
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Securing Smart Healthcare Cyber-Physical Systems against Blackhole and Greyhole Attacks Using a Blockchain-Enabled Gini Index Framework
Mannan Javed, Noshina Tariq, Muhammad Imran Ashraf, et al.
Sensors (2023) Vol. 23, Iss. 23, pp. 9372-9372
Open Access | Times Cited: 12
Mannan Javed, Noshina Tariq, Muhammad Imran Ashraf, et al.
Sensors (2023) Vol. 23, Iss. 23, pp. 9372-9372
Open Access | Times Cited: 12
Showing 12 citing articles:
Securing the Internet of Things in Artificial Intelligence Era: A Comprehensive Survey
Mamoona Humayun, Noshina Tariq, Majed Alfayad, et al.
IEEE Access (2024) Vol. 12, pp. 25469-25490
Open Access | Times Cited: 13
Mamoona Humayun, Noshina Tariq, Majed Alfayad, et al.
IEEE Access (2024) Vol. 12, pp. 25469-25490
Open Access | Times Cited: 13
Cybersecurity for Sustainable Smart Healthcare: State of the Art, Taxonomy, Mechanisms, and Essential Roles
Guma Ali, Maad M. Mijwil
Deleted Journal (2024) Vol. 4, Iss. 2, pp. 20-62
Open Access | Times Cited: 8
Guma Ali, Maad M. Mijwil
Deleted Journal (2024) Vol. 4, Iss. 2, pp. 20-62
Open Access | Times Cited: 8
RPL-based attack detection approaches in IoT networks: review and taxonomy
Nadia A. Alfriehat, Mohammed Anbar, Mohammad Adnan Aladaileh, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 9
Open Access | Times Cited: 5
Nadia A. Alfriehat, Mohammed Anbar, Mohammad Adnan Aladaileh, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 9
Open Access | Times Cited: 5
LETM-IoT: A lightweight and efficient trust mechanism for Sybil attacks in Internet of Things networks
Jawad Hassan, Adnan Sohail, Ali Ismail Awad, et al.
Ad Hoc Networks (2024) Vol. 163, pp. 103576-103576
Open Access | Times Cited: 2
Jawad Hassan, Adnan Sohail, Ali Ismail Awad, et al.
Ad Hoc Networks (2024) Vol. 163, pp. 103576-103576
Open Access | Times Cited: 2
Trust-Based Optimized Reporting for Detection and Prevention of Black Hole Attacks in Low-Power and Lossy Green IoT Networks
Muhammad Ali Khan, Rao Naveed Bin Rais, Osman Khalid, et al.
Sensors (2024) Vol. 24, Iss. 6, pp. 1775-1775
Open Access | Times Cited: 1
Muhammad Ali Khan, Rao Naveed Bin Rais, Osman Khalid, et al.
Sensors (2024) Vol. 24, Iss. 6, pp. 1775-1775
Open Access | Times Cited: 1
Enhancing IoT Network Security: ML and Blockchain for Intrusion Detection
N. Sunanda, K. Shailaja, Prabhakar Kandukuri, et al.
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 4
Open Access | Times Cited: 1
N. Sunanda, K. Shailaja, Prabhakar Kandukuri, et al.
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 4
Open Access | Times Cited: 1
Blockchain Sensor Network Based CPS Analysis in Healthcare System for Real Time Applications Using 6G IoT Model and Deep Learning Techniques
Shubin Liao
Wireless Personal Communications (2024)
Closed Access
Shubin Liao
Wireless Personal Communications (2024)
Closed Access
FL-DSFA: Securing RPL-Based IoT Networks against Selective Forwarding Attacks Using Federated Learning
Rabia Khan, Noshina Tariq, Muhammad Imran Ashraf, et al.
Sensors (2024) Vol. 24, Iss. 17, pp. 5834-5834
Open Access
Rabia Khan, Noshina Tariq, Muhammad Imran Ashraf, et al.
Sensors (2024) Vol. 24, Iss. 17, pp. 5834-5834
Open Access
Security of Unmanned Aerial Vehicles
Rawish Butt, Tayyab Rehman, Noshina Tariq, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 291-309
Closed Access
Rawish Butt, Tayyab Rehman, Noshina Tariq, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 291-309
Closed Access
Ftdho Zfnet: Block chain based Fractional Tasmanian Devil Harris optimization enabled deep learning using attack detection and mitigation
S. Sengamala Barani, R. Durga
Computer Software and Media Applications (2024) Vol. 7, Iss. 1, pp. 5224-5224
Open Access
S. Sengamala Barani, R. Durga
Computer Software and Media Applications (2024) Vol. 7, Iss. 1, pp. 5224-5224
Open Access
Smart Healthcare Based Cyber Physical System Modeling by Block Chain with Cloud 6G Network and Machine Learning Techniques
U. Sakthi, Ashwag Alasmari, S. P. Girija, et al.
Wireless Personal Communications (2024)
Closed Access
U. Sakthi, Ashwag Alasmari, S. P. Girija, et al.
Wireless Personal Communications (2024)
Closed Access
Federated Learning for Enhanced Malware Threat Detection to Secure Smart Power Grids
S. Shafi, Noshina Tariq, Farrukh Aslam Khan, et al.
Lecture notes in networks and systems (2024), pp. 692-703
Closed Access
S. Shafi, Noshina Tariq, Farrukh Aslam Khan, et al.
Lecture notes in networks and systems (2024), pp. 692-703
Closed Access