OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Investigation on vulnerabilities, threats and attacks prohibiting UAVs charging and depleting UAVs batteries: Assessments & countermeasures
Fadhila Tlili, Lamia Chaari Fourati, Samiha Ayed, et al.
Ad Hoc Networks (2022) Vol. 129, pp. 102805-102805
Open Access | Times Cited: 40

Showing 1-25 of 40 citing articles:

A Comprehensive Review of Micro UAV Charging Techniques
Syed Agha Hassnain Mohsan, Nawaf Qasem Hamood Othman, Muhammad Asghar Khan, et al.
Micromachines (2022) Vol. 13, Iss. 6, pp. 977-977
Open Access | Times Cited: 84

A comprehensive survey on security, privacy issues and emerging defence technologies for UAVs
Hassan Jalil Hadi, Yue Cao, Khaleeq Un Nisa, et al.
Journal of Network and Computer Applications (2023) Vol. 213, pp. 103607-103607
Closed Access | Times Cited: 78

Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey
Abiodun Esther Omolara, Moatsum Alawida, Abiodun Esther Omolara
Neural Computing and Applications (2023) Vol. 35, Iss. 31, pp. 23063-23101
Closed Access | Times Cited: 35

A holistic review of the current state of research on aircraft design concepts and consideration for advanced air mobility applications
Lukas Kiesewetter, Kazi Hassan Shakib, Paramvir Singh, et al.
Progress in Aerospace Sciences (2023) Vol. 142, pp. 100949-100949
Closed Access | Times Cited: 30

Exhaustive distributed intrusion detection system for UAVs attacks detection and security enforcement (E-DIDS)
Fadhila Tlili, Samiha Ayed, Lamia Chaari Fourati
Computers & Security (2024) Vol. 142, pp. 103878-103878
Closed Access | Times Cited: 12

Advancing UAV security with artificial intelligence: A comprehensive survey of techniques and future directions
Fadhila Tlili, Samiha Ayed, Lamia Chaari Fourati
Internet of Things (2024) Vol. 27, pp. 101281-101281
Closed Access | Times Cited: 11

Magnesium–Air Batteries: Manufacturing, Processing, Performance, and Applications
Subin Antony Jose, E. Doering, N. Klein, et al.
Processes (2025) Vol. 13, Iss. 3, pp. 607-607
Open Access | Times Cited: 1

A novel fuzzy trust-based secure routing scheme in flying ad hoc networks
Mehdi Hosseinzadeh, Adil Hussein Mohammed, Farhan A. Alenizi, et al.
Vehicular Communications (2023) Vol. 44, pp. 100665-100665
Closed Access | Times Cited: 18

A Comprehensive Review of Research Hotspots on Battery Management Systems for UAVs
S Jiao, Guiyang Zhang, Mei Zhou, et al.
IEEE Access (2023) Vol. 11, pp. 84636-84650
Open Access | Times Cited: 15

A Bio-inspired Leader-Based Energy Management System for Drone Fleets
R. M. A. Napoli, Antonio Celesti, Massimo Villari, et al.
Lecture notes in computer science (2025), pp. 57-64
Closed Access

Enhancing security of mobile crowd sensing in unmanned aerial vehicle ecosystems
Sara Sumaidaa, Hamda Almenhali, Mohammed Alazzani, et al.
Frontiers in Communications and Networks (2025) Vol. 6
Open Access

Machine Learning Models for Drone Security: Cognitive Versus Cyber Intelligence for Safety Operations
Simeon Okechukwu Ajakwe, Christianah Amaka Okoloegbo, Jae‐Min Lee, et al.
Advances in Science, Technology & Innovation/Advances in science, technology & innovation (2025), pp. 121-139
Closed Access

A Study of the Data Security Attack and Defense Pattern in a Centralized UAV–Cloud Architecture
Gregorius Airlangga, Alan Liu
Drones (2023) Vol. 7, Iss. 5, pp. 289-289
Open Access | Times Cited: 9

Securing UAV Flying Base Station for Mobile Networking: A Review
Sang‐Yoon Chang, Kyungmin Park, Jonghyun Kim, et al.
Future Internet (2023) Vol. 15, Iss. 5, pp. 176-176
Open Access | Times Cited: 9

Fuzzy based trusted malicious unmanned aerial vehicle detection using in flying ad-hoc network
Joydeep Kundu, Sahabul Alam, Arindam Dey
Alexandria Engineering Journal (2024) Vol. 99, pp. 232-241
Open Access | Times Cited: 3

A novel Q-learning-based secure routing scheme with a robust defensive system against wormhole attacks in flying ad hoc networks
Mehdi Hosseinzadeh, Saqib Ali, Husham Jawad Ahmad, et al.
Vehicular Communications (2024) Vol. 49, pp. 100826-100826
Closed Access | Times Cited: 3

A survey on security of UAV and deep reinforcement learning
B. Sarikaya, Şerif Bahtıyar
Ad Hoc Networks (2024) Vol. 164, pp. 103642-103642
Closed Access | Times Cited: 3

A Comprehensive Review of Energy-Efficient Techniques for UAV-Assisted Industrial Wireless Networks
Yijia Zhang, Ruotong Zhao, Deepak Mishra, et al.
Energies (2024) Vol. 17, Iss. 18, pp. 4737-4737
Open Access | Times Cited: 3

Simulation tools, environments and frameworks for UAVs and multi-UAV-based systems performance analysis (version 2.0)
Aicha Idriss Hentati, Lamia Chaari Fourati, Essia Elgharbi, et al.
International Journal of Modelling and Simulation (2022) Vol. 43, Iss. 4, pp. 474-490
Closed Access | Times Cited: 13

A New Hybrid Adaptive Deep Learning-Based Framework for UAVs Faults and Attacks Detection
Fadhila Tlili, Samiha Ayed, Lamia Chaari Fourati
IEEE Transactions on Services Computing (2023) Vol. 16, Iss. 6, pp. 4128-4139
Closed Access | Times Cited: 7

Power Supply Technologies for Drones and Machine Vision Applications: A Comparative Analysis and Future Trends
Antonios Pekias, George S. Maraslidis, Markos G. Tsipouras, et al.
Telecom (2023) Vol. 4, Iss. 3, pp. 459-476
Open Access | Times Cited: 6

Dynamic Intrusion Detection Framework for UAVCAN Protocol Using AI
Fadhila Tlili, Samiha Ayed, Lamia Chaari Fourati
Proceedings of the 17th International Conference on Availability, Reliability and Security (2023), pp. 1-10
Closed Access | Times Cited: 6

Securing UAV Networks: A Lightweight Chaotic-Frequency Hopping Approach to Counter Jamming Attacks
C. Atheeq, Zameer Gulzar, Mana Saleh Al Reshan, et al.
IEEE Access (2024) Vol. 12, pp. 38685-38699
Open Access | Times Cited: 2

Trust-Based Flying Ad Hoc Network: A Survey
Joydeep Kundu, Sahabul Alam, Jadav Chandra Das, et al.
IEEE Access (2024) Vol. 12, pp. 99258-99281
Open Access | Times Cited: 2

Physical layer aspects of terahertz-enabled UAV communications: Challenges and opportunities
Oluwatosin Ahmed Amodu, Sherif Adeshina Busari, Mohamed Othman
Vehicular Communications (2022) Vol. 38, pp. 100540-100540
Closed Access | Times Cited: 10

Page 1 - Next Page

Scroll to top