
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Beyond Data Breaches
Binay Kumar Pandey, Digvijay Pandey, Ashi Agarwal, et al.
Advances in wireless technologies and telecommunication book series (2024), pp. 212-229
Closed Access | Times Cited: 8
Binay Kumar Pandey, Digvijay Pandey, Ashi Agarwal, et al.
Advances in wireless technologies and telecommunication book series (2024), pp. 212-229
Closed Access | Times Cited: 8
Showing 8 citing articles:
Data Reduction Techniques in Wireless Sensor Networks With Internet of Things
Vijaya Gunturu, C. Goswami, Vinay Kumar Nassa, et al.
Advances in computational intelligence and robotics book series (2024), pp. 73-88
Closed Access | Times Cited: 17
Vijaya Gunturu, C. Goswami, Vinay Kumar Nassa, et al.
Advances in computational intelligence and robotics book series (2024), pp. 73-88
Closed Access | Times Cited: 17
IoE-Enabled Real-Time Customer Experience Enhancement
Jayaashish Sethi, Jaideep Anand, Shathaboina Raju, et al.
Advances in computational intelligence and robotics book series (2024), pp. 229-240
Closed Access
Jayaashish Sethi, Jaideep Anand, Shathaboina Raju, et al.
Advances in computational intelligence and robotics book series (2024), pp. 229-240
Closed Access
Using IoT Principles
S. Ravichandran, Archana Sasi, Muthusamy Kuppusamy, et al.
Advances in computational intelligence and robotics book series (2024), pp. 335-348
Closed Access
S. Ravichandran, Archana Sasi, Muthusamy Kuppusamy, et al.
Advances in computational intelligence and robotics book series (2024), pp. 335-348
Closed Access
Implementation of Multi-Layer Security Network Identification System Using Machine Learning Techniques
N. Rajendran, P. William, Suresh Talwar, et al.
Advances in computational intelligence and robotics book series (2024), pp. 287-302
Closed Access
N. Rajendran, P. William, Suresh Talwar, et al.
Advances in computational intelligence and robotics book series (2024), pp. 287-302
Closed Access
The Classification Approach for Face Spoof Detection in Artificial Neural Networks Based on IoT Concepts
Julia Punitha Malar Dhas, Martin Victor K, P. Santhiya, et al.
Advances in computational intelligence and robotics book series (2024), pp. 319-334
Closed Access
Julia Punitha Malar Dhas, Martin Victor K, P. Santhiya, et al.
Advances in computational intelligence and robotics book series (2024), pp. 319-334
Closed Access
Machine Learning-Based Multi-Layer Security Network Authentication System for Uncertain Attack in the Wireless Communication System
Chetan J. Shelke, D. Sudha, Rathnakar Achary, et al.
Advances in computational intelligence and robotics book series (2024), pp. 117-130
Closed Access
Chetan J. Shelke, D. Sudha, Rathnakar Achary, et al.
Advances in computational intelligence and robotics book series (2024), pp. 117-130
Closed Access
Encrypted Negative Password (ENP) Authentication System
Namrata Barua, Tanusree Saha, Jui Pattanayak, et al.
Advances in computational intelligence and robotics book series (2024), pp. 303-318
Closed Access
Namrata Barua, Tanusree Saha, Jui Pattanayak, et al.
Advances in computational intelligence and robotics book series (2024), pp. 303-318
Closed Access
Smart Security System Using Hybrid System With IoT and Machine Learning
M. Kandan, J. Jayaganesh, Prithu Sarkar, et al.
Advances in computational intelligence and robotics book series (2024), pp. 261-274
Closed Access
M. Kandan, J. Jayaganesh, Prithu Sarkar, et al.
Advances in computational intelligence and robotics book series (2024), pp. 261-274
Closed Access