
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Challenges and Opportunities for Beyond-5G Wireless Security
Eric Ruzomberka, David J. Love, Christopher G. Brinton, et al.
IEEE Security & Privacy (2023) Vol. 21, Iss. 5, pp. 55-66
Open Access | Times Cited: 7
Eric Ruzomberka, David J. Love, Christopher G. Brinton, et al.
IEEE Security & Privacy (2023) Vol. 21, Iss. 5, pp. 55-66
Open Access | Times Cited: 7
Showing 7 citing articles:
Cybercrime Resilience in the Era of Advanced Technologies: Evidence from the Financial Sector of a Developing Country
Aishatu Garga Ali, Mahmood Shah, Monika Foster, et al.
Computers (2025) Vol. 14, Iss. 2, pp. 38-38
Open Access | Times Cited: 3
Aishatu Garga Ali, Mahmood Shah, Monika Foster, et al.
Computers (2025) Vol. 14, Iss. 2, pp. 38-38
Open Access | Times Cited: 3
Physical Layer Authentication and Security Design in the Machine Learning Era
Tiep M. Hoang, Alireza Vahid, Hoang Duong Tuan, et al.
IEEE Communications Surveys & Tutorials (2024) Vol. 26, Iss. 3, pp. 1830-1860
Open Access | Times Cited: 5
Tiep M. Hoang, Alireza Vahid, Hoang Duong Tuan, et al.
IEEE Communications Surveys & Tutorials (2024) Vol. 26, Iss. 3, pp. 1830-1860
Open Access | Times Cited: 5
Unveiling the 5G Frontier: Navigating Challenges, Applications, and Measurements in Channel Models and Implementations
Muhammad Shoaib, Ghassan Husnain, Nasir Sayed, et al.
IEEE Access (2024) Vol. 12, pp. 59533-59560
Open Access | Times Cited: 4
Muhammad Shoaib, Ghassan Husnain, Nasir Sayed, et al.
IEEE Access (2024) Vol. 12, pp. 59533-59560
Open Access | Times Cited: 4
Secrecy Gain of Formally Unimodular Lattices From Codes Over the Integers Modulo 4
Maiara F. Bollauf, Hsuan-Yin Lin, Øyvind Ytrehus
IEEE Transactions on Information Theory (2024) Vol. 70, Iss. 5, pp. 3309-3329
Open Access | Times Cited: 1
Maiara F. Bollauf, Hsuan-Yin Lin, Øyvind Ytrehus
IEEE Transactions on Information Theory (2024) Vol. 70, Iss. 5, pp. 3309-3329
Open Access | Times Cited: 1
Deep Learning-Based Radio Frequency Identification of False Base Stations
Jan Bolcek, Jan Kufa, Michal Harvanek, et al.
(2023)
Closed Access | Times Cited: 2
Jan Bolcek, Jan Kufa, Michal Harvanek, et al.
(2023)
Closed Access | Times Cited: 2
Novel optimized implementations for the Piccolo cipher based on field‐programmable gate arrays
Jingya Feng, Yongzhuang Wei, B.W.Y. Wei
International Journal of Circuit Theory and Applications (2024)
Closed Access
Jingya Feng, Yongzhuang Wei, B.W.Y. Wei
International Journal of Circuit Theory and Applications (2024)
Closed Access
Optimization of Error Pattern Embedding Steganography within Error-Correcting Code Frameworks
Yongkyu Jang, Minglong Zhang, Alana Kirchner, et al.
MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM) (2024), pp. 1094-1099
Closed Access
Yongkyu Jang, Minglong Zhang, Alana Kirchner, et al.
MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM) (2024), pp. 1094-1099
Closed Access