OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Lattice-Based Lightweight Quantum Resistant Scheme in 5G-Enabled Vehicular Networks
Zeyad Ghaleb Al-Mekhlafi, Mahmood A. Al-Shareeda, Selvakumar Manickam, et al.
Mathematics (2023) Vol. 11, Iss. 2, pp. 399-399
Open Access | Times Cited: 31

Showing 1-25 of 31 citing articles:

A Systematic Literature Review on Security of Vehicular Ad-Hoc Network (VANET) Based on VEINS Framework
Mahmood A. Al-Shareeda, Selvakumar Manickam
IEEE Access (2023) Vol. 11, pp. 46218-46228
Open Access | Times Cited: 52

Chebyshev Polynomial-Based Fog Computing Scheme Supporting Pseudonym Revocation for 5G-Enabled Vehicular Networks
Zeyad Ghaleb Al-Mekhlafi, Mahmood A. Al-Shareeda, Selvakumar Manickam, et al.
Electronics (2023) Vol. 12, Iss. 4, pp. 872-872
Open Access | Times Cited: 37

Efficient Authentication Scheme for 5G-Enabled Vehicular Networks Using Fog Computing
Zeyad Ghaleb Al-Mekhlafi, Mahmood A. Al-Shareeda, Selvakumar Manickam, et al.
Sensors (2023) Vol. 23, Iss. 7, pp. 3543-3543
Open Access | Times Cited: 37

Detection of Autism Spectrum Disorder Using A 1-Dimensional Convolutional Neural Network
Aythem Khairi Kareem, Mohammed M AL-Ani, Ahmed Adil Nafea
Baghdad Science Journal (2023) Vol. 20, Iss. 3(Suppl.), pp. 1182-1182
Open Access | Times Cited: 22

Privacy-Enhanced Multi-Region Data Aggregation for Internet of Vehicles
H. L. Dai, Yuanyuan Zhang, Li Lin, et al.
Vehicular Communications (2025), pp. 100886-100886
Closed Access

SDODV: A smart and adaptive on-demand distance vector routing protocol for MANETs
Sanaa Kaddoura, Ramzi A. Haraty, Sultan Al Jahdali, et al.
Peer-to-Peer Networking and Applications (2023) Vol. 16, Iss. 5, pp. 2325-2348
Closed Access | Times Cited: 12

The blockchain internet of things: review, opportunities, challenges, and recommendations
Mahmood A. Al-Shareeda, Murtaja Ali Saare, Selvakumar Manickam
Indonesian Journal of Electrical Engineering and Computer Science (2023) Vol. 31, Iss. 3, pp. 1673-1673
Open Access | Times Cited: 9

Long range technology for internet of things: review, challenges, and future directions
Mahmood A. Al-Shareeda, Abeer Abdullah Alsadhan, Hamzah Hadi Qasim, et al.
Bulletin of Electrical Engineering and Informatics (2023) Vol. 12, Iss. 6, pp. 3758-3767
Open Access | Times Cited: 9

A security-enhanced authentication scheme for quantum-key-distribution (QKD) enabled Internet of vehicles in multi-cloud environment
Ze Yang, Qin Shi, Teng Cheng, et al.
Vehicular Communications (2024) Vol. 48, pp. 100789-100789
Closed Access | Times Cited: 3

Preserving location privacy against inference attacks in indoor positioning system
D Hemkumar
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 2, pp. 784-799
Closed Access | Times Cited: 2

Fog computing and blockchain technology based certificateless authentication scheme in 5G-assisted vehicular communication
Zeyad Ghaleb Al-Mekhlafi, Hussam Dheaa Kamel Al-Janabi, Mahmood A. Al-Shareeda, et al.
Peer-to-Peer Networking and Applications (2024)
Closed Access | Times Cited: 2

A bayesian-based distributed trust management scheme for connected vehicles’ security
Gopal Singh Rawat, Karan Singh
Peer-to-Peer Networking and Applications (2023) Vol. 16, Iss. 5, pp. 2290-2306
Closed Access | Times Cited: 6

EEG Eye Blink Artifacts Removal with Wavelet Denoising and Bandpass Filtering
Ebtesam N. AlShemmary, Bushra Kamil Hilal, Azmi Sh. Abdulbaqi, et al.
Baghdad Science Journal (2024) Vol. 21, Iss. 11, pp. 3617-3631
Open Access | Times Cited: 1

Post-quantum security design for hierarchical healthcare systems based on lattices
Manel Boujelben, Mohamed Abid
The Journal of Supercomputing (2024) Vol. 80, Iss. 12, pp. 17292-17313
Closed Access | Times Cited: 1

Validation of the toolkit for fake news awareness in social media
Mahmood A. Al-Shareeda, Murtaja Ali Saare, Selvakumar Manickam, et al.
Indonesian Journal of Electrical Engineering and Computer Science (2023) Vol. 31, Iss. 2, pp. 1171-1171
Open Access | Times Cited: 3

IMDRPL: Identifying and eliminating malicious devices using DIO and DAO ICMP control messages in RPL-based protocol
P. Deepavathi, C. Mala
Peer-to-Peer Networking and Applications (2023) Vol. 16, Iss. 5, pp. 2380-2398
Closed Access | Times Cited: 3

اكتشاف المشاعر ومشاركة الطلاب في التعلم عن بعد أثناء الحجر الصحي بسبب كوفيد 19
Benyoussef Abdellaoui, Ahmed Remaida, Zineb Sabri, et al.
Baghdad Science Journal (2023) Vol. 21, Iss. 4, pp. 1432-1432
Open Access | Times Cited: 3

Formal validation of authentication scheme in 5G-enabled vehicular networks using AVISPA
Mays A. Hamdan, Amel Meddeb-Makhlouf, Hassène Mnif
Indonesian Journal of Electrical Engineering and Computer Science (2024) Vol. 34, Iss. 1, pp. 396-396
Open Access

A Quick Background of Vehicular Communication Data Exchanged
Benjamin Asher, Sean Joseph, Jayakumar Maidin, et al.
SSRN Electronic Journal (2024)
Closed Access

Overview of Sharing Data in Intelligent Transportation System
Benjamin Asher, Fandi Ahmad, Darrell Ang
SSRN Electronic Journal (2024)
Closed Access

Application of Attribute-Based Encryption in Military Internet of Things Environment
Łukasz Pióro, Jakub Sychowiec, Krzysztof Kanciak, et al.
Sensors (2024) Vol. 24, Iss. 18, pp. 5863-5863
Open Access

Classification of Arabic Alphabets Using a Combination of a Convolutional Neural Network and the Morphological Gradient Method
Mouhssine El Atillah, Khalid El Fazazy, Jamal Riffi
Baghdad Science Journal (2023)
Open Access | Times Cited: 1

Improving the efficiency and security of passport control processes at airports by using the R-CNN object detection model
Elhoucine Ouassam, Yassine Dabachine, Nabil Hmina, et al.
Baghdad Science Journal (2023)
Open Access | Times Cited: 1

Review of routing protocol for low power and lossy network in the internet of things
Murtaja Ali Saare, Saima Anwar Lashari, Ayman Khalil, et al.
Indonesian Journal of Electrical Engineering and Computer Science (2023) Vol. 32, Iss. 2, pp. 865-865
Open Access | Times Cited: 1

Page 1 - Next Page

Scroll to top