
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
SafeChain: Securing Trigger-Action Programming From Attack Chains
Kai-Hsiang Hsu, Yu-Hsi Chiang, Hsu‐Chun Hsiao
IEEE Transactions on Information Forensics and Security (2019) Vol. 14, Iss. 10, pp. 2607-2622
Open Access | Times Cited: 48
Kai-Hsiang Hsu, Yu-Hsi Chiang, Hsu‐Chun Hsiao
IEEE Transactions on Information Forensics and Security (2019) Vol. 14, Iss. 10, pp. 2607-2622
Open Access | Times Cited: 48
Showing 26-50 of 48 citing articles:
On the Privacy Risks of Compromised Trigger-Action Platforms
Yu-Hsi Chiang, Hsu‐Chun Hsiao, Chia-Mu Yu, et al.
Lecture notes in computer science (2020), pp. 251-271
Closed Access | Times Cited: 8
Yu-Hsi Chiang, Hsu‐Chun Hsiao, Chia-Mu Yu, et al.
Lecture notes in computer science (2020), pp. 251-271
Closed Access | Times Cited: 8
Design and Deployment of Expressive and Correct Web of Things Applications
Ajay Krishna, Michel Le Pallec, Radu Mateescu, et al.
ACM Transactions on Internet of Things (2021) Vol. 3, Iss. 1, pp. 1-30
Open Access | Times Cited: 6
Ajay Krishna, Michel Le Pallec, Radu Mateescu, et al.
ACM Transactions on Internet of Things (2021) Vol. 3, Iss. 1, pp. 1-30
Open Access | Times Cited: 6
Zigbee’s Network Rejoin Procedure for IoT Systems: Vulnerabilities and Implications
Jincheng Wang, Zhuohua Li, Mingshen Sun, et al.
(2022), pp. 292-307
Closed Access | Times Cited: 4
Jincheng Wang, Zhuohua Li, Mingshen Sun, et al.
(2022), pp. 292-307
Closed Access | Times Cited: 4
On the Security of Smart Home Systems: A Survey
Bin Yuan, Jun Wan, Yuhan Wu, et al.
Journal of Computer Science and Technology (2023) Vol. 38, Iss. 2, pp. 228-247
Closed Access | Times Cited: 2
Bin Yuan, Jun Wan, Yuhan Wu, et al.
Journal of Computer Science and Technology (2023) Vol. 38, Iss. 2, pp. 228-247
Closed Access | Times Cited: 2
Security Checking of Trigger-Action-Programming Smart Home Integrations
Lei Bu, Qiuping Zhang, Suwan Li, et al.
(2023)
Closed Access | Times Cited: 2
Lei Bu, Qiuping Zhang, Suwan Li, et al.
(2023)
Closed Access | Times Cited: 2
Detecting Smart Home Automation Application Interferences with Domain Knowledge
Tao Wang, Wei Chen, Liwei Liu, et al.
2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE) (2023), pp. 1086-1097
Closed Access | Times Cited: 2
Tao Wang, Wei Chen, Liwei Liu, et al.
2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE) (2023), pp. 1086-1097
Closed Access | Times Cited: 2
Comparing formal models of IoT app coordination analysis
Clay Stevens, Mohannad Alhanahnah, Qiben Yan, et al.
(2020)
Closed Access | Times Cited: 5
Clay Stevens, Mohannad Alhanahnah, Qiben Yan, et al.
(2020)
Closed Access | Times Cited: 5
Threat Detection in Trigger-Action Programming Rules of Smart Home With Heterogeneous Information Network Model
Dongming Sun, Liang Hu, Gang Wu, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 10, pp. 18320-18334
Closed Access
Dongming Sun, Liang Hu, Gang Wu, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 10, pp. 18320-18334
Closed Access
Static program analysis for IoT risk mitigation in space-air-ground integrated networks
Haotian Deng, Tao Liu, Xiaochen Ma, et al.
Security and Safety (2024) Vol. 3, pp. 2024007-2024007
Open Access
Haotian Deng, Tao Liu, Xiaochen Ma, et al.
Security and Safety (2024) Vol. 3, pp. 2024007-2024007
Open Access
Time Automata-Based Approach for Modeling and Risk Assessment of Industrial Robot Systems
Wenqi Jiang, Zhongwei Li, Xiaosheng Liu, et al.
(2024)
Closed Access
Wenqi Jiang, Zhongwei Li, Xiaosheng Liu, et al.
(2024)
Closed Access
SAfER: Simplified Auto-encoder for (Anomalous) Event Recognition
Yuvin Perera, Gustavo Batista, Wen Hu, et al.
(2024), pp. 229-233
Closed Access
Yuvin Perera, Gustavo Batista, Wen Hu, et al.
(2024), pp. 229-233
Closed Access
TrustEvent: Cross-Platform IoT Trigger Event Verification Using Edge Computing
Trent Reichenbach, Chenglong Fu, Xiaojiang Du, et al.
ICC 2022 - IEEE International Conference on Communications (2024), pp. 4084-4089
Closed Access
Trent Reichenbach, Chenglong Fu, Xiaojiang Du, et al.
ICC 2022 - IEEE International Conference on Communications (2024), pp. 4084-4089
Closed Access
Towards Detecting IoT Event Spoofing Attacks Using Time-Series Classification
Uzma Maroof, Gustavo Batista, Arash Shaghaghi, et al.
(2024) Vol. 10, pp. 1-7
Closed Access
Uzma Maroof, Gustavo Batista, Arash Shaghaghi, et al.
(2024) Vol. 10, pp. 1-7
Closed Access
How End Users Develop Point-and-Click Games
Valentino Artizzu, Ivan Blečić, Vittoria Frau, et al.
Lecture notes in computer science (2023), pp. 220-229
Closed Access | Times Cited: 1
Valentino Artizzu, Ivan Blečić, Vittoria Frau, et al.
Lecture notes in computer science (2023), pp. 220-229
Closed Access | Times Cited: 1
Cloud Attacks and Defence Mechanism for SaaS: A Survey
Akram Harun Shaikh, B. B. Meshram
Lecture notes in networks and systems (2022), pp. 43-52
Closed Access | Times Cited: 2
Akram Harun Shaikh, B. B. Meshram
Lecture notes in networks and systems (2022), pp. 43-52
Closed Access | Times Cited: 2
Listing the ingredients for IFTTT recipes
Shirin Kalantari, Danny Hughes, Bart De Decker
(2022)
Open Access | Times Cited: 2
Shirin Kalantari, Danny Hughes, Bart De Decker
(2022)
Open Access | Times Cited: 2
On the Security and Safety of AbU Systems
Michele Pasqua, Marino Miculan
Lecture notes in computer science (2021), pp. 178-198
Closed Access | Times Cited: 2
Michele Pasqua, Marino Miculan
Lecture notes in computer science (2021), pp. 178-198
Closed Access | Times Cited: 2
PFirewall: Semantics-Aware Customizable Data Flow Control for Smart Home Privacy Protection
Haotian Chi, Qiang Zeng, Xiaojiang Du, et al.
arXiv (Cornell University) (2021)
Open Access | Times Cited: 2
Haotian Chi, Qiang Zeng, Xiaojiang Du, et al.
arXiv (Cornell University) (2021)
Open Access | Times Cited: 2
2019 Index IEEE Transactions on Information Forensics and Security Vol. 14
IEEE Transactions on Information Forensics and Security (2019) Vol. 14, Iss. 12, pp. 3353-3388
Open Access
IEEE Transactions on Information Forensics and Security (2019) Vol. 14, Iss. 12, pp. 3353-3388
Open Access
WREP: A lightweight event real-time processing engine for IoT
Lei Feng, Yuanfei Zhang, Zhiqiang Hao, et al.
(2022), pp. 79-85
Closed Access
Lei Feng, Yuanfei Zhang, Zhiqiang Hao, et al.
(2022), pp. 79-85
Closed Access
TAPInspector: Safety and Liveness Verification of Concurrent Trigger-Action IoT Systems
Yinbo Yu, Jiajia Liu
arXiv (Cornell University) (2021)
Open Access
Yinbo Yu, Jiajia Liu
arXiv (Cornell University) (2021)
Open Access