OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Peek-a-boo
Abbas Acar, Hossein Fereidooni, Tigist Abera, et al.
(2020)
Open Access | Times Cited: 60

Showing 26-50 of 60 citing articles:

Sentinel
Adrien Cosson, Amit Kumar Sikder, Leonardo Babun, et al.
(2021), pp. 53-66
Open Access | Times Cited: 12

Classification of Encrypted IoT Traffic despite Padding and Shaping
Aviv Engelberg, Avishai Wool
(2022), pp. 1-13
Open Access | Times Cited: 8

Aegis: A Context-aware Security Framework for Smart Home Systems
Amit Kumar Sikder, Leonardo Babun, Hidayet Aksu, et al.
arXiv (Cornell University) (2019)
Open Access | Times Cited: 13

Threat is in the Air
Luca Pajola, Luca Pasa, Mauro Conti
(2019), pp. 16-21
Closed Access | Times Cited: 12

PFirewall: Semantics-Aware Customizable Data Flow Control for Home Automation Systems
Haotian Chi, Qiang Zeng, Xiaojiang Du, et al.
arXiv (Cornell University) (2019)
Open Access | Times Cited: 11

IoT Behavioral Monitoring via Network Traffic Analysis
Arunan Sivanathan
arXiv (Cornell University) (2020)
Open Access | Times Cited: 11

IoT Network Security: Requirements, Threats, and Countermeasures
Ayyoob Hamza, Hassan Habibi Gharakheili, Vijay Sivaraman
arXiv (Cornell University) (2020)
Open Access | Times Cited: 10

Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks
Shuaike Dong, Zhou Li, Di Tang, et al.
arXiv (Cornell University) (2019)
Open Access | Times Cited: 10

Every Byte Matters
Ludovic Barman, Alexandre Dumur, Apostolos Pyrgelis, et al.
Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies (2021) Vol. 5, Iss. 2, pp. 1-45
Open Access | Times Cited: 9

Securing Edge-based IoT Networks with Semi-Supervised GANs
Santosh Kumar Nukavarapu, Tamer Nadeem
2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops) (2021)
Closed Access | Times Cited: 9

A Mapping Study on Privacy Attacks in Big Data and IoT
Raisa Islam, Mohammad Sahinur Hossen, Dongwan Shin
2022 13th International Conference on Information and Communication Technology Convergence (ICTC) (2022)
Closed Access | Times Cited: 6

The Dark (and Bright) Side of IoT: Attacks and Countermeasures for Identifying Smart Home Devices and Services
Ahmed Hussain, Gabriele Oligeri, Thiemo Voigt
Lecture notes in computer science (2021), pp. 122-136
Closed Access | Times Cited: 8

PingPong: Packet-Level Signatures for Smart Home Device Events
Rahmadi Trimananda, Janus Varmarken, Athina Markopoulou, et al.
arXiv (Cornell University) (2019)
Closed Access | Times Cited: 7

Privacy Invasion through Smarthome IoT Sensing
Ravishankar Chamarajnagar, Ashwin Ashok
(2019), pp. 1-9
Closed Access | Times Cited: 6

Network Traffic Modeling For IoT-device Re-identification
Naji Najari, Samuel Berlemont, Grégoire Lefebvre, et al.
(2020), pp. 1-6
Closed Access | Times Cited: 5

Voice Command Fingerprinting with Locality Sensitive Hashes
Batyr Charyyev, Mehmet Hadi Güneş
(2020), pp. 87-92
Closed Access | Times Cited: 5

Survey on Enterprise Internet-of-Things Systems (E-IoT): A Security Perspective
Luis Puche Rondon, Leonardo Babun, Ahmet Arış, et al.
arXiv (Cornell University) (2021)
Closed Access | Times Cited: 5

Detection of Anomalous User Activity for Home IoT Devices
Vishwajeet Bhosale, Lorenzo De Carli, Indrakshi Ray
(2021), pp. 309-314
Open Access | Times Cited: 5

Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities
Z. Berkay Celik, Earlence Fernandes, Eric Pauley, et al.
arXiv (Cornell University) (2018)
Closed Access | Times Cited: 4

Real-time Analysis of Privacy-(un)aware IoT Applications
Leonardo Babun, Z. Berkay Celik, Patrick McDaniel, et al.
arXiv (Cornell University) (2019)
Closed Access | Times Cited: 4

Misactivation detection and user identification in smart home speakers using traffic flow features
Batyr Charyyev, Mehmet Hadi Güneş
(2021), pp. 135-146
Closed Access | Times Cited: 4

Your Neighbor Knows What You’re Doing: Defending Smart Home IoT Device Traffic from Privacy LAN Attacks
Kiana Dziubinski, Masaki Bandai
Advances in intelligent systems and computing (2020), pp. 526-534
Closed Access | Times Cited: 3

Evaluating the Security of Machine Learning Based IoT Device Identification Systems Against Adversarial Examples
Anahita Namvar, Chandra Thapa, Salil S. Kanhere, et al.
Lecture notes in computer science (2021), pp. 800-810
Closed Access | Times Cited: 3

How Secure Is Your IoT Network?
Josh Payne, Karan K. Budhraja, Ashish Kundu
(2019), pp. 181-188
Open Access | Times Cited: 2

Canopy: A Verifiable Privacy-Preserving Token Ring based Communication Protocol for Smart Homes
Nisha Panwar, Shantanu Sharma, Guoxi Wang, et al.
arXiv (Cornell University) (2020)
Closed Access | Times Cited: 2

Scroll to top