OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques
Manju Khari, Aditya Garg, Amir H. Gandomi, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2019) Vol. 50, Iss. 1, pp. 73-80
Closed Access | Times Cited: 135

Showing 26-50 of 135 citing articles:

Lightweight Secure Message Delivery for E2E S2S Communication in the IoT-Cloud System
Mustafa A. Al Sibahee, Songfeng Lu, Zaid Ameen Abduljabbar, et al.
IEEE Access (2020) Vol. 8, pp. 218331-218347
Open Access | Times Cited: 28

Cooperative and feedback based authentic routing protocol for energy efficient IoT systems
A. Gayathri, A. V. Prabu, S. Rajasoundaran, et al.
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 11
Closed Access | Times Cited: 18

Data transmission using secure hybrid techniques for smart energy metering devices
Gudapati Ramyasri, G. Ramana Murthy, Srikanth Itapu, et al.
e-Prime - Advances in Electrical Engineering Electronics and Energy (2023) Vol. 4, pp. 100134-100134
Open Access | Times Cited: 10

Achieving Secured Medical Network (SMN) through Stateless Mechanism and SkeyM in Medical-Internet of Things (M-IoT)
S. Nithya, Satheeshkumar Palanisamy, T. Nivethitha
Journal of Engineering and Applied Science (2024) Vol. 71, Iss. 1
Open Access | Times Cited: 3

IOT Based Fault Detection of Underground Cables through Node MCU Module
Laxmi Goswami, Manish Kumar Kaushik, Rishi Sikka, et al.
2020 International Conference on Computer Science, Engineering and Applications (ICCSEA) (2020), pp. 1-6
Closed Access | Times Cited: 27

A Novel Multiobjective GDWCN-PSO Algorithm and Its Application to Medical Data Security
Vandana Bharti, Bhaskar Biswas, K.K. Shukla
ACM Transactions on Internet Technology (2020) Vol. 21, Iss. 2, pp. 1-28
Closed Access | Times Cited: 25

A Novel Hardware Architecture for Enhancing the Keccak Hash Function in FPGA Devices
Argyrios Sideris, Theodora Sanida, Minas Dasygenis
Information (2023) Vol. 14, Iss. 9, pp. 475-475
Open Access | Times Cited: 9

Image steganography based on LSB substitution and encryption method: adaptive LSB+3
Serdar Solak, Umut Altınışık
Journal of Electronic Imaging (2019) Vol. 28, Iss. 04, pp. 1-1
Closed Access | Times Cited: 25

IOT based Diagnosing of Fault Detection in Power Line Transmission through GOOGLE Firebase database
Lakshmi Goswami, Piyush Agrawal
2022 6th International Conference on Trends in Electronics and Informatics (ICOEI) (2020), pp. 415-420
Closed Access | Times Cited: 21

Steganography and Steganalysis in Voice over IP: A Review
Zhijun Wu, Junjun Guo, Chenlei Zhang, et al.
Sensors (2021) Vol. 21, Iss. 4, pp. 1032-1032
Open Access | Times Cited: 20

Security and Information Assurance for IoT-Based Big Data
Moses Kazeem Abiodun, Joseph Bamidele Awotunde, Roseline Oluwaseun Ogundokun, et al.
Studies in computational intelligence (2021), pp. 189-211
Closed Access | Times Cited: 19

IoT based Secure Smart Home Automation System
A. P. Nirmala, V Asha, Paramita Chandra, et al.
2022 IEEE Delhi Section Conference (DELCON) (2022), pp. 1-7
Closed Access | Times Cited: 14

A Robust Bio-Signal Steganography With Lost-Data Recovery Architecture Using Deep Learning
Soumyendu Banerjee, Girish Kumar Singh
IEEE Transactions on Instrumentation and Measurement (2022) Vol. 71, pp. 1-10
Closed Access | Times Cited: 13

GA-DCTSP: An Intelligent Active Data Processing Scheme for UAV-Enabled Edge Computing
Bai Jing, Guosheng Huang, Shaobo Zhang, et al.
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 6, pp. 4891-4906
Closed Access | Times Cited: 13

Image data hiding schemes based on metaheuristic optimization: a review
Anna Melman, Oleg Evsutin
Artificial Intelligence Review (2023) Vol. 56, Iss. 12, pp. 15375-15447
Closed Access | Times Cited: 7

Secure Patient Data Transfer Using Information Embedding and Hyperchaos
Hanan Aljuaid, Shabir A. Parah
Sensors (2021) Vol. 21, Iss. 1, pp. 282-282
Open Access | Times Cited: 17

RadarVerses in Metaverses: A CPSI-Based Architecture for 6S Radar Systems in CPSS
Yuhang Liu, Yu Shen, Yonglin Tian, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2022) Vol. 53, Iss. 4, pp. 2128-2137
Open Access | Times Cited: 12

A secure video data streaming model using modified firefly and SVD technique
K. Muthulakshmi, K. Valarmathi
Multimedia Systems (2024) Vol. 30, Iss. 2
Closed Access | Times Cited: 2

High Payload Image Steganography Using DNN Classification and Adaptive Difference Expansion
Shreela Dash, Dayal Kumar Behera, Subhra Swetanisha, et al.
Wireless Personal Communications (2024) Vol. 134, Iss. 3, pp. 1349-1366
Open Access | Times Cited: 2

Lightweight public key infrastructure for the Internet of Things: A systematic literature review
Mohammed El‐Hajj, Pim Beune
Journal of Industrial Information Integration (2024) Vol. 41, pp. 100670-100670
Open Access | Times Cited: 2

IoTSLE: Securing IoT systems in low-light environments through finite automata, deep learning and DNA computing based image steganographic model
Subhadip Mukherjee, Somnath Mukhopadhyay, Sunita Sarkar
Internet of Things (2024) Vol. 28, pp. 101358-101358
Closed Access | Times Cited: 2

Three-Tier approach to fortifying secure communication in Internet of vehicles networks
N. Karthikeyan, Sukhvinder Singh Dari
Ain Shams Engineering Journal (2024), pp. 103087-103087
Open Access | Times Cited: 2

Ensuring Cryptography Chips Security by Preventing Scan-Based Side-Channel Attacks With Improved DFT Architecture
Weizheng Wang, Xiangqi Wang, Jin Wang, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2020) Vol. 52, Iss. 3, pp. 2009-2023
Closed Access | Times Cited: 15

Intelligent Resource Allocation in Industrial IoT using Reinforcement Learning with Hybrid Meta-Heuristic Algorithm
K. Udayakumar, S. Ramamoorthy
Cybernetics & Systems (2022) Vol. 54, Iss. 8, pp. 1241-1266
Closed Access | Times Cited: 9

Scroll to top