OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Access Control, Key Management, and Trust for Emerging Wireless Body Area Networks
Ahmad Salehi S., Hagen Lauer, Marthie Grobler, et al.
Sensors (2023) Vol. 23, Iss. 24, pp. 9856-9856
Open Access | Times Cited: 11

Showing 11 citing articles:

Securing cross-domain data access with decentralized attribute-based access control
Seyedmohammad Salehi, Carsten Rudolph, Hooman Alavizadeh, et al.
Ad Hoc Networks (2025), pp. 103807-103807
Closed Access | Times Cited: 1

Physical layer security techniques for grant-free massive Machine-Type Communications in 5G and beyond: A survey, challenges, and future directions
Uchenna P. Enwereonye, Ahmad Salehi S., Hooman Alavizadeh, et al.
Computer Networks (2025), pp. 111268-111268
Closed Access

Two-Layered Multi-Factor Authentication Using Decentralized Blockchain in an IoT Environment
Saeed Bamashmos, Naveen Chilamkurti, Ahmad Salehi S.
Sensors (2024) Vol. 24, Iss. 11, pp. 3575-3575
Open Access | Times Cited: 3

Visual Data and Pattern Analysis for Smart Education: A Robust DRL-Based Early Warning System for Student Performance Prediction
Wala Bagunaid, Naveen Chilamkurti, Ahmad Salehi S., et al.
Future Internet (2024) Vol. 16, Iss. 6, pp. 206-206
Open Access | Times Cited: 2

Secure Trust Node Acquisition and Access Control for Privacy-Preserving Expertise Trust in WBAN Networks
Israa Al Barazanchi, Wahidah Hashim, Reema Thabit, et al.
Lecture notes in networks and systems (2024), pp. 265-275
Closed Access | Times Cited: 2

The Role of Cloud Storage in Rebuilding Governmental Data After Conflict: A Case Study of Sudan 2023
Sabah Ahmed
International Journal of Computers and Informatics (2024) Vol. 3, Iss. 3, pp. 42-62
Open Access | Times Cited: 1

A Novel Endorsement Protocol to Secure BFT-Based Consensus in Permissionless Blockchain
Ziqiang Xu, Ahmad Salehi S., Naveen Chilamkurti
2022 IEEE Wireless Communications and Networking Conference (WCNC) (2024), pp. 1-6
Closed Access | Times Cited: 1

PROBLEMS OF ASSESSING TRUST IN INFORMATION SECURITY AUDIT PROCESSES
Andrey Ivanov, Igor A. Ognev
Voprosy kiberbezopasnosti (2024), Iss. 3 (61)
Open Access

A lossless quantization approach for physical-layer key generation in vehicular ad hoc networks based on received signal strength
Ibraheem Abdelazeem, Weibin Zhang, Abdeldime Mohamedsalih, et al.
Vehicular Communications (2024) Vol. 49, pp. 100809-100809
Closed Access

Secure and Efficient Classification of Trusted and Untrusted Nodes in Wireless Body Area Networks: A Survey of Techniques and Applications
Israa Ibraheem Al Barazanchi, Wahidah Hashim, Reema Thabit, et al.
Lecture notes in networks and systems (2024), pp. 254-264
Closed Access

Implantable Medical Device Security
Luigi Catuogno, Clemente Galdi
Cryptography (2024) Vol. 8, Iss. 4, pp. 53-53
Open Access

Page 1

Scroll to top