
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Survey of Security Challenges, Attacks Taxonomy and Advanced Countermeasures in the Internet of Things
Salma Khanam, Ismail Ahmedy, Mohd Yamani Idna Idris, et al.
IEEE Access (2020) Vol. 8, pp. 219709-219743
Open Access | Times Cited: 91
Salma Khanam, Ismail Ahmedy, Mohd Yamani Idna Idris, et al.
IEEE Access (2020) Vol. 8, pp. 219709-219743
Open Access | Times Cited: 91
Showing 26-50 of 91 citing articles:
An approach to botnet attacks in the fog computing layer and Apache Spark for smart cities
Abdelaziz Al Dawi, Necmi Serkan Tezel, Javad Rahebi, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 4
Open Access
Abdelaziz Al Dawi, Necmi Serkan Tezel, Javad Rahebi, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 4
Open Access
Internet of Things (IoT) Technologies in Cybersecurity: Challenges and Opportunities
Grzegorz Kołaczek
Applied Sciences (2025) Vol. 15, Iss. 6, pp. 2935-2935
Open Access
Grzegorz Kołaczek
Applied Sciences (2025) Vol. 15, Iss. 6, pp. 2935-2935
Open Access
Optimizing Intrusion Detection for IoT : A Systematic Review of Machine Learning and Deep Learning Approaches With Feature Selection and Data Balancing
S Kumar Reddy Mallidi, Rajeswara Rao Ramisetty
Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery (2025) Vol. 15, Iss. 2
Closed Access
S Kumar Reddy Mallidi, Rajeswara Rao Ramisetty
Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery (2025) Vol. 15, Iss. 2
Closed Access
Through the Lens: A Deep Dive into IP Camera Security and Privacy Challenges
Homam El-Taj, Reema Albuluwi, Lulua Alshumesi, et al.
(2025), pp. 121-131
Open Access
Homam El-Taj, Reema Albuluwi, Lulua Alshumesi, et al.
(2025), pp. 121-131
Open Access
Smart Healthcare Applications: Detecting DDoS Attacks Efficiently using Hybrid Firefly Algorithm
G. Sripriyanka, Anand Mahendran
Engineering Technology & Applied Science Research (2025) Vol. 15, Iss. 2, pp. 21136-21143
Open Access
G. Sripriyanka, Anand Mahendran
Engineering Technology & Applied Science Research (2025) Vol. 15, Iss. 2, pp. 21136-21143
Open Access
SRF2T-ID: an implementation of ensemble learning-based IDS with wireless of things secure communication for smart residency environment
Prokash Barman, Ratul Chowdhury, Tamal Chakraborty, et al.
Neural Computing and Applications (2025)
Closed Access
Prokash Barman, Ratul Chowdhury, Tamal Chakraborty, et al.
Neural Computing and Applications (2025)
Closed Access
IoT-Based Multi-Sensor Healthcare Architectures and a Lightweight-Based Privacy Scheme
Vassileios Aivaliotis, Kyriaki Tsantikidou, Nicolas Sklavos
Sensors (2022) Vol. 22, Iss. 11, pp. 4269-4269
Open Access | Times Cited: 20
Vassileios Aivaliotis, Kyriaki Tsantikidou, Nicolas Sklavos
Sensors (2022) Vol. 22, Iss. 11, pp. 4269-4269
Open Access | Times Cited: 20
Towards an Effective Intrusion Detection Model Using Focal Loss Variational Autoencoder for Internet of Things (IoT)
Salma Khanam, Ismail Ahmedy, Mohd Yamani Idna Idris, et al.
Sensors (2022) Vol. 22, Iss. 15, pp. 5822-5822
Open Access | Times Cited: 17
Salma Khanam, Ismail Ahmedy, Mohd Yamani Idna Idris, et al.
Sensors (2022) Vol. 22, Iss. 15, pp. 5822-5822
Open Access | Times Cited: 17
IoT Security Vulnerabilities and Defensive Measures in Industry 4.0
Koppula Manasa, L. M. I. Leo Joseph
Advanced technologies and societal change (2023), pp. 71-112
Closed Access | Times Cited: 10
Koppula Manasa, L. M. I. Leo Joseph
Advanced technologies and societal change (2023), pp. 71-112
Closed Access | Times Cited: 10
Model-based security testing in IoT systems: A Rapid Review
Francesca Lonetti, Antonia Bertolino, Felicita Di Giandomenico
Information and Software Technology (2023) Vol. 164, pp. 107326-107326
Open Access | Times Cited: 9
Francesca Lonetti, Antonia Bertolino, Felicita Di Giandomenico
Information and Software Technology (2023) Vol. 164, pp. 107326-107326
Open Access | Times Cited: 9
Hardware Limitations of Lightweight Cryptographic Designs for IoT in Healthcare
Kyriaki Tsantikidou, Nicolas Sklavos
Cryptography (2022) Vol. 6, Iss. 3, pp. 45-45
Open Access | Times Cited: 14
Kyriaki Tsantikidou, Nicolas Sklavos
Cryptography (2022) Vol. 6, Iss. 3, pp. 45-45
Open Access | Times Cited: 14
Key less physical layer security for wireless networks: A survey
Megha S. Kumar, R. Ramanathan, M Jayakumar
Engineering Science and Technology an International Journal (2022) Vol. 35, pp. 101260-101260
Open Access | Times Cited: 14
Megha S. Kumar, R. Ramanathan, M Jayakumar
Engineering Science and Technology an International Journal (2022) Vol. 35, pp. 101260-101260
Open Access | Times Cited: 14
Issues and Future Trends in IoT Security using Blockchain: A Review
Sumita Kumar, Amarsinh Vidhate
(2023)
Closed Access | Times Cited: 8
Sumita Kumar, Amarsinh Vidhate
(2023)
Closed Access | Times Cited: 8
CoSoGMIR: A Social Graph Contagion Diffusion Framework using the Movement-Interaction-Return Technique
Arnold Adimabua Ojugo, Patrick Ogholuwarami Ejeh, Maureen Ifeanyi Akazue, et al.
Journal of Computing Theories and Applications (2023) Vol. 1, Iss. 2, pp. 163-173
Open Access | Times Cited: 8
Arnold Adimabua Ojugo, Patrick Ogholuwarami Ejeh, Maureen Ifeanyi Akazue, et al.
Journal of Computing Theories and Applications (2023) Vol. 1, Iss. 2, pp. 163-173
Open Access | Times Cited: 8
Secure Transmission in Wireless Sensor Networks via Reconfigurable Intelligent Surface
Asmaa Amer, Fathi E. Abd El‐Samie, A. Abdelaziz Salem, et al.
Digital Signal Processing (2023) Vol. 140, pp. 104083-104083
Closed Access | Times Cited: 7
Asmaa Amer, Fathi E. Abd El‐Samie, A. Abdelaziz Salem, et al.
Digital Signal Processing (2023) Vol. 140, pp. 104083-104083
Closed Access | Times Cited: 7
Performance evaluation of Raspberry Pi 4 and STM32 Nucleo boards for security-related operations in IoT environments
Karol Rzepka, Przemysław Szary, Krzysztof Cabaj, et al.
Computer Networks (2024) Vol. 242, pp. 110252-110252
Open Access | Times Cited: 2
Karol Rzepka, Przemysław Szary, Krzysztof Cabaj, et al.
Computer Networks (2024) Vol. 242, pp. 110252-110252
Open Access | Times Cited: 2
Enhancing honeynet-based protection with network slicing for massive Pre-6G IoT Smart Cities deployments
Antonio Matencio Escolar, Qi Wang, José M. Alcaraz Calero
Journal of Network and Computer Applications (2024) Vol. 229, pp. 103918-103918
Open Access | Times Cited: 2
Antonio Matencio Escolar, Qi Wang, José M. Alcaraz Calero
Journal of Network and Computer Applications (2024) Vol. 229, pp. 103918-103918
Open Access | Times Cited: 2
Distributed Cyber-infrastructures and Artificial Intelligence in Hybrid Post-Quantum Era
Attila A. Yavuz, Saif E. Nouma, Thang Hoang, et al.
(2022), pp. 29-38
Closed Access | Times Cited: 11
Attila A. Yavuz, Saif E. Nouma, Thang Hoang, et al.
(2022), pp. 29-38
Closed Access | Times Cited: 11
Implementing Machine Learning-based Autonomic Cyber Defense for IoT-enabled Healthcare Devices
M. Manimaran, Murali Dhar M S, Roger Pedro Norabuena Figueroa, et al.
Journal of Artificial Intelligence and Technology (2023)
Open Access | Times Cited: 6
M. Manimaran, Murali Dhar M S, Roger Pedro Norabuena Figueroa, et al.
Journal of Artificial Intelligence and Technology (2023)
Open Access | Times Cited: 6
Symbiotic Analysis of Security Assessment and Penetration Tests Guiding Real L4 Automated City Shuttles
Meriem Benyahya, Pierre Bergerat, Anastasija Collen, et al.
Telecom (2023) Vol. 4, Iss. 1, pp. 198-218
Open Access | Times Cited: 5
Meriem Benyahya, Pierre Bergerat, Anastasija Collen, et al.
Telecom (2023) Vol. 4, Iss. 1, pp. 198-218
Open Access | Times Cited: 5
Dissemination control in dynamic data clustering for dense IIoT against false data injection attack
Carlos Pedroso, Aldri Santos
International Journal of Network Management (2022) Vol. 32, Iss. 5
Open Access | Times Cited: 8
Carlos Pedroso, Aldri Santos
International Journal of Network Management (2022) Vol. 32, Iss. 5
Open Access | Times Cited: 8
A survey on IoT security: application areas, security threats, and solution architectures
Animesh Kumar Dubey
ACCENTS Transactions on Information Security (2023) Vol. 7, Iss. 26
Open Access | Times Cited: 4
Animesh Kumar Dubey
ACCENTS Transactions on Information Security (2023) Vol. 7, Iss. 26
Open Access | Times Cited: 4
IoT Attacks Countermeasures: Systematic Review and Future Research Direction
Joshua Teddy Ibibo
(2024), pp. 95-111
Closed Access | Times Cited: 1
Joshua Teddy Ibibo
(2024), pp. 95-111
Closed Access | Times Cited: 1
The integration between Lean Construction and the Internet of Things (IoT): a systematic literature review
Wassim AlBalkhy, Rateb J. Sweis, Hassan Jaï, et al.
Smart and Sustainable Built Environment (2024)
Closed Access | Times Cited: 1
Wassim AlBalkhy, Rateb J. Sweis, Hassan Jaï, et al.
Smart and Sustainable Built Environment (2024)
Closed Access | Times Cited: 1
Silent Sabotage: A Stealthy Control Logic Injection in IIoT Systems
Wael Alsabbagh, Chaerin Kim, Peter Langendörfer
(2024), pp. 1-8
Closed Access | Times Cited: 1
Wael Alsabbagh, Chaerin Kim, Peter Langendörfer
(2024), pp. 1-8
Closed Access | Times Cited: 1