
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
B2auth: A contextual fine-grained behavioral biometric authentication framework for real-world deployment
Ahmed Mahfouz, Ahmed Hamdy, Mohamed Alaa Eldin, et al.
Pervasive and Mobile Computing (2024) Vol. 99, pp. 101888-101888
Closed Access | Times Cited: 4
Ahmed Mahfouz, Ahmed Hamdy, Mohamed Alaa Eldin, et al.
Pervasive and Mobile Computing (2024) Vol. 99, pp. 101888-101888
Closed Access | Times Cited: 4
Showing 4 citing articles:
Adaptive human-computer interaction for industry 5.0: A novel concept, with comprehensive review and empirical validation
Rania Hamdani, Inès Chihi
Computers in Industry (2025) Vol. 168, pp. 104268-104268
Open Access
Rania Hamdani, Inès Chihi
Computers in Industry (2025) Vol. 168, pp. 104268-104268
Open Access
M2auth: A multimodal behavioral biometric authentication using feature-level fusion
Ahmed Mahfouz, Hebatollah Mostafa, Tarek M. Mahmoud, et al.
Neural Computing and Applications (2024)
Closed Access | Times Cited: 1
Ahmed Mahfouz, Hebatollah Mostafa, Tarek M. Mahmoud, et al.
Neural Computing and Applications (2024)
Closed Access | Times Cited: 1
Auth4App: Streamlining authentication for integrated cyber–physical environments
Vagner E. Quincozes, Rodrigo B. Mansilha, Diego Kreutz, et al.
Journal of Information Security and Applications (2024) Vol. 83, pp. 103802-103802
Closed Access
Vagner E. Quincozes, Rodrigo B. Mansilha, Diego Kreutz, et al.
Journal of Information Security and Applications (2024) Vol. 83, pp. 103802-103802
Closed Access
User Authentication in the IoT and IIoT Environment
Ahmed Mahfouz
Advances in information security, privacy, and ethics book series (2024), pp. 169-194
Closed Access
Ahmed Mahfouz
Advances in information security, privacy, and ethics book series (2024), pp. 169-194
Closed Access