
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Robust and Secure Data Transmission Using Artificial Intelligence Techniques in Ad-Hoc Networks
Pooja Rani, Kavita Kavita, Sahil Verma, et al.
Sensors (2021) Vol. 22, Iss. 1, pp. 251-251
Open Access | Times Cited: 33
Pooja Rani, Kavita Kavita, Sahil Verma, et al.
Sensors (2021) Vol. 22, Iss. 1, pp. 251-251
Open Access | Times Cited: 33
Showing 1-25 of 33 citing articles:
Healthcare Internet of Things (H-IoT): Current Trends, Future Prospects, Applications, Challenges, and Security Issues
Mohit Kumar, Ashwani Kumar, Sahil Verma, et al.
Electronics (2023) Vol. 12, Iss. 9, pp. 2050-2050
Open Access | Times Cited: 80
Mohit Kumar, Ashwani Kumar, Sahil Verma, et al.
Electronics (2023) Vol. 12, Iss. 9, pp. 2050-2050
Open Access | Times Cited: 80
Classification and comparison of ad hoc networks: A review
Reeya Agrawal, Neetu Faujdar, Carlos Andres Tavera Romero, et al.
Egyptian Informatics Journal (2022) Vol. 24, Iss. 1, pp. 1-25
Open Access | Times Cited: 50
Reeya Agrawal, Neetu Faujdar, Carlos Andres Tavera Romero, et al.
Egyptian Informatics Journal (2022) Vol. 24, Iss. 1, pp. 1-25
Open Access | Times Cited: 50
An Integrated Z-Number and DEMATEL-Based Cooperation Enforcement Scheme for Thwarting Malicious Nodes in MANETs
S. M. Udhaya Sankar, N. Jagadish Kumar, G. Elangovan, et al.
Wireless Personal Communications (2023) Vol. 130, Iss. 4, pp. 2531-2563
Closed Access | Times Cited: 30
S. M. Udhaya Sankar, N. Jagadish Kumar, G. Elangovan, et al.
Wireless Personal Communications (2023) Vol. 130, Iss. 4, pp. 2531-2563
Closed Access | Times Cited: 30
Artificial Intelligence-Enhanced IoT and UAV Integration in Ad Hoc Networks for Smart Cities
Abdullah Akbar, Waqar Hussain
Apress eBooks (2025), pp. 285-332
Closed Access
Abdullah Akbar, Waqar Hussain
Apress eBooks (2025), pp. 285-332
Closed Access
Optimized Secure and Energy-Efficient Approach for IoT-Enabled Wireless Sensor Networks
Jay Kumar Jain, Dipti Chauhan
Pervasive and Mobile Computing (2025), pp. 102049-102049
Closed Access
Jay Kumar Jain, Dipti Chauhan
Pervasive and Mobile Computing (2025), pp. 102049-102049
Closed Access
Towards a Smart Environment: Optimization of WLAN Technologies to Enable Concurrent Smart Services
Ali Mohd Ali, Mohammad R. Hassan, Ahmad Al–Qerem, et al.
Sensors (2023) Vol. 23, Iss. 5, pp. 2432-2432
Open Access | Times Cited: 10
Ali Mohd Ali, Mohammad R. Hassan, Ahmad Al–Qerem, et al.
Sensors (2023) Vol. 23, Iss. 5, pp. 2432-2432
Open Access | Times Cited: 10
Hybrid Bayesian and modified grey PROMETHEE-AL model-based trust estimation technique for thwarting malicious and selfish nodes in MANETs
J. Suresh, J. Martin Sahayaraj, B. R. Rajakumar, et al.
Wireless Networks (2024) Vol. 30, Iss. 3, pp. 1697-1718
Closed Access | Times Cited: 3
J. Suresh, J. Martin Sahayaraj, B. R. Rajakumar, et al.
Wireless Networks (2024) Vol. 30, Iss. 3, pp. 1697-1718
Closed Access | Times Cited: 3
Analysis of 22-year Drought Characteristics in Heilongjiang Province Based on Temperature Vegetation Drought Index
Li Wu, Youzhi Zhang, Limin Wang, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-13
Open Access | Times Cited: 14
Li Wu, Youzhi Zhang, Limin Wang, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-13
Open Access | Times Cited: 14
TriChain: Kangaroo-Based Intrusion Detection for Secure Multipath Route Discovery and Route Maintenance in MANET Using Advanced Routing Protocol
Jayantkumar A. Rathod, Manjunath Kotari
International Journal of Computer Networks And Applications (2024) Vol. 11, Iss. 1, pp. 61-61
Open Access | Times Cited: 2
Jayantkumar A. Rathod, Manjunath Kotari
International Journal of Computer Networks And Applications (2024) Vol. 11, Iss. 1, pp. 61-61
Open Access | Times Cited: 2
Enhancing MANET Security Through Federated Learning and Multiobjective Optimization: A Trust-aware Routing Framework
Saad M. Hassan, Mohd Murtadha Mohamad, Farkhana Muchtar, et al.
IEEE Access (2024) Vol. 12, pp. 181149-181178
Open Access | Times Cited: 2
Saad M. Hassan, Mohd Murtadha Mohamad, Farkhana Muchtar, et al.
IEEE Access (2024) Vol. 12, pp. 181149-181178
Open Access | Times Cited: 2
Artificial self-attention rabbits battle royale multiscale network based robust and secure data transmission in mobile Ad Hoc networks
M.S. Gowtham, M. Ramkumar, S. Syed Jamaesha, et al.
Computers & Security (2024) Vol. 142, pp. 103889-103889
Closed Access | Times Cited: 1
M.S. Gowtham, M. Ramkumar, S. Syed Jamaesha, et al.
Computers & Security (2024) Vol. 142, pp. 103889-103889
Closed Access | Times Cited: 1
Developing a Hybrid Detection Approach to Mitigating Black Hole and Gray Hole Attacks in Mobile Ad Hoc Networks
Mohammad Yazdanypoor, Stefano Cirillo, Giandomenico Solimando
Applied Sciences (2024) Vol. 14, Iss. 17, pp. 7982-7982
Open Access | Times Cited: 1
Mohammad Yazdanypoor, Stefano Cirillo, Giandomenico Solimando
Applied Sciences (2024) Vol. 14, Iss. 17, pp. 7982-7982
Open Access | Times Cited: 1
Trends, prospects, challenges, and security in the healthcare internet of things
Tariq Emad Ali, Faten Imad Ali, Pavle Dakić, et al.
Computing (2024) Vol. 107, Iss. 1
Open Access | Times Cited: 1
Tariq Emad Ali, Faten Imad Ali, Pavle Dakić, et al.
Computing (2024) Vol. 107, Iss. 1
Open Access | Times Cited: 1
Z number improved reference ideal method‐based decision‐making process for enforcing cooperation during data dissemination in mobile ad hoc networks
M. Rajkumar, Karthika Jayaprakash
International Journal of Communication Systems (2023) Vol. 36, Iss. 13
Closed Access | Times Cited: 4
M. Rajkumar, Karthika Jayaprakash
International Journal of Communication Systems (2023) Vol. 36, Iss. 13
Closed Access | Times Cited: 4
Application of random forest based on semi-automatic parameter adjustment for optimization of anti-breast cancer drugs
Jiajia Liu, Zhihui Zhou, Shanshan Kong, et al.
Frontiers in Oncology (2022) Vol. 12
Open Access | Times Cited: 6
Jiajia Liu, Zhihui Zhou, Shanshan Kong, et al.
Frontiers in Oncology (2022) Vol. 12
Open Access | Times Cited: 6
A differential game model research on dynamic pricing and coordination of fresh agricultural products supply chain based on freshness
Ming Luo, Guohua Zhou, Hao Xu
Economic Research-Ekonomska Istraživanja (2023) Vol. 36, Iss. 2
Open Access | Times Cited: 3
Ming Luo, Guohua Zhou, Hao Xu
Economic Research-Ekonomska Istraživanja (2023) Vol. 36, Iss. 2
Open Access | Times Cited: 3
An Advanced Job Scheduling Algorithmic Architecture to Reduce Energy Consumption and CO2 Emissions in Multi-Cloud
Ramanpreet Kaur, Divya Anand, Upinder Kaur, et al.
Electronics (2023) Vol. 12, Iss. 8, pp. 1810-1810
Open Access | Times Cited: 2
Ramanpreet Kaur, Divya Anand, Upinder Kaur, et al.
Electronics (2023) Vol. 12, Iss. 8, pp. 1810-1810
Open Access | Times Cited: 2
Recognition of Handwritten Digits Using Convolutional Neural Network in Python and Comparison of Performance for Various Hidden Layers
Himansh Gupta, Amanpreet Kaur, Kavita Kavita, et al.
Lecture notes in networks and systems (2023), pp. 727-739
Closed Access | Times Cited: 2
Himansh Gupta, Amanpreet Kaur, Kavita Kavita, et al.
Lecture notes in networks and systems (2023), pp. 727-739
Closed Access | Times Cited: 2
Data Storage and Transmission Security in the Cloud
Ankita Nayak, Atmika Patnaik, Ipseeta Satpathy, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 194-212
Closed Access
Ankita Nayak, Atmika Patnaik, Ipseeta Satpathy, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 194-212
Closed Access
Leveraging Advanced Technology And Design Thinking To Address Challenges Faced By Indian Adolescent Youth
Ayush Chandrol, Janvi, Monisha Awasthi, et al.
(2024) Vol. 7, pp. 1-7
Closed Access
Ayush Chandrol, Janvi, Monisha Awasthi, et al.
(2024) Vol. 7, pp. 1-7
Closed Access
Blue Brains — The Future Generation
Manisha Khanduja, Divya Pandey, Devanshi Adhikari, et al.
(2024) Vol. 2, pp. 1-6
Closed Access
Manisha Khanduja, Divya Pandey, Devanshi Adhikari, et al.
(2024) Vol. 2, pp. 1-6
Closed Access
Image Refocusing – Using Unsupervised Learning and Depth Estimation
Kashish Galhotra, Azhar Ashraf, Hiral Singh
(2024) Vol. 20, pp. 1-6
Closed Access
Kashish Galhotra, Azhar Ashraf, Hiral Singh
(2024) Vol. 20, pp. 1-6
Closed Access
Artificial Intelligence & Justice Delivery System in India: A Symbiotic Relationship of Effectiveness.
Abhiranjan Dixit, Nimit Saroha
(2024) Vol. 19, pp. 1-5
Closed Access
Abhiranjan Dixit, Nimit Saroha
(2024) Vol. 19, pp. 1-5
Closed Access
Smart Web Dictionary using OCR
Sahil Verma, Azhar Ashraf, Babita Rawat, et al.
(2024) Vol. 13, pp. 1-7
Closed Access
Sahil Verma, Azhar Ashraf, Babita Rawat, et al.
(2024) Vol. 13, pp. 1-7
Closed Access