![Logo of OpenAlex.org Project OpenAlex Citations Logo](https://www.oahelper.org/wp-content/plugins/oahelper-citations/img/logo-openalex.jpg)
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Efficient data transmission on wireless communication through a privacy-enhanced blockchain process
Rajanikanth Aluvalu, Senthil Kumaran V. N., T. Manikandan, et al.
PeerJ Computer Science (2023) Vol. 9, pp. e1308-e1308
Open Access | Times Cited: 23
Rajanikanth Aluvalu, Senthil Kumaran V. N., T. Manikandan, et al.
PeerJ Computer Science (2023) Vol. 9, pp. e1308-e1308
Open Access | Times Cited: 23
Showing 23 citing articles:
Robust detection of unknown DoS/DDoS attacks in IoT networks using a hybrid learning model
Xuan-Ha Nguyen, Kim-Hung Le
Internet of Things (2023) Vol. 23, pp. 100851-100851
Closed Access | Times Cited: 30
Xuan-Ha Nguyen, Kim-Hung Le
Internet of Things (2023) Vol. 23, pp. 100851-100851
Closed Access | Times Cited: 30
Enhancing federated learning robustness through randomization and mixture
Seyedsina Nabavirazavi, Rahim Taheri, Sundararaja Sitharama Iyengar
Future Generation Computer Systems (2024) Vol. 158, pp. 28-43
Closed Access | Times Cited: 8
Seyedsina Nabavirazavi, Rahim Taheri, Sundararaja Sitharama Iyengar
Future Generation Computer Systems (2024) Vol. 158, pp. 28-43
Closed Access | Times Cited: 8
GeoPM-DMEIRL: A deep inverse reinforcement learning security trajectory generation framework with serverless computing
Yi-rui Huang, Jing Zhang, H. Hou, et al.
Future Generation Computer Systems (2024) Vol. 154, pp. 123-139
Closed Access | Times Cited: 7
Yi-rui Huang, Jing Zhang, H. Hou, et al.
Future Generation Computer Systems (2024) Vol. 154, pp. 123-139
Closed Access | Times Cited: 7
Federated learning optimization: A computational blockchain process with offloading analysis to enhance security
Shitharth Selvarajan, Hariprasath Manoharan, Achyut Shankar, et al.
Egyptian Informatics Journal (2023) Vol. 24, Iss. 4, pp. 100406-100406
Open Access | Times Cited: 17
Shitharth Selvarajan, Hariprasath Manoharan, Achyut Shankar, et al.
Egyptian Informatics Journal (2023) Vol. 24, Iss. 4, pp. 100406-100406
Open Access | Times Cited: 17
Economic strategic plans with supply chain risk management (SCRM) for organizational growth and development
Basim Aljabhan
Alexandria Engineering Journal (2023) Vol. 79, pp. 411-426
Open Access | Times Cited: 11
Basim Aljabhan
Alexandria Engineering Journal (2023) Vol. 79, pp. 411-426
Open Access | Times Cited: 11
SCBC: Smart city monitoring with blockchain using Internet of Things for and neuro fuzzy procedures
Shitharth Selvarajan, Hariprasath Manoharan, Celestine Iwendi, et al.
Mathematical Biosciences & Engineering (2023) Vol. 20, Iss. 12, pp. 20828-20851
Open Access | Times Cited: 11
Shitharth Selvarajan, Hariprasath Manoharan, Celestine Iwendi, et al.
Mathematical Biosciences & Engineering (2023) Vol. 20, Iss. 12, pp. 20828-20851
Open Access | Times Cited: 11
Research on Blockchain Cross-Chain Model Based on “NFT + Cross-Chain Bridge”
Yutong Han, Chundong Wang, Huaibin Wang
IEEE Access (2024) Vol. 12, pp. 77065-77078
Open Access | Times Cited: 3
Yutong Han, Chundong Wang, Huaibin Wang
IEEE Access (2024) Vol. 12, pp. 77065-77078
Open Access | Times Cited: 3
BlockAuth: A blockchain-based framework for secure vehicle authentication and authorization
Gauhar Ali, Mohammed ElAffendi, Naveed Ahmad
PLoS ONE (2023) Vol. 18, Iss. 9, pp. e0291596-e0291596
Open Access | Times Cited: 9
Gauhar Ali, Mohammed ElAffendi, Naveed Ahmad
PLoS ONE (2023) Vol. 18, Iss. 9, pp. e0291596-e0291596
Open Access | Times Cited: 9
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC ) model for cloud‐IoT security
Shitharth Selvarajan, Achyut Shankar, Mueen Uddin, et al.
Expert Systems (2024)
Open Access | Times Cited: 2
Shitharth Selvarajan, Achyut Shankar, Mueen Uddin, et al.
Expert Systems (2024)
Open Access | Times Cited: 2
Dickson polynomial-based secure group authentication scheme for Internet of Things
Salman Ali Syed, Selvakumar Manickam, Mueen Uddin, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 2
Salman Ali Syed, Selvakumar Manickam, Mueen Uddin, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 2
Methodology for Developing an IoT-based Parking Space Counter System using XNO
Sujanavan Tiruvayipati, Y. Ramadevi, Vikram Narayandas, et al.
Scalable Computing Practice and Experience (2024) Vol. 25, Iss. 2, pp. 800-811
Open Access | Times Cited: 1
Sujanavan Tiruvayipati, Y. Ramadevi, Vikram Narayandas, et al.
Scalable Computing Practice and Experience (2024) Vol. 25, Iss. 2, pp. 800-811
Open Access | Times Cited: 1
A study of blockchain-based liquidity cross-chain model
Yutong Han, Chundong Wang, H. Wang, et al.
PLoS ONE (2024) Vol. 19, Iss. 6, pp. e0302145-e0302145
Open Access | Times Cited: 1
Yutong Han, Chundong Wang, H. Wang, et al.
PLoS ONE (2024) Vol. 19, Iss. 6, pp. e0302145-e0302145
Open Access | Times Cited: 1
Optimizing Agricultural Risk Management with Hybrid Block-Chain and Fog Computing Architectures for Secure and Efficient Data Handling
Javaid Ahmad Malik, Aamir Hussain, Habib Shah, et al.
Studies in computational intelligence (2024), pp. 309-337
Closed Access | Times Cited: 1
Javaid Ahmad Malik, Aamir Hussain, Habib Shah, et al.
Studies in computational intelligence (2024), pp. 309-337
Closed Access | Times Cited: 1
Enhancing Security in Wireless Communications Through Blockchain and Smart Contracts: A Comprehensive Study
Vaibhav Pratap Singh, Siddhartha Sankar Biswas, Safdar Tanweer, et al.
Lecture notes in networks and systems (2024), pp. 25-36
Closed Access
Vaibhav Pratap Singh, Siddhartha Sankar Biswas, Safdar Tanweer, et al.
Lecture notes in networks and systems (2024), pp. 25-36
Closed Access
Efficient quantum inspired blockchain-based cyber security framework in IoT using deep learning and huristic algorithms
Vimala Josphine C, Theodore Kingslin M, Fatima Vincy R, et al.
Intelligent Decision Technologies (2024) Vol. 18, Iss. 2, pp. 1203-1232
Closed Access
Vimala Josphine C, Theodore Kingslin M, Fatima Vincy R, et al.
Intelligent Decision Technologies (2024) Vol. 18, Iss. 2, pp. 1203-1232
Closed Access
Regulatory mechanism of vulnerability disclosure behavior considering security crowd-testing: An evolutionary game analysis
Liurong Zhao, Xiaoxi Yu, Xinyu Zhou
PLoS ONE (2024) Vol. 19, Iss. 6, pp. e0304467-e0304467
Open Access
Liurong Zhao, Xiaoxi Yu, Xinyu Zhou
PLoS ONE (2024) Vol. 19, Iss. 6, pp. e0304467-e0304467
Open Access
A study of liquidity cross-chain models based on convex optimization
Yutong Han, Chundong Wang, Huaibin Wang, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
Yutong Han, Chundong Wang, Huaibin Wang, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
PA Fuzzy-noise Removal in Wireless Sensors Networks
B. Harish Goud, Anitha Raju
Scalable Computing Practice and Experience (2024) Vol. 25, Iss. 5, pp. 3925-3933
Open Access
B. Harish Goud, Anitha Raju
Scalable Computing Practice and Experience (2024) Vol. 25, Iss. 5, pp. 3925-3933
Open Access
Multi-Cloud Environments With Quantum Cloud Computing for Secure Data Transfer using Two-Tier Homomorphic Encryption
Manish Chhabra, E. Rajesh
(2024), pp. 663-670
Closed Access
Manish Chhabra, E. Rajesh
(2024), pp. 663-670
Closed Access
ChessCrypt: enhancing wireless communication security in smart cities through dynamically generated S-Box with chess-based nonlinearity
Abdulbasid S. Banga, Nadeem Iqbal, Atif Ikram, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
Abdulbasid S. Banga, Nadeem Iqbal, Atif Ikram, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
Blockchain-Enabled Hyperledger Fabric to Secure Data Transfer Mechanism for Medical Cyber-Physical System: Overview, Issues, and Challenges
P. Vinayasree, A. Mallikarjuna Reddy
EAI Endorsed Transactions on Pervasive Health and Technology (2023) Vol. 9
Open Access | Times Cited: 1
P. Vinayasree, A. Mallikarjuna Reddy
EAI Endorsed Transactions on Pervasive Health and Technology (2023) Vol. 9
Open Access | Times Cited: 1
Smart vehicles networks: BERT self-attention mechanisms for cyber-physical system security
Sultan Mesfer Aldossary
International Journal of Systems Assurance Engineering and Management (2023)
Closed Access
Sultan Mesfer Aldossary
International Journal of Systems Assurance Engineering and Management (2023)
Closed Access
Security Privacy Process Involvement in Cloud Security for Data Preservation against Data Malicious Activity
Et al. K Prabu
International Journal on Recent and Innovation Trends in Computing and Communication (2023) Vol. 11, Iss. 10, pp. 1572-1583
Open Access
Et al. K Prabu
International Journal on Recent and Innovation Trends in Computing and Communication (2023) Vol. 11, Iss. 10, pp. 1572-1583
Open Access