
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Consumer, Commercial, and Industrial IoT (In)Security: Attack Taxonomy and Case Studies
Christos Xenofontos, Ioannis Zografopoulos, Charalambos Konstantinou, et al.
IEEE Internet of Things Journal (2021) Vol. 9, Iss. 1, pp. 199-221
Open Access | Times Cited: 103
Christos Xenofontos, Ioannis Zografopoulos, Charalambos Konstantinou, et al.
IEEE Internet of Things Journal (2021) Vol. 9, Iss. 1, pp. 199-221
Open Access | Times Cited: 103
Showing 26-50 of 103 citing articles:
Game Theoretical Decision-Making of Dynamic Defense in Cyber-Physical Power Systems under Cyber-Attacks
Pengchao Yao, Bingjing Yan, Qiang Yang
ACM Transactions on Cyber-Physical Systems (2025)
Closed Access
Pengchao Yao, Bingjing Yan, Qiang Yang
ACM Transactions on Cyber-Physical Systems (2025)
Closed Access
A comprehensive survey of manual and dynamic approaches for cybersecurity taxonomy generation
Arnolnt Spyros, Anna Kougioumtzidou, Angelos Papoutsis, et al.
Knowledge and Information Systems (2025)
Open Access
Arnolnt Spyros, Anna Kougioumtzidou, Angelos Papoutsis, et al.
Knowledge and Information Systems (2025)
Open Access
Ensemble Feature Engineering and Deep Learning for Botnet Attacks Detection in the Internet of Things
Mir Aman Sheheryar, Sparsh Sharma
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 3
Closed Access
Mir Aman Sheheryar, Sparsh Sharma
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 3
Closed Access
MLS: a novel hybrid security framework utilizing the Wiedemann algorithm and chaotic mapping for MQTT
Azita Rezaei, Ali Broumandnia, Seyed Javad Mirabedini
The Journal of Supercomputing (2025) Vol. 81, Iss. 4
Closed Access
Azita Rezaei, Ali Broumandnia, Seyed Javad Mirabedini
The Journal of Supercomputing (2025) Vol. 81, Iss. 4
Closed Access
Load-Altering Attacks Against Power Grids Under COVID-19 Low-Inertia Conditions
Subhash Lakshminarayana, Juan Ospina, Charalambos Konstantinou
IEEE Open Access Journal of Power and Energy (2022) Vol. 9, pp. 226-240
Open Access | Times Cited: 19
Subhash Lakshminarayana, Juan Ospina, Charalambos Konstantinou
IEEE Open Access Journal of Power and Energy (2022) Vol. 9, pp. 226-240
Open Access | Times Cited: 19
Insights on the internet of things: past, present, and future directions
Tole Sutikno, Daniël Thalmann
TELKOMNIKA (Telecommunication Computing Electronics and Control) (2022) Vol. 20, Iss. 6, pp. 1399-1399
Open Access | Times Cited: 19
Tole Sutikno, Daniël Thalmann
TELKOMNIKA (Telecommunication Computing Electronics and Control) (2022) Vol. 20, Iss. 6, pp. 1399-1399
Open Access | Times Cited: 19
Detection of data-driven blind cyber-attacks on smart grid: A deep learning approach
Debottam Mukherjee
Sustainable Cities and Society (2023) Vol. 92, pp. 104475-104475
Closed Access | Times Cited: 12
Debottam Mukherjee
Sustainable Cities and Society (2023) Vol. 92, pp. 104475-104475
Closed Access | Times Cited: 12
IoT-Enabled Sensors in Automation Systems and Their Security Challenges
Thilo Sauter, Albert Treytl
IEEE Sensors Letters (2023) Vol. 7, Iss. 12, pp. 1-4
Open Access | Times Cited: 11
Thilo Sauter, Albert Treytl
IEEE Sensors Letters (2023) Vol. 7, Iss. 12, pp. 1-4
Open Access | Times Cited: 11
A Resource Allocation Scheme for Energy Demand Management in 6G-enabled Smart Grid
Shafkat Islam, Ioannis Zografopoulos, Md Tamjid Hossain, et al.
(2023)
Open Access | Times Cited: 10
Shafkat Islam, Ioannis Zografopoulos, Md Tamjid Hossain, et al.
(2023)
Open Access | Times Cited: 10
A Comprehensive Study on Cyber Attacks in Communication Networks in Water Purification and Distribution Plants: Challenges, Vulnerabilities, and Future Prospects
Muhammad Muzamil Aslam, Ali Tufail, Ki‐Hyung Kim, et al.
Sensors (2023) Vol. 23, Iss. 18, pp. 7999-7999
Open Access | Times Cited: 10
Muhammad Muzamil Aslam, Ali Tufail, Ki‐Hyung Kim, et al.
Sensors (2023) Vol. 23, Iss. 18, pp. 7999-7999
Open Access | Times Cited: 10
Improvise, Adapt, Overcome: Dynamic Resiliency Against Unknown Attack Vectors in Microgrid Cybersecurity Games
Suman Rath, Tapadhir Das, Shamik Sengupta
IEEE Transactions on Smart Grid (2024) Vol. 15, Iss. 4, pp. 4245-4258
Open Access | Times Cited: 3
Suman Rath, Tapadhir Das, Shamik Sengupta
IEEE Transactions on Smart Grid (2024) Vol. 15, Iss. 4, pp. 4245-4258
Open Access | Times Cited: 3
Foundation models for the electric power grid
Hendrik F. Hamann, Blazhe Gjorgiev, Thomas Brunschwiler, et al.
Joule (2024) Vol. 8, Iss. 12, pp. 3245-3258
Open Access | Times Cited: 3
Hendrik F. Hamann, Blazhe Gjorgiev, Thomas Brunschwiler, et al.
Joule (2024) Vol. 8, Iss. 12, pp. 3245-3258
Open Access | Times Cited: 3
Blockchain meets Internet of Things (IoT) forensics: A unified framework for IoT ecosystems
Sotirios Brotsis, Konstantinos-Panagiotis Grammatikakis, Dimitrios Kavallieros, et al.
Internet of Things (2023) Vol. 24, pp. 100968-100968
Closed Access | Times Cited: 10
Sotirios Brotsis, Konstantinos-Panagiotis Grammatikakis, Dimitrios Kavallieros, et al.
Internet of Things (2023) Vol. 24, pp. 100968-100968
Closed Access | Times Cited: 10
Challenges of Malware Detection in the IoT and a Review of Artificial Immune System Approaches
Hadeel Alrubayyi, Gokop Goteng, Mona Jaber, et al.
Journal of Sensor and Actuator Networks (2021) Vol. 10, Iss. 4, pp. 61-61
Open Access | Times Cited: 22
Hadeel Alrubayyi, Gokop Goteng, Mona Jaber, et al.
Journal of Sensor and Actuator Networks (2021) Vol. 10, Iss. 4, pp. 61-61
Open Access | Times Cited: 22
A control‐switching approach for cyberattack detection in process systems with minimal false alarms
Shilpa Narasimhan, Nael H. El‐Farra, Matthew J. Ellis
AIChE Journal (2022) Vol. 68, Iss. 12
Closed Access | Times Cited: 15
Shilpa Narasimhan, Nael H. El‐Farra, Matthew J. Ellis
AIChE Journal (2022) Vol. 68, Iss. 12
Closed Access | Times Cited: 15
Secure and Energy-Efficient Network Topology Obfuscation for Software-Defined WSNs
Manaf Bin-Yahya, Xuemin Shen
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 3, pp. 2031-2045
Closed Access | Times Cited: 12
Manaf Bin-Yahya, Xuemin Shen
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 3, pp. 2031-2045
Closed Access | Times Cited: 12
Cyber-Security of Industrial Internet of Things in Electric Power Systems
Hamed Sarjan, Amir Ameli, Mohsen Ghafouri
IEEE Access (2022) Vol. 10, pp. 92390-92409
Open Access | Times Cited: 12
Hamed Sarjan, Amir Ameli, Mohsen Ghafouri
IEEE Access (2022) Vol. 10, pp. 92390-92409
Open Access | Times Cited: 12
Behind Closed Doors: Process-Level Rootkit Attacks in Cyber-Physical Microgrid Systems
Suman Rath, Ioannis Zografopoulos, Pedro P. Vergara, et al.
2021 IEEE Power & Energy Society General Meeting (PESGM) (2022), pp. 1-5
Open Access | Times Cited: 12
Suman Rath, Ioannis Zografopoulos, Pedro P. Vergara, et al.
2021 IEEE Power & Energy Society General Meeting (PESGM) (2022), pp. 1-5
Open Access | Times Cited: 12
Networked Industrial Control Device Asset Identification Method Based on Improved Decision Tree
Wei Yang, Yushan Fang, Xiaoming Zhou, et al.
Journal of Network and Systems Management (2024) Vol. 32, Iss. 2
Closed Access | Times Cited: 2
Wei Yang, Yushan Fang, Xiaoming Zhou, et al.
Journal of Network and Systems Management (2024) Vol. 32, Iss. 2
Closed Access | Times Cited: 2
A survey on security issues in IoT operating systems
Panjun Sun, Yi Wan, Zongda Wu, et al.
Journal of Network and Computer Applications (2024) Vol. 231, pp. 103976-103976
Closed Access | Times Cited: 2
Panjun Sun, Yi Wan, Zongda Wu, et al.
Journal of Network and Computer Applications (2024) Vol. 231, pp. 103976-103976
Closed Access | Times Cited: 2
A Lightweight and Secure Communication Protocol for the IoT Environment
Zikang Ding, Daojing He, Qiao Qi, et al.
IEEE Transactions on Dependable and Secure Computing (2023) Vol. 21, Iss. 3, pp. 1050-1067
Closed Access | Times Cited: 6
Zikang Ding, Daojing He, Qiao Qi, et al.
IEEE Transactions on Dependable and Secure Computing (2023) Vol. 21, Iss. 3, pp. 1050-1067
Closed Access | Times Cited: 6
Ring-ExpLWE: A High-Performance and Lightweight Post-Quantum Encryption Scheme for Resource-Constrained IoT Devices
Dongdong Xu, Xiang Wang, Yuanchao Hao, et al.
IEEE Internet of Things Journal (2022) Vol. 9, Iss. 23, pp. 24122-24134
Closed Access | Times Cited: 10
Dongdong Xu, Xiang Wang, Yuanchao Hao, et al.
IEEE Internet of Things Journal (2022) Vol. 9, Iss. 23, pp. 24122-24134
Closed Access | Times Cited: 10
Privacy and Security Best Practices for IoT Solutions
Matteo Anedda, Alessandro Floris, Roberto Girau, et al.
IEEE Access (2023) Vol. 11, pp. 129156-129172
Open Access | Times Cited: 5
Matteo Anedda, Alessandro Floris, Roberto Girau, et al.
IEEE Access (2023) Vol. 11, pp. 129156-129172
Open Access | Times Cited: 5
Defensive cost–benefit analysis of smart grid digital functionalities
Jim Stright, Peter Cheetham, Charalambos Konstantinou
International Journal of Critical Infrastructure Protection (2021) Vol. 36, pp. 100489-100489
Open Access | Times Cited: 13
Jim Stright, Peter Cheetham, Charalambos Konstantinou
International Journal of Critical Infrastructure Protection (2021) Vol. 36, pp. 100489-100489
Open Access | Times Cited: 13
Enhancing IoT Security through a Green and Sustainable Federated Learning Platform: Leveraging Efficient Encryption and the Quondam Signature Algorithm
Turki Aljrees, Ankit Kumar, Kamred Udham Singh, et al.
Sensors (2023) Vol. 23, Iss. 19, pp. 8090-8090
Open Access | Times Cited: 5
Turki Aljrees, Ankit Kumar, Kamred Udham Singh, et al.
Sensors (2023) Vol. 23, Iss. 19, pp. 8090-8090
Open Access | Times Cited: 5