OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Sybil attack detection scheme for a forest wildfire monitoring application
Mian Ahmad Jan, Priyadarsi Nanda, Xiangjian He, et al.
Future Generation Computer Systems (2016) Vol. 80, pp. 613-626
Open Access | Times Cited: 112

Showing 1-25 of 112 citing articles:

SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things
David Airehrour, Jairo Gutiérrez, Sayan Kumar Ray
Future Generation Computer Systems (2018) Vol. 93, pp. 860-876
Closed Access | Times Cited: 278

Multi-hazard disaster studies: Monitoring, detection, recovery, and management, based on emerging technologies and optimal techniques
Amina Khan, Sumeet Gupta, Sachin Kumar Gupta
International Journal of Disaster Risk Reduction (2020) Vol. 47, pp. 101642-101642
Closed Access | Times Cited: 240

Online social networks security and privacy: comprehensive review and analysis
Ankit Kumar Jain, Somya Ranjan Sahoo, Jyoti Kaubiyal
Complex & Intelligent Systems (2021) Vol. 7, Iss. 5, pp. 2157-2177
Open Access | Times Cited: 174

Detecting Malicious Nodes in IoT Networks Using Machine Learning and Artificial Neural Networks
Kazi Kutubuddin Sayyad Liyakat
2021 International Conference on Emerging Smart Computing and Informatics (ESCI) (2023), pp. 1-5
Closed Access | Times Cited: 45

A Comprehensive Survey on Real-Time Applications of WSN
Ahmad Ali, Ming Yu, Sagnik Chakraborty, et al.
Future Internet (2017) Vol. 9, Iss. 4, pp. 77-77
Open Access | Times Cited: 150

A Comprehensive Review on Secure Routing in Internet of Things: Mitigation Methods and Trust-Based Approaches
Syeda Mariam Muzammal, Raja Kumar Murugesan, N. Z. Jhanjhi
IEEE Internet of Things Journal (2020) Vol. 8, Iss. 6, pp. 4186-4210
Closed Access | Times Cited: 134

Attacks on Self-Driving Cars and Their Countermeasures: A Survey
Abdullahi Chowdhury, Gour Karmakar, Joarder Kamruzzaman, et al.
IEEE Access (2020) Vol. 8, pp. 207308-207342
Open Access | Times Cited: 113

An Effective Forest Fire Detection Framework Using Heterogeneous Wireless Multimedia Sensor Networks
Burak Kizilkaya, Enver Ever, Hakan Yekta Yatbaz, et al.
ACM Transactions on Multimedia Computing Communications and Applications (2022) Vol. 18, Iss. 2, pp. 1-21
Open Access | Times Cited: 58

Machine Learning Approach Using Artificial Neural Networks to Detect Malicious Nodes in IoT Networks
Kazi Kutubuddin Sayyad Liyakat
Lecture notes in networks and systems (2023), pp. 123-134
Closed Access | Times Cited: 43

Machine Learning Approach Using Artificial Neural Networks to Detect Malicious Nodes in IoT Networks
Kazi Kutubuddin Sayyad Liyakat
Algorithms for intelligent systems (2023), pp. 27-37
Closed Access | Times Cited: 42

PAWN: a payload‐based mutual authentication scheme for wireless sensor networks
Mian Ahmad Jan, Priyadarsi Nanda, Muhammad Usman, et al.
Concurrency and Computation Practice and Experience (2016) Vol. 29, Iss. 17
Open Access | Times Cited: 83

Rendezvous based routing protocol for wireless sensor networks with mobile sink
Suraj Sharma, Deepak Puthal, Sanjay Kumar Jena, et al.
The Journal of Supercomputing (2016) Vol. 73, Iss. 3, pp. 1168-1188
Closed Access | Times Cited: 76

Energy-Aware Mobile Edge Computing and Routing for Low-Latency Visual Data Processing
Huy Trinh, Prasad Calyam, Dmitrii Chemodanov, et al.
IEEE Transactions on Multimedia (2018) Vol. 20, Iss. 10, pp. 2562-2577
Open Access | Times Cited: 67

A Secured and Intelligent Communication Scheme for IIoT-enabled Pervasive Edge Computing
Fazlullah Khan, Mian Ahmad Jan, Ateeq Ur Rehman, et al.
IEEE Transactions on Industrial Informatics (2020) Vol. 17, Iss. 7, pp. 5128-5137
Open Access | Times Cited: 60

The Acceptance of Using Information Technology for Disaster Risk Management: A Systematic Review
Kunruthai Meechang, Natt Leelawat, Jing Tang, et al.
Engineering Journal (2020) Vol. 24, Iss. 4, pp. 111-132
Open Access | Times Cited: 54

Fire Hazards: Socio-economic and Regional Issues
Jesús Rodrigo‐Comino, Luca Salvati, Artemi Cerdà, et al.
Springer eBooks (2024)
Closed Access | Times Cited: 7

A Comprehensive Trust-Aware Routing Protocol With Multi-Attributes for WSNs
Boyuan Sun, Donghui Li
IEEE Access (2017) Vol. 6, pp. 4725-4741
Open Access | Times Cited: 55

SAMS: A Seamless and Authorized Multimedia Streaming Framework for WMSN-Based IoMT
Mian Ahmad Jan, Muhammad Usman, Xiangjian He, et al.
IEEE Internet of Things Journal (2018) Vol. 6, Iss. 2, pp. 1576-1583
Open Access | Times Cited: 53

A multi-level study of information trust models in WSN-assisted IoT
Ilhem Souissi, Nadia Ben Azzouna, Lamjed Ben Saïd
Computer Networks (2019) Vol. 151, pp. 12-30
Closed Access | Times Cited: 50

Real-time detection of wildfire risk caused by powerline vegetation faults using advanced machine learning techniques
Jun Ma, Jack C.P. Cheng, Feifeng Jiang, et al.
Advanced Engineering Informatics (2020) Vol. 44, pp. 101070-101070
Closed Access | Times Cited: 47

Lightweight Sybil Attack Detection in IoT based on Bloom Filter and Physical Unclonable Function
Cong Pu, Kim–Kwang Raymond Choo
Computers & Security (2021) Vol. 113, pp. 102541-102541
Closed Access | Times Cited: 41

SMEER: Secure Multi-tier Energy Efficient Routing Protocol for Hierarchical Wireless Sensor Networks
Geetika Dhand, S. S. Tyagi
Wireless Personal Communications (2018) Vol. 105, Iss. 1, pp. 17-35
Closed Access | Times Cited: 46

A trust computed framework for IoT devices and fog computing environment
Geetanjali Rathee, Rajinder Sandhu, Hemraj Saini, et al.
Wireless Networks (2019) Vol. 26, Iss. 4, pp. 2339-2351
Closed Access | Times Cited: 43

Identity attack detection system for 802.11-based ad hoc networks
Mohammad Faisal, Sohail Abbas, Haseeb Ur Rahman
EURASIP Journal on Wireless Communications and Networking (2018) Vol. 2018, Iss. 1
Open Access | Times Cited: 38

A Mobile Multimedia Data Collection Scheme for Secured Wireless Multimedia Sensor Networks
Muhammad Usman, Mian Ahmad Jan, Xiangjian He, et al.
IEEE Transactions on Network Science and Engineering (2018) Vol. 7, Iss. 1, pp. 274-284
Open Access | Times Cited: 36

Page 1 - Next Page

Scroll to top