OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Security in IoT Mesh Networks Based on Trust Similarity
Kavitha Athota, Vijender Busi Reddy, Ninni Singh, et al.
IEEE Access (2022) Vol. 10, pp. 121712-121724
Open Access | Times Cited: 27

Showing 1-25 of 27 citing articles:

Preserving Privacy of Classified Authentic Satellite Lane Imagery Using Proxy Re-Encryption and UAV Technologies
Yarajarla Nagasree, Ch. Rupa, Ponugumati Akshitha, et al.
Drones (2023) Vol. 7, Iss. 1, pp. 53-53
Open Access | Times Cited: 23

A holistic and proactive approach to forecasting cyber threats
Zaid Almahmoud, Paul D. Yoo, Omar Alhussein, et al.
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 18

A Survey on IoT-Edge-Cloud Continuum Systems: Status, Challenges, Use Cases, and Open Issues
Panagiotis K. Gkonis, Anastasios Giannopoulos, Panagiotis Trakadas, et al.
Future Internet (2023) Vol. 15, Iss. 12, pp. 383-383
Open Access | Times Cited: 15

Securing Smart Healthcare Cyber-Physical Systems against Blackhole and Greyhole Attacks Using a Blockchain-Enabled Gini Index Framework
Mannan Javed, Noshina Tariq, Muhammad Imran Ashraf, et al.
Sensors (2023) Vol. 23, Iss. 23, pp. 9372-9372
Open Access | Times Cited: 12

Machine learning-based co-resident attack detection for 5G clouded environments
Mingzhou Jin, Hongbo Tang, Hang Qiu, et al.
Computer Networks (2025) Vol. 258, pp. 111032-111032
Closed Access

Horizontal IoT Platform EMULSION
Иван Ганчев, Zhanlin Ji, Máirtín O’Droma
Electronics (2023) Vol. 12, Iss. 8, pp. 1864-1864
Open Access | Times Cited: 9

Verifying trust over IoT-ad hoc network-based applications under uncertainty
Narges Baharloo, Jamal Bentahar, Ghalya Alwhishi, et al.
Ad Hoc Networks (2023) Vol. 154, pp. 103380-103380
Closed Access | Times Cited: 5

Improved Neural Differential Distinguisher Model for Lightweight Cipher Speck
Xiaoteng Yue, Wanqing Wu
Applied Sciences (2023) Vol. 13, Iss. 12, pp. 6994-6994
Open Access | Times Cited: 3

A Model-Free-Based Control Method for Robot Manipulators: Achieving Prescribed Performance and Ensuring Fixed Time Stability
Anh Tuan Vo, Thanh Nguyen Truong, Hee‐Jun Kang
Applied Sciences (2023) Vol. 13, Iss. 15, pp. 8939-8939
Open Access | Times Cited: 3

Experimental Evaluation of A Lightweight RSS-Based PLA Scheme in Multi-Node Multi-Cell Mesh Networks
Hossien B. Eldeeb, Anshul Pandey, Martin Andreoni Lopez, et al.
(2023), pp. 393-398
Closed Access | Times Cited: 2

Study of Secure Data Transmission-Based Wavelets Using Steganography and Cryptography Techniques
K. Ravindra Reddy, P. Vijayalakshmi
Studies in computational intelligence (2024), pp. 215-227
Closed Access

Implementation of Improved High Speed SHA-256 Algorithm from RTL to GDSII Using Verilog HDL
B. Srikanth, J. V. R. Ravindra, G. A. E. Satish Kumar, et al.
Studies in computational intelligence (2024), pp. 1-17
Closed Access

Design of Optimal Waste Management System Using IOT and Machine Learning Technique in Educational Institutions
L. Sivayamini, C. Venkatesh, Fahimuddin Shaik
Studies in computational intelligence (2024), pp. 33-40
Closed Access

Performance Evaluation of GA, HS, PSO Algorithms for Optimizing Area, Wirelength Using MCNC Architectures
Shaik Karimullah, D. Vishnuvardhan, Vinit Kumar Gunjan, et al.
Studies in computational intelligence (2024), pp. 53-70
Closed Access

Imge Enhancement with Rope Method
M. Ravi Kishore, M. Niharika, M. Sai Jyosthna, et al.
Lecture notes in electrical engineering (2024), pp. 647-655
Closed Access

Network Master Node Assessed Trust Factor with Arbitrary Neighbor Assessment for Secure Route Detection in 6G Enabled Wireless Sensor Networks
Pavan Vamsi Mohan Movva, Radhika Rani Chintala
International Journal of Safety and Security Engineering (2024) Vol. 14, Iss. 1, pp. 115-123
Open Access

Federated Learning in Mesh Networks
Xu Wang, Yuanzhu Chen, Octavia A. Dobre
(2024), pp. 185-226
Closed Access

Security Model to Mitigate Black Hole Attack on Internet of Battlefield Things (IoBT) Using Trust and K-Means Clustering Algorithm
P. Rutravigneshwaran, G. Anitha
International Journal of Computer Networks And Applications (2023) Vol. 10, Iss. 1, pp. 95-95
Open Access | Times Cited: 1

Differentially Private Social Graph Publishing With Nearest Neighbor Structure Preservation
Xinjian Zhao, Fei Xia, Guoquan Yuan, et al.
IEEE Access (2023) Vol. 11, pp. 75859-75874
Open Access | Times Cited: 1

Post-Quantum Group Key Management in IoTs
Fouzia Samiullah, Ming-Lee Gan, Sedat Akleylek, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 1

Threshold-Based Software-Defined Networking (SDN) Solution for Healthcare Systems against Intrusion Attacks
Laila M. Halman, Mohammed J. F. Alenazi
Computer Modeling in Engineering & Sciences (2023) Vol. 138, Iss. 2, pp. 1469-1483
Open Access

Energy Efficient Data Aggregation Approach for Sensor Network using Trust Mechanism
Ayush Sharma, Sunny Arora
International Journal of Recent Technology and Engineering (IJRTE) (2023) Vol. 12, Iss. 2, pp. 84-90
Open Access

A novel approach to minimize the Black Hole attacks in Vehicular IoT Networks
Abdur Rashid Sangi, Lokeshwari Anamalamudi, Satish Anamalamudi, et al.
(2023), pp. 851-857
Closed Access

A Dynamic Trust-Based Access Control for Multi-domain Cloud Systems
Fan Mei, Zhongguo Yang
Lecture notes in electrical engineering (2023), pp. 733-741
Closed Access

Page 1 - Next Page

Scroll to top