
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
New directions for security attacks, privacy, and malware detection in WBAN
Mukesh Soni, Dileep Kumar Singh
Evolutionary Intelligence (2022) Vol. 16, Iss. 6, pp. 1917-1934
Closed Access | Times Cited: 12
Mukesh Soni, Dileep Kumar Singh
Evolutionary Intelligence (2022) Vol. 16, Iss. 6, pp. 1917-1934
Closed Access | Times Cited: 12
Showing 12 citing articles:
Securing Wireless Body Area Networks data transmission with machine learning: A cross-tier framework for anomaly detection and intrusion prevention
Md. Motaharul Islam, Md. Shamshuzzoha
Deleted Journal (2025), pp. 100031-100031
Open Access
Md. Motaharul Islam, Md. Shamshuzzoha
Deleted Journal (2025), pp. 100031-100031
Open Access
Mining Intelligence Hierarchical Feature for Malware Detection
Sandeep Kumar Davuluri, Mukesh Soni, Ghayth AlMahadin, et al.
Lecture notes in networks and systems (2025), pp. 221-236
Closed Access
Sandeep Kumar Davuluri, Mukesh Soni, Ghayth AlMahadin, et al.
Lecture notes in networks and systems (2025), pp. 221-236
Closed Access
Mapping Cyber Attacks on the Internet of Medical Things: A Taxonomic Review
Venkatesh Kondeti, Hayretdin Bahşi
(2024), pp. 84-91
Closed Access | Times Cited: 1
Venkatesh Kondeti, Hayretdin Bahşi
(2024), pp. 84-91
Closed Access | Times Cited: 1
A secure data transmission framework for IoT enabled healthcare
Sohail Saif, Priya Das, Suparna Biswas, et al.
Heliyon (2024) Vol. 10, Iss. 16, pp. e36269-e36269
Open Access | Times Cited: 1
Sohail Saif, Priya Das, Suparna Biswas, et al.
Heliyon (2024) Vol. 10, Iss. 16, pp. e36269-e36269
Open Access | Times Cited: 1
Energy-Efficient Framework to Mitigate Denial of Sleep Attacks in Wireless Body Area Networks
Mayyda Mukhtar, Muhammad Hanif Lashari, Musaed Alhussein, et al.
IEEE Access (2024) Vol. 12, pp. 122918-122928
Open Access | Times Cited: 1
Mayyda Mukhtar, Muhammad Hanif Lashari, Musaed Alhussein, et al.
IEEE Access (2024) Vol. 12, pp. 122918-122928
Open Access | Times Cited: 1
Intrusion Detection in Wireless Body Area Network using Attentive with Graphical Bidirectional Long-Short Term Memory
Shaymaa Adnan Abdulrahman, Ehsan Qahtan Ahmed, Zahraa A. Jaaz, et al.
International Journal of Online and Biomedical Engineering (iJOE) (2023) Vol. 19, Iss. 06, pp. 31-46
Open Access | Times Cited: 3
Shaymaa Adnan Abdulrahman, Ehsan Qahtan Ahmed, Zahraa A. Jaaz, et al.
International Journal of Online and Biomedical Engineering (iJOE) (2023) Vol. 19, Iss. 06, pp. 31-46
Open Access | Times Cited: 3
Enhancing Cardiac Arrhythmia Detection in WBAN Sensors Through Supervised Machine Learning and Data Dimensionality Reduction Techniques
Safa Saad Hussein, C. B. M. Rashidi, S. A. Aljunid, et al.
Mathematical Modelling and Engineering Problems (2023) Vol. 10, Iss. 6, pp. 2051-2062
Open Access | Times Cited: 2
Safa Saad Hussein, C. B. M. Rashidi, S. A. Aljunid, et al.
Mathematical Modelling and Engineering Problems (2023) Vol. 10, Iss. 6, pp. 2051-2062
Open Access | Times Cited: 2
Blockchain Based Abstract Syntax Tree to Detect Vulnerability in IOT-Enabled Smart Contract
Amit Mittal, Gunawan Widjaja, Renzon Daniel Cosme Pecho, et al.
(2023), pp. 270-275
Closed Access | Times Cited: 2
Amit Mittal, Gunawan Widjaja, Renzon Daniel Cosme Pecho, et al.
(2023), pp. 270-275
Closed Access | Times Cited: 2
Authentication Healthcare Scheme in WBAN
Abdullah Mohammed Rashid, Ali A. Yassin, Abdulla J. Y. Aldarwish, et al.
Iraqi Journal for Electrical And Electronic Engineering (2023) Vol. 19, Iss. 2, pp. 118-127
Open Access | Times Cited: 1
Abdullah Mohammed Rashid, Ali A. Yassin, Abdulla J. Y. Aldarwish, et al.
Iraqi Journal for Electrical And Electronic Engineering (2023) Vol. 19, Iss. 2, pp. 118-127
Open Access | Times Cited: 1
Detection of Cyber – Attacks in Digital Power System Using Ensemble Bagged Trees
Tarun Sai Damarla, Anamika Yadav
(2023), pp. 1-6
Closed Access
Tarun Sai Damarla, Anamika Yadav
(2023), pp. 1-6
Closed Access
Efficient Secure Routing Strategy for the Internet of things Data Transactions
Gunawan Widjaja
(2023), pp. 503-509
Closed Access
Gunawan Widjaja
(2023), pp. 503-509
Closed Access
Lightweight Anonymous Key Sharing Authentication Protocol for Resource-Constrained IoT Devices
Gunawan Widjaja
(2023), pp. 497-502
Closed Access
Gunawan Widjaja
(2023), pp. 497-502
Closed Access