
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Security Concepts in Emerging 6G Communication: Threats, Countermeasures, Authentication Techniques and Research Directions
Syed Hussain Ali Kazmi, Rosilah Hassan, Faizan Qamar, et al.
Symmetry (2023) Vol. 15, Iss. 6, pp. 1147-1147
Open Access | Times Cited: 30
Syed Hussain Ali Kazmi, Rosilah Hassan, Faizan Qamar, et al.
Symmetry (2023) Vol. 15, Iss. 6, pp. 1147-1147
Open Access | Times Cited: 30
Showing 1-25 of 30 citing articles:
The 6G Ecosystem as Support for IoE and Private Networks: Vision, Requirements, and Challenges
Carlos Serôdio, José Cunha, Guillermo Candela, et al.
Future Internet (2023) Vol. 15, Iss. 11, pp. 348-348
Open Access | Times Cited: 30
Carlos Serôdio, José Cunha, Guillermo Candela, et al.
Future Internet (2023) Vol. 15, Iss. 11, pp. 348-348
Open Access | Times Cited: 30
Federated learning enables 6 G communication technology: Requirements, applications, and integrated with intelligence framework
Mohammad Kamrul Hasan, A.K.M. Ahasan Habib, Shayla Islam, et al.
Alexandria Engineering Journal (2024) Vol. 91, pp. 658-668
Open Access | Times Cited: 11
Mohammad Kamrul Hasan, A.K.M. Ahasan Habib, Shayla Islam, et al.
Alexandria Engineering Journal (2024) Vol. 91, pp. 658-668
Open Access | Times Cited: 11
Security of federated learning in 6G era: A review on conceptual techniques and software platforms used for research and analysis
Syed Hussain Ali Kazmi, Faizan Qamar, Rosilah Hassan, et al.
Computer Networks (2024) Vol. 245, pp. 110358-110358
Closed Access | Times Cited: 7
Syed Hussain Ali Kazmi, Faizan Qamar, Rosilah Hassan, et al.
Computer Networks (2024) Vol. 245, pp. 110358-110358
Closed Access | Times Cited: 7
Toward Efficient 6G IoT Networks: A Perspective on Resource Optimization Strategies, Challenges, and Future Directions
Liwen Zhang, Faizan Qamar, Mahrukh Liaqat, et al.
IEEE Access (2024) Vol. 12, pp. 76606-76633
Open Access | Times Cited: 6
Liwen Zhang, Faizan Qamar, Mahrukh Liaqat, et al.
IEEE Access (2024) Vol. 12, pp. 76606-76633
Open Access | Times Cited: 6
Securing IIoT applications in 6G and beyond using adaptive ensemble learning and zero-touch multi-resource provisioning
Zakaria Abou El Houda, Bouziane Brik, Adlen Ksentini
Computer Communications (2024) Vol. 216, pp. 260-273
Closed Access | Times Cited: 5
Zakaria Abou El Houda, Bouziane Brik, Adlen Ksentini
Computer Communications (2024) Vol. 216, pp. 260-273
Closed Access | Times Cited: 5
An Unsupervised Machine Learning Algorithm for Attack and Anomaly Detection in IoT Sensors
Someah Alangari
Wireless Personal Communications (2024)
Closed Access | Times Cited: 5
Someah Alangari
Wireless Personal Communications (2024)
Closed Access | Times Cited: 5
Overcoming Remote Workforce Cyber Threats: A Comprehensive Ransomware and Bot Net Defense Strategy Utilizing VPN Networks
Olumide Samuel Ogungbemi, Favour Amarachi Ezeugwa, Oluwaseun Oladeji Olaniyi, et al.
Journal of Engineering Research and Reports (2024) Vol. 26, Iss. 8, pp. 161-184
Open Access | Times Cited: 5
Olumide Samuel Ogungbemi, Favour Amarachi Ezeugwa, Oluwaseun Oladeji Olaniyi, et al.
Journal of Engineering Research and Reports (2024) Vol. 26, Iss. 8, pp. 161-184
Open Access | Times Cited: 5
SAFE-CAST: secure AI-federated enumeration for clustering-based automated surveillance and trust in machine-to-machine communication
Yusuf Kursat Tuncel, Kasım Öztoprak
PeerJ Computer Science (2025) Vol. 11, pp. e2551-e2551
Open Access
Yusuf Kursat Tuncel, Kasım Öztoprak
PeerJ Computer Science (2025) Vol. 11, pp. e2551-e2551
Open Access
Network Security Threats and Defense Mechanisms for 6G Multi‐Virtual Network Scenarios
Yu Zhou
International Journal of Network Management (2025) Vol. 35, Iss. 2
Closed Access
Yu Zhou
International Journal of Network Management (2025) Vol. 35, Iss. 2
Closed Access
A Lightweight Bidirectional Secure Authentication Protocol for Mobile Edge Computing in 6G Networks
Yuling Bai
Internet Technology Letters (2025) Vol. 8, Iss. 2
Closed Access
Yuling Bai
Internet Technology Letters (2025) Vol. 8, Iss. 2
Closed Access
Security of 6G-Enabled Vehicle-to-Everything Communication in Emerging Federated Learning and Blockchain Technologies
Myoungsu Kim, Insu Oh, Kangbin Yim, et al.
IEEE Access (2023) Vol. 12, pp. 33972-34001
Open Access | Times Cited: 13
Myoungsu Kim, Insu Oh, Kangbin Yim, et al.
IEEE Access (2023) Vol. 12, pp. 33972-34001
Open Access | Times Cited: 13
A Security Services Management Architecture Toward Resilient 6G Wireless and Computing Ecosystems
Eva Rodríguez, Xavi Masip‐Bruin, Josep Martrat, et al.
IEEE Access (2024) Vol. 12, pp. 98046-98058
Open Access | Times Cited: 3
Eva Rodríguez, Xavi Masip‐Bruin, Josep Martrat, et al.
IEEE Access (2024) Vol. 12, pp. 98046-98058
Open Access | Times Cited: 3
Surveying cybersecurity vulnerabilities and countermeasures for enhancing UAV security
Naveen Kumar, Ankit Chaudhary
Computer Networks (2024) Vol. 252, pp. 110695-110695
Closed Access | Times Cited: 3
Naveen Kumar, Ankit Chaudhary
Computer Networks (2024) Vol. 252, pp. 110695-110695
Closed Access | Times Cited: 3
Multi-antenna Arrays Based Massive-MIMO for B5G/6G: State-of-the-Art, Challenges and Future Research Directions
Faizan Qamar, Syed Hussain Ali Kazmi, Khairul Akram Zainol Ariffin, et al.
(2024)
Open Access | Times Cited: 2
Faizan Qamar, Syed Hussain Ali Kazmi, Khairul Akram Zainol Ariffin, et al.
(2024)
Open Access | Times Cited: 2
Successive Interference Cancellation Approach to Estimated Outage and Coverage Probability for UDN B5G Network
Faizan Qamar, Anand Gachhadar, Syed Hussain Ali Kazmi, et al.
2022 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET) (2023), pp. 182-187
Closed Access | Times Cited: 5
Faizan Qamar, Anand Gachhadar, Syed Hussain Ali Kazmi, et al.
2022 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET) (2023), pp. 182-187
Closed Access | Times Cited: 5
Artificial Intelligence-Enabled 6G Mobile Systems
Ahrar Bin Aslam, Faiza Iqbal, Unzela Talpur, et al.
Signals and communication technology (2024), pp. 49-79
Closed Access | Times Cited: 1
Ahrar Bin Aslam, Faiza Iqbal, Unzela Talpur, et al.
Signals and communication technology (2024), pp. 49-79
Closed Access | Times Cited: 1
Success Probability and Spectral Efficiency Estimation Using Successive Interference Cancellation for B5G Network
Faizan Qamar, Anand Gachhadar, Syed Hussain Ali Kazmi, et al.
(2023), pp. 213-218
Closed Access | Times Cited: 4
Faizan Qamar, Anand Gachhadar, Syed Hussain Ali Kazmi, et al.
(2023), pp. 213-218
Closed Access | Times Cited: 4
High-Capacity Reversible Data Hiding in Encrypted Images Based on 2D-HS Chaotic System and Full Bit-Plane Searching
Bin Ge, Guoqing Ge, Chenxing Xia, et al.
Symmetry (2023) Vol. 15, Iss. 7, pp. 1423-1423
Open Access | Times Cited: 3
Bin Ge, Guoqing Ge, Chenxing Xia, et al.
Symmetry (2023) Vol. 15, Iss. 7, pp. 1423-1423
Open Access | Times Cited: 3
Security in Federated Learning Enabled 6g Era: A Review on Conceptual Techniques and Software Platforms Used for Research and Analysis
Syed Hussain Ali Kazmi, Faizan Qamar, Rosilah Hassan, et al.
(2023)
Closed Access | Times Cited: 2
Syed Hussain Ali Kazmi, Faizan Qamar, Rosilah Hassan, et al.
(2023)
Closed Access | Times Cited: 2
SLFL: A Server-Less Federated Learning Framework in Software Defined UAV Networks
Syed Hussain Ali Kazmi, Faizan Qamar, Rosilah Hassan, et al.
(2023) Vol. 14267468, pp. 339-344
Closed Access | Times Cited: 2
Syed Hussain Ali Kazmi, Faizan Qamar, Rosilah Hassan, et al.
(2023) Vol. 14267468, pp. 339-344
Closed Access | Times Cited: 2
Modern Diagnostic Imaging Classifications and Risk Factors for 6G-enabled Smart Health Systems
K. Раму, R. Krishnamoorthy, Абу Салім, et al.
Radioelectronics and Communications Systems (2023) Vol. 66, Iss. 5, pp. 241-250
Closed Access | Times Cited: 2
K. Раму, R. Krishnamoorthy, Абу Салім, et al.
Radioelectronics and Communications Systems (2023) Vol. 66, Iss. 5, pp. 241-250
Closed Access | Times Cited: 2
Multi-Antenna Array-Based Massive MIMO for B5G/6G: State of the Art, Challenges, and Future Research Directions
Faizan Qamar, Syed Hussain Ali Kazmi, Khairul Akram Zainol Ariffin, et al.
Information (2024) Vol. 15, Iss. 8, pp. 442-442
Open Access
Faizan Qamar, Syed Hussain Ali Kazmi, Khairul Akram Zainol Ariffin, et al.
Information (2024) Vol. 15, Iss. 8, pp. 442-442
Open Access
Federated learning for millimeter-wave spectrum in 6G networks: applications, challenges, way forward and open research issues
Faizan Qamar, Syed Hussain Ali Kazmi, Maraj Uddin Ahmed Siddiqui, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2360-e2360
Open Access
Faizan Qamar, Syed Hussain Ali Kazmi, Maraj Uddin Ahmed Siddiqui, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2360-e2360
Open Access
Securing the Future e‐Health: Context‐Aware Physical‐Layer Security
Mehdi Letafati, Eduard A. Jorswieck, Babak Hossein Khalaj
(2024), pp. 239-273
Closed Access
Mehdi Letafati, Eduard A. Jorswieck, Babak Hossein Khalaj
(2024), pp. 239-273
Closed Access
Towards 6G vehicular networks: Vision, technologies, and open challenges
Ping Lang, Daxin Tian, Xu Han, et al.
Computer Networks (2024), pp. 110916-110916
Closed Access
Ping Lang, Daxin Tian, Xu Han, et al.
Computer Networks (2024), pp. 110916-110916
Closed Access