access | Times Cited: 4
Martin Otieno, David Odera, Jairus Ekume Ounza
World Journal of Advanced Research and Reviews (2023) Vol. 18, Iss. 3, pp. 053-078
Open Access | Times Cited: 4
Security Analysis of Critical 5G Interfaces
Mohammed Mahyoub, AbdulAziz AbdulGhaffar, Emmanuel Alalade, et al.
(2023)
Open Access | Times Cited: 4
Mohammed Mahyoub, AbdulAziz AbdulGhaffar, Emmanuel Alalade, et al.
(2023)
Open Access | Times Cited: 4
Automated Generation of 5G Fine-Grained Threat Models: A Systematic Approach
Daniele Granata, Massimiliano Rak, Wissam Mallouli
IEEE Access (2023) Vol. 11, pp. 129788-129804
Open Access | Times Cited: 3
Daniele Granata, Massimiliano Rak, Wissam Mallouli
IEEE Access (2023) Vol. 11, pp. 129788-129804
Open Access | Times Cited: 3
Security Analysis of Critical 5G Interfaces
Mohammed Mahyoub, AbdulAziz AbdulGhaffar, Emmanuel Alalade, et al.
(2023)
Open Access | Times Cited: 2
Mohammed Mahyoub, AbdulAziz AbdulGhaffar, Emmanuel Alalade, et al.
(2023)
Open Access | Times Cited: 2
5G Attacks and Countermeasures
Sebastian Angelo Bjerre, Mikkel Woidemann Klaebel Blomsterberg, Birger Andersen
2022 25th International Symposium on Wireless Personal Multimedia Communications (WPMC) (2022)
Open Access | Times Cited: 3
Sebastian Angelo Bjerre, Mikkel Woidemann Klaebel Blomsterberg, Birger Andersen
2022 25th International Symposium on Wireless Personal Multimedia Communications (WPMC) (2022)
Open Access | Times Cited: 3
Survey on Security Risks in 5G Private Industrial Networks
G V Pavan, Meeradevi Meeradevi, V. Sangeetha
(2022), pp. 147-152
Closed Access | Times Cited: 1
G V Pavan, Meeradevi Meeradevi, V. Sangeetha
(2022), pp. 147-152
Closed Access | Times Cited: 1
The State of Security in Sdn, Nfv, and Network Slicing
Abdulrahman K. Alnaim, Eduardo Buglioni Fernandez
(2023)
Closed Access
Abdulrahman K. Alnaim, Eduardo Buglioni Fernandez
(2023)
Closed Access