OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

New enhanced authentication protocol for Internet of Things
Mourade Azrour, Jamal Mabrouki, Azedine Guezzaz, et al.
Big Data Mining and Analytics (2021) Vol. 4, Iss. 1, pp. 1-9
Open Access | Times Cited: 107

Showing 1-25 of 107 citing articles:

Security and Privacy in Metaverse: A Comprehensive Survey
Yan Huang, Yi Joy Li, Zhipeng Cai
Big Data Mining and Analytics (2023) Vol. 6, Iss. 2, pp. 234-247
Open Access | Times Cited: 164

Artificial intelligence for edge service optimization in Internet of Vehicles: A survey
Xiaolong Xu, Haoyuan Li, Weijie Xu, et al.
Tsinghua Science & Technology (2021) Vol. 27, Iss. 2, pp. 270-287
Open Access | Times Cited: 159

Task offloading strategy with emergency handling and blockchain security in SDN-empowered and fog-assisted healthcare IoT
Junyu Ren, Jinze Li, Huaxing Liu, et al.
Tsinghua Science & Technology (2021) Vol. 27, Iss. 4, pp. 760-776
Open Access | Times Cited: 133

A blockchain and IoT-based lightweight framework for enabling information transparency in supply chain finance
Lingling Guo, Jingjing Chen, Shihan Li, et al.
Digital Communications and Networks (2022) Vol. 8, Iss. 4, pp. 576-587
Open Access | Times Cited: 72

An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection
Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, et al.
Multimedia Tools and Applications (2023) Vol. 82, Iss. 15, pp. 23615-23633
Closed Access | Times Cited: 68

An Ensemble Learning Based Intrusion Detection Model for Industrial IoT Security
Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, et al.
Big Data Mining and Analytics (2023) Vol. 6, Iss. 3, pp. 273-287
Open Access | Times Cited: 49

ECC-based three-factor authentication and key agreement scheme for wireless sensor networks
Wenfeng Huang
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 18

Internet of Things Security: Challenges and Key Issues
Mourade Azrour, Jamal Mabrouki, Azidine Guezzaz, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-11
Open Access | Times Cited: 74

Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT
K. Arumugam, J. Srimathi, Sudhanshu Maurya, et al.
Sensors (2021) Vol. 21, Iss. 23, pp. 7793-7793
Open Access | Times Cited: 72

lIDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning
Chaimae Hazman, Azidine Guezzaz, Said Benkirane, et al.
Cluster Computing (2022) Vol. 26, Iss. 6, pp. 4069-4083
Closed Access | Times Cited: 62

An effective intrusion detection approach based on ensemble learning for IIoT edge computing
Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, et al.
Journal of Computer Virology and Hacking Techniques (2022) Vol. 19, Iss. 4, pp. 469-481
Closed Access | Times Cited: 41

Malicious detection model with artificial neural network in IoT-based smart farming security
Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, et al.
Cluster Computing (2024) Vol. 27, Iss. 6, pp. 7307-7322
Closed Access | Times Cited: 9

Temporal ECDSA: A timestamp and signature mask enabled ECDSA algorithm for IoT client node authentication
Jiby J. Puthiyidam, Shelbi Joseph, Bharat Bhushan
Computer Communications (2024) Vol. 216, pp. 307-323
Closed Access | Times Cited: 8

ECC-Based Anonymous and Multi-factor Authentication Scheme for IoT Environment
Souhayla Dargaoui, Mourade Azrour, Ahmad El Allaoui, et al.
International Journal of Online and Biomedical Engineering (iJOE) (2025) Vol. 21, Iss. 01, pp. 56-75
Open Access | Times Cited: 1

Modern Authentication Methods: A Comprehensive Survey
Maria Papathanasaki, Λέανδρος Μαγλαράς, Nick Ayres
AI Computer Science and Robotics Technology (2022) Vol. 2022, pp. 1-24
Open Access | Times Cited: 28

New Efficient and Secured Authentication Protocol for Remote Healthcare Systems in Cloud-IoT
Mourade Azrour, Jamal Mabrouki, Rajasekhar Chaganti
Security and Communication Networks (2021) Vol. 2021, pp. 1-12
Open Access | Times Cited: 38

A Novel Anomaly Network Intrusion Detection System for Internet of Things Security
Azidine Guezzaz, Said Benkirane, Mourade Azrour
EAI/Springer Innovations in Communication and Computing (2022), pp. 129-138
Closed Access | Times Cited: 24

Cryptanalysis of Biometric Based Secure User Authentication Protocol for IoT Applications
RVS Praveen, P. Pabitha
(2022), pp. 1-6
Closed Access | Times Cited: 23

An Overview of the Security Challenges in IoT Environment
Souhayla Dargaoui, Mourade Azrour, Ahmed El Allaoui, et al.
Environmental science and engineering (2023), pp. 151-160
Closed Access | Times Cited: 14

Authentication Technology in Internet of Things and Privacy Security Issues in Typical Application Scenarios
Junhui Zhao, Huanhuan Hu, Fanwei Huang, et al.
Electronics (2023) Vol. 12, Iss. 8, pp. 1812-1812
Open Access | Times Cited: 13

An Intrusion Detection Model using election-Based Feature Selection and K-NN
Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, et al.
Microprocessors and Microsystems (2023), pp. 104966-104966
Closed Access | Times Cited: 13

PSAP-WSN: A Provably Secure Authentication Protocol for 5G-Based Wireless Sensor Networks
Xuanang Li, Shuangshuang Liu, Saru Kumari, et al.
Computer Modeling in Engineering & Sciences (2022) Vol. 135, Iss. 1, pp. 711-732
Open Access | Times Cited: 21

IoT-Enabled Smart Agriculture: Security Issues and Applications
Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, et al.
Lecture notes in networks and systems (2023), pp. 566-571
Closed Access | Times Cited: 12

Building an Intelligent Anomaly Detection Model with Ensemble Learning for IoT-Based Smart Cities
Chaimae Hazman, Said Benkirane, Azidine Guezzaz, et al.
Environmental science and engineering (2023), pp. 287-299
Closed Access | Times Cited: 11

Internet of Things Authentication Protocols: Comparative Study
Souhayla Dargaoui, Mourade Azrour, Ahmad El Allaoui, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 1, pp. 65-91
Open Access | Times Cited: 4

Page 1 - Next Page

Scroll to top