
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
LBSS: A Lightweight Blockchain-Based Security Scheme for IoT-Enabled Healthcare Environment
Omar Said
Sensors (2022) Vol. 22, Iss. 20, pp. 7948-7948
Open Access | Times Cited: 16
Omar Said
Sensors (2022) Vol. 22, Iss. 20, pp. 7948-7948
Open Access | Times Cited: 16
Showing 16 citing articles:
Assessing the Potential Usages of Blockchain to Transform Smart Bangladesh: A PRISMA Based Systematic Review
Mohammad Rakibul Islam Bhuiyan, Most. Sadia Akter
Journal of Information Systems and Informatics (2024) Vol. 6, Iss. 1, pp. 245-269
Open Access | Times Cited: 10
Mohammad Rakibul Islam Bhuiyan, Most. Sadia Akter
Journal of Information Systems and Informatics (2024) Vol. 6, Iss. 1, pp. 245-269
Open Access | Times Cited: 10
A Sustainable W-RLG Model for Attack Detection in Healthcare IoT Systems
Brij B. Gupta, Akshat Gaurav, Razaz Waheeb Attar, et al.
Sustainability (2024) Vol. 16, Iss. 8, pp. 3103-3103
Open Access | Times Cited: 3
Brij B. Gupta, Akshat Gaurav, Razaz Waheeb Attar, et al.
Sustainability (2024) Vol. 16, Iss. 8, pp. 3103-3103
Open Access | Times Cited: 3
Blockchain-Based Information Sharing Security for the Internet of Things
Abdullah Aljumah, Tariq Ahamed Ahanger
Mathematics (2023) Vol. 11, Iss. 9, pp. 2157-2157
Open Access | Times Cited: 8
Abdullah Aljumah, Tariq Ahamed Ahanger
Mathematics (2023) Vol. 11, Iss. 9, pp. 2157-2157
Open Access | Times Cited: 8
Early prediction of ransomware API calls behaviour based on GRU-TCN in healthcare IoT
Jueun Jeon, Seungyeon Baek, Byeonghui Jeong, et al.
Connection Science (2023) Vol. 35, Iss. 1
Open Access | Times Cited: 6
Jueun Jeon, Seungyeon Baek, Byeonghui Jeong, et al.
Connection Science (2023) Vol. 35, Iss. 1
Open Access | Times Cited: 6
A critical review of the state of computer security in the health sector
Raúl Jáuregui-Velarde, Domingo Hernández Celis, Cesar Yactayo-Arias, et al.
Bulletin of Electrical Engineering and Informatics (2023) Vol. 12, Iss. 6, pp. 3805-3816
Open Access | Times Cited: 5
Raúl Jáuregui-Velarde, Domingo Hernández Celis, Cesar Yactayo-Arias, et al.
Bulletin of Electrical Engineering and Informatics (2023) Vol. 12, Iss. 6, pp. 3805-3816
Open Access | Times Cited: 5
A comprehensive node-based botnet detection framework for IoT network
Abdulaziz Aldaej, Tariq Ahamed Ahanger, Mohammed Atiquzzaman, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 9261-9281
Closed Access | Times Cited: 1
Abdulaziz Aldaej, Tariq Ahamed Ahanger, Mohammed Atiquzzaman, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 9261-9281
Closed Access | Times Cited: 1
Miner Selection in an Internet of Medical Things Framework using Fuzzy Logic
Namrata Singh, Ayan Kumar Das, Ditipriya Sinha
Applied Soft Computing (2024) Vol. 161, pp. 111768-111768
Closed Access | Times Cited: 1
Namrata Singh, Ayan Kumar Das, Ditipriya Sinha
Applied Soft Computing (2024) Vol. 161, pp. 111768-111768
Closed Access | Times Cited: 1
Development and Application of IoT Monitoring Systems for Typical Large Amusement Facilities
Zhao Zhao, Weike Song, Huajie Wang, et al.
Sensors (2024) Vol. 24, Iss. 14, pp. 4433-4433
Open Access | Times Cited: 1
Zhao Zhao, Weike Song, Huajie Wang, et al.
Sensors (2024) Vol. 24, Iss. 14, pp. 4433-4433
Open Access | Times Cited: 1
Quantifying IoT Security Parameters: An Assessment Framework
Shouki A. Ebad
IEEE Access (2023) Vol. 11, pp. 101087-101097
Open Access | Times Cited: 4
Shouki A. Ebad
IEEE Access (2023) Vol. 11, pp. 101087-101097
Open Access | Times Cited: 4
Blockchain Approaches for Healthcare: A Review and Outlook
Natasha Shaikh, Smita Kasar
(2024), pp. 777-784
Closed Access
Natasha Shaikh, Smita Kasar
(2024), pp. 777-784
Closed Access
Privacy-aware quantum convolutional neural network for blockchain-based IoT health care data
Balaso Jagdale, Shounak Rushikesh Sugave, Yogesh R. Kulkarni, et al.
Intelligent Decision Technologies (2024) Vol. 18, Iss. 2, pp. 1337-1354
Closed Access
Balaso Jagdale, Shounak Rushikesh Sugave, Yogesh R. Kulkarni, et al.
Intelligent Decision Technologies (2024) Vol. 18, Iss. 2, pp. 1337-1354
Closed Access
Enhancing IoT security in wireless local area networks through dynamic vulnerability scanning
P. Senthilraja, P. Nancy, J SHERINE GLORY, et al.
Sadhana (2024) Vol. 49, Iss. 3
Closed Access
P. Senthilraja, P. Nancy, J SHERINE GLORY, et al.
Sadhana (2024) Vol. 49, Iss. 3
Closed Access
Electronic Medical Images Security and Privacy Techniques
Divya Sharma, Chander Prabha
(2024), pp. 102-106
Closed Access
Divya Sharma, Chander Prabha
(2024), pp. 102-106
Closed Access
Enhancing Security in CIC IoT Networks through Machine Learning Algorithms
Atul Kumar, Kalpna Guleria, Rahul Chauhan, et al.
(2024), pp. 1-5
Closed Access
Atul Kumar, Kalpna Guleria, Rahul Chauhan, et al.
(2024), pp. 1-5
Closed Access
Applications of blockchain technology in privacy preserving and data security for real time (data) applications
Sushama A. Deshmukh, Smita Kasar
Concurrency and Computation Practice and Experience (2024)
Closed Access
Sushama A. Deshmukh, Smita Kasar
Concurrency and Computation Practice and Experience (2024)
Closed Access
Blockchain-Based Secure Storage And Sharing Of Medical Data Using Machine Learning
Ahmed S. Almasoud
(2023), pp. 1-4
Closed Access
Ahmed S. Almasoud
(2023), pp. 1-4
Closed Access