
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Efficient data transmission on wireless communication through a privacy-enhanced blockchain process
Rajanikanth Aluvalu, Senthil Kumaran V. N., T. Manikandan, et al.
PeerJ Computer Science (2023) Vol. 9, pp. e1308-e1308
Open Access | Times Cited: 30
Rajanikanth Aluvalu, Senthil Kumaran V. N., T. Manikandan, et al.
PeerJ Computer Science (2023) Vol. 9, pp. e1308-e1308
Open Access | Times Cited: 30
Showing 1-25 of 30 citing articles:
Robust detection of unknown DoS/DDoS attacks in IoT networks using a hybrid learning model
Xuan-Ha Nguyen, Kim-Hung Le
Internet of Things (2023) Vol. 23, pp. 100851-100851
Closed Access | Times Cited: 34
Xuan-Ha Nguyen, Kim-Hung Le
Internet of Things (2023) Vol. 23, pp. 100851-100851
Closed Access | Times Cited: 34
Enhancing federated learning robustness through randomization and mixture
Seyedsina Nabavirazavi, Rahim Taheri, Sundararaja Sitharama Iyengar
Future Generation Computer Systems (2024) Vol. 158, pp. 28-43
Closed Access | Times Cited: 13
Seyedsina Nabavirazavi, Rahim Taheri, Sundararaja Sitharama Iyengar
Future Generation Computer Systems (2024) Vol. 158, pp. 28-43
Closed Access | Times Cited: 13
Federated learning optimization: A computational blockchain process with offloading analysis to enhance security
Shitharth Selvarajan, Hariprasath Manoharan, Achyut Shankar, et al.
Egyptian Informatics Journal (2023) Vol. 24, Iss. 4, pp. 100406-100406
Open Access | Times Cited: 20
Shitharth Selvarajan, Hariprasath Manoharan, Achyut Shankar, et al.
Egyptian Informatics Journal (2023) Vol. 24, Iss. 4, pp. 100406-100406
Open Access | Times Cited: 20
GeoPM-DMEIRL: A deep inverse reinforcement learning security trajectory generation framework with serverless computing
Yi-rui Huang, Jing Zhang, H. Hou, et al.
Future Generation Computer Systems (2024) Vol. 154, pp. 123-139
Closed Access | Times Cited: 7
Yi-rui Huang, Jing Zhang, H. Hou, et al.
Future Generation Computer Systems (2024) Vol. 154, pp. 123-139
Closed Access | Times Cited: 7
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC ) model for cloud‐IoT security
Shitharth Selvarajan, Achyut Shankar, Mueen Uddin, et al.
Expert Systems (2024)
Open Access | Times Cited: 6
Shitharth Selvarajan, Achyut Shankar, Mueen Uddin, et al.
Expert Systems (2024)
Open Access | Times Cited: 6
Economic strategic plans with supply chain risk management (SCRM) for organizational growth and development
Basim Aljabhan
Alexandria Engineering Journal (2023) Vol. 79, pp. 411-426
Open Access | Times Cited: 13
Basim Aljabhan
Alexandria Engineering Journal (2023) Vol. 79, pp. 411-426
Open Access | Times Cited: 13
SCBC: Smart city monitoring with blockchain using Internet of Things for and neuro fuzzy procedures
Shitharth Selvarajan, Hariprasath Manoharan, Celestine Iwendi, et al.
Mathematical Biosciences & Engineering (2023) Vol. 20, Iss. 12, pp. 20828-20851
Open Access | Times Cited: 13
Shitharth Selvarajan, Hariprasath Manoharan, Celestine Iwendi, et al.
Mathematical Biosciences & Engineering (2023) Vol. 20, Iss. 12, pp. 20828-20851
Open Access | Times Cited: 13
Comparison of Gaussian based Laplacian of Gaussian operator with Gaussian based Canny operator for edge detection in ophthalmoscopic cataract images
Lokesh Kumar, K Indira
AIP conference proceedings (2025) Vol. 3252, pp. 020171-020171
Closed Access
Lokesh Kumar, K Indira
AIP conference proceedings (2025) Vol. 3252, pp. 020171-020171
Closed Access
Performance analysis of accuracy for prediction of innovative cerebral stroke using k-nearest neighbor classifier over support vector machine
K. Janani, Neelam Sanjeev Kumar
AIP conference proceedings (2025) Vol. 3252, pp. 020172-020172
Closed Access
K. Janani, Neelam Sanjeev Kumar
AIP conference proceedings (2025) Vol. 3252, pp. 020172-020172
Closed Access
Improving the accuracy by predicting the radio frequency Jamming attack using random forest in comparison with K-nearest neighbor algorithm
M. Neelakandan, S. Pushpa Latha
AIP conference proceedings (2025) Vol. 3252, pp. 020177-020177
Closed Access
M. Neelakandan, S. Pushpa Latha
AIP conference proceedings (2025) Vol. 3252, pp. 020177-020177
Closed Access
An efficient deep learning algorithm for early Alzheimer’s disease stage identification using CNN compared with mobilenet
N. Hyshnavi, Ashley Thomas
AIP conference proceedings (2025) Vol. 3252, pp. 020173-020173
Closed Access
N. Hyshnavi, Ashley Thomas
AIP conference proceedings (2025) Vol. 3252, pp. 020173-020173
Closed Access
Prediction of the potential mutation in novel SOD1 through the in-silico analysis
O. Nikitha, K. Kala
AIP conference proceedings (2025) Vol. 3252, pp. 020175-020175
Closed Access
O. Nikitha, K. Kala
AIP conference proceedings (2025) Vol. 3252, pp. 020175-020175
Closed Access
Analysis and comparison for innovative adult-onset diabetes mellitus prediction with increased accuracy using logistic regression over support vector machine
I. Hafsa Tabassum, Neelam Sanjeev Kumar
AIP conference proceedings (2025) Vol. 3252, pp. 020174-020174
Closed Access
I. Hafsa Tabassum, Neelam Sanjeev Kumar
AIP conference proceedings (2025) Vol. 3252, pp. 020174-020174
Closed Access
Detecting flooding attacks in distributed denial of service attacks using deep neural network compared with naive bayes
Vasanth Ragu, P. Jesu Jayarin
AIP conference proceedings (2025) Vol. 3252, pp. 020176-020176
Closed Access
Vasanth Ragu, P. Jesu Jayarin
AIP conference proceedings (2025) Vol. 3252, pp. 020176-020176
Closed Access
BlockAuth: A blockchain-based framework for secure vehicle authentication and authorization
Gauhar Ali, Mohammed ElAffendi, Naveed Ahmad
PLoS ONE (2023) Vol. 18, Iss. 9, pp. e0291596-e0291596
Open Access | Times Cited: 10
Gauhar Ali, Mohammed ElAffendi, Naveed Ahmad
PLoS ONE (2023) Vol. 18, Iss. 9, pp. e0291596-e0291596
Open Access | Times Cited: 10
Research on Blockchain Cross-Chain Model Based on “NFT + Cross-Chain Bridge”
Yutong Han, Chundong Wang, Huaibin Wang
IEEE Access (2024) Vol. 12, pp. 77065-77078
Open Access | Times Cited: 3
Yutong Han, Chundong Wang, Huaibin Wang
IEEE Access (2024) Vol. 12, pp. 77065-77078
Open Access | Times Cited: 3
Dickson polynomial-based secure group authentication scheme for Internet of Things
Salman Ali Syed, Selvakumar Manickam, Mueen Uddin, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 2
Salman Ali Syed, Selvakumar Manickam, Mueen Uddin, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 2
Methodology for Developing an IoT-based Parking Space Counter System using XNO
Sujanavan Tiruvayipati, Y. Ramadevi, Vikram Narayandas, et al.
Scalable Computing Practice and Experience (2024) Vol. 25, Iss. 2, pp. 800-811
Open Access | Times Cited: 1
Sujanavan Tiruvayipati, Y. Ramadevi, Vikram Narayandas, et al.
Scalable Computing Practice and Experience (2024) Vol. 25, Iss. 2, pp. 800-811
Open Access | Times Cited: 1
A study of blockchain-based liquidity cross-chain model
Yutong Han, Chundong Wang, H. Wang, et al.
PLoS ONE (2024) Vol. 19, Iss. 6, pp. e0302145-e0302145
Open Access | Times Cited: 1
Yutong Han, Chundong Wang, H. Wang, et al.
PLoS ONE (2024) Vol. 19, Iss. 6, pp. e0302145-e0302145
Open Access | Times Cited: 1
Optimizing Agricultural Risk Management with Hybrid Block-Chain and Fog Computing Architectures for Secure and Efficient Data Handling
Javaid Ahmad Malik, Aamir Hussain, Habib Shah, et al.
Studies in computational intelligence (2024), pp. 309-337
Closed Access | Times Cited: 1
Javaid Ahmad Malik, Aamir Hussain, Habib Shah, et al.
Studies in computational intelligence (2024), pp. 309-337
Closed Access | Times Cited: 1
Enhancing Security in Wireless Communications Through Blockchain and Smart Contracts: A Comprehensive Study
Vaibhav Pratap Singh, Siddhartha Sankar Biswas, Safdar Tanweer, et al.
Lecture notes in networks and systems (2024), pp. 25-36
Closed Access
Vaibhav Pratap Singh, Siddhartha Sankar Biswas, Safdar Tanweer, et al.
Lecture notes in networks and systems (2024), pp. 25-36
Closed Access
Efficient quantum inspired blockchain-based cyber security framework in IoT using deep learning and huristic algorithms
Vimala Josphine C, Theodore Kingslin M, Fatima Vincy R, et al.
Intelligent Decision Technologies (2024) Vol. 18, Iss. 2, pp. 1203-1232
Closed Access
Vimala Josphine C, Theodore Kingslin M, Fatima Vincy R, et al.
Intelligent Decision Technologies (2024) Vol. 18, Iss. 2, pp. 1203-1232
Closed Access
Regulatory mechanism of vulnerability disclosure behavior considering security crowd-testing: An evolutionary game analysis
Liurong Zhao, Xiaoxi Yu, Xinyu Zhou
PLoS ONE (2024) Vol. 19, Iss. 6, pp. e0304467-e0304467
Open Access
Liurong Zhao, Xiaoxi Yu, Xinyu Zhou
PLoS ONE (2024) Vol. 19, Iss. 6, pp. e0304467-e0304467
Open Access
PA Fuzzy-noise Removal in Wireless Sensors Networks
B. Harish Goud, Anitha Raju
Scalable Computing Practice and Experience (2024) Vol. 25, Iss. 5, pp. 3925-3933
Open Access
B. Harish Goud, Anitha Raju
Scalable Computing Practice and Experience (2024) Vol. 25, Iss. 5, pp. 3925-3933
Open Access
Multi-Cloud Environments With Quantum Cloud Computing for Secure Data Transfer using Two-Tier Homomorphic Encryption
Manish Chhabra, E. Rajesh
(2024), pp. 663-670
Closed Access
Manish Chhabra, E. Rajesh
(2024), pp. 663-670
Closed Access