OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A differential game approach for real-time security defense decision in scale-free networks
Hengwei Zhang, Yan Mi, Xiaohu Liu, et al.
Computer Networks (2023) Vol. 224, pp. 109635-109635
Closed Access | Times Cited: 38

Showing 26-50 of 38 citing articles:

Isolating Centrality-Based Generalization of Traditional Centralities to Discover Vital Nodes in Complex Networks
Buran Basha Mohammad, Sateeshkrishna Dhuli, Murali Krishna Enduri
Arabian Journal for Science and Engineering (2024)
Closed Access | Times Cited: 1

Designing an ultra-efficient Hamming code generator circuit for a secure nano-telecommunication network
Hongbo Xie, Yincheng Qi, Farah Qasim Ahmed Alyousuf
Microprocessors and Microsystems (2023) Vol. 103, pp. 104961-104961
Closed Access | Times Cited: 3

Edge Computing with Fog-cloud for Heart Data Processing using Particle Swarm Optimized Deep Learning Technique
Sheng Chai, Lantian Guo
Journal of Grid Computing (2023) Vol. 22, Iss. 1
Closed Access | Times Cited: 3

Point Sampling Net: Revolutionizing Instance Segmentation in Point Cloud Data
Nandhagopal Gomathi, K. Rajathi, Miroslav Mahdal, et al.
IEEE Access (2023) Vol. 11, pp. 128875-128885
Open Access | Times Cited: 2

A novel generative adversarial network‐based super‐resolution approach for face recognition
Amit Chougule, Shreyas Kolte, Vinay Chamola, et al.
Expert Systems (2024) Vol. 41, Iss. 8
Closed Access

Enhancing IoT security in MANETs: A novel adaptive defense reinforcement approach
S. Saravanan, V. Surya, V. Valarmathi, et al.
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 4, pp. 2282-2297
Closed Access

Detecting the penetration of malicious behavior in big data using hybrid algorithms
Yue Wang, Yan Shi
Signal Image and Video Processing (2024) Vol. 18, Iss. S1, pp. 919-933
Closed Access

Wormhole attack detection and mitigation model for Internet of Things and WSN using machine learning
Asma Hassan Alshehri
PeerJ Computer Science (2024) Vol. 10, pp. e2257-e2257
Open Access

Hybrid ELECTRE and bipolar fuzzy PROMOTHEE‐based packet dropping malicious node mitigation technique for improving QoS in WSNs
S. Madhavi, RVS Praveen, S. Jagatheswari, et al.
International Journal of Communication Systems (2024)
Closed Access

Attack and Defense Game with Intuitionistic Fuzzy Payoffs in Infrastructure Networks
Yibo Dong, Jin Liu, Jiaqi Ren, et al.
Tsinghua Science & Technology (2024) Vol. 30, Iss. 1, pp. 384-401
Closed Access

Empowering Real-Time Data Optimizing Framework Using Artificial Intelligence of Things for Sustainable Computing
Khalid Haseeb, Amjad Rehman, Tanzila Saba, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 24, pp. 39094-39102
Closed Access

A probabilistic automata-based network attack-defense game model for data security by using security service chain
Hao Jan Liu, Chong Wang, Zhonghai Wu
World Wide Web (2024) Vol. 28, Iss. 1
Closed Access

How can a hybrid quantum-inspired gravitational search algorithm decrease energy consumption in IoT-based software-defined networks?
Lian Tong, Lan Yang, Xin Zhao, et al.
Sustainable Computing Informatics and Systems (2023) Vol. 40, pp. 100920-100920
Closed Access | Times Cited: 1

Previous Page - Page 2

Scroll to top