OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

DBTP2SF: A deep blockchain‐based trustworthy privacy‐preserving secured framework in industrial internet of things systems
Randhir Kumar, Rakesh Tripathi
Transactions on Emerging Telecommunications Technologies (2021) Vol. 32, Iss. 4
Closed Access | Times Cited: 42

Showing 1-25 of 42 citing articles:

Cyber risk and cybersecurity: a systematic review of data availability
Frank Cremer, Barry Sheehan, Michael Fortmann, et al.
The Geneva Papers on Risk and Insurance Issues and Practice (2022) Vol. 47, Iss. 3, pp. 698-736
Open Access | Times Cited: 180

Internet of Things intrusion detection systems: a comprehensive review and future directions
Arash Heidari, Mohammad Ali Jabraeil Jamali
Cluster Computing (2022) Vol. 26, Iss. 6, pp. 3753-3780
Closed Access | Times Cited: 130

A distributed intrusion detection system to detect DDoS attacks in blockchain-enabled IoT network
Randhir Kumar, Prabhat Kumar, Rakesh Tripathi, et al.
Journal of Parallel and Distributed Computing (2022) Vol. 164, pp. 55-68
Closed Access | Times Cited: 108

Applications of Blockchain in Industry 4.0: a Review
Yong Chen, Yang Lu, Larisa Bulysheva, et al.
Information Systems Frontiers (2022)
Closed Access | Times Cited: 98

A Privacy-Preserving-Based Secure Framework Using Blockchain-Enabled Deep-Learning in Cooperative Intelligent Transport System
Randhir Kumar, Prabhat Kumar, Rakesh Tripathi, et al.
IEEE Transactions on Intelligent Transportation Systems (2021) Vol. 23, Iss. 9, pp. 16492-16503
Closed Access | Times Cited: 98

P2SF-IoV: A Privacy-Preservation-Based Secured Framework for Internet of Vehicles
Randhir Kumar, Prabhat Kumar, Rakesh Tripathi, et al.
IEEE Transactions on Intelligent Transportation Systems (2021) Vol. 23, Iss. 11, pp. 22571-22582
Closed Access | Times Cited: 75

Intrusion Detection Framework for the Internet of Things Using a Dense Random Neural Network
Shahid Latif, Zil e Huma, Sajjad Shaukat Jamal, et al.
IEEE Transactions on Industrial Informatics (2021) Vol. 18, Iss. 9, pp. 6435-6444
Open Access | Times Cited: 74

Blockchain technology for the industrial Internet of Things: A comprehensive survey on security challenges, architectures, applications, and future research directions
Shahid Latif, Zeba Idrees, Zil e Huma, et al.
Transactions on Emerging Telecommunications Technologies (2021) Vol. 32, Iss. 11
Closed Access | Times Cited: 62

Intrusion detection and prevention in fog based IoT environments: A systematic literature review
Cristiano Antonio de Souza, Carlos Becker Westphall, Renato Bobsin Machado, et al.
Computer Networks (2022) Vol. 214, pp. 109154-109154
Closed Access | Times Cited: 40

The role of blockchain to secure internet of medical things
Yazeed Yasin Ghadi, Tehseen Mazhar, Tariq Shahzad, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 8

RepuTE: A soft voting ensemble learning framework for reputation-based attack detection in fog-IoT milieu
Richa Verma, Shalini Chandra
Engineering Applications of Artificial Intelligence (2022) Vol. 118, pp. 105670-105670
Closed Access | Times Cited: 27

Secured Cloud Data through the Fog Nodes Transformation Model
Rachappa Jopate, Divyajyothi M. G, N. Sathyabalaji, et al.
SSRN Electronic Journal (2025)
Closed Access

Leveraging sparrow search optimization with deep learning-based cybersecurity detection in industrial internet of things environment
Fatma S. Alrayes, Nadhem Nemri, Wahida Mansouri, et al.
Alexandria Engineering Journal (2025) Vol. 121, pp. 128-137
Closed Access

A Fuzzy-Based Method for Objects Selection in Blockchain-Enabled Edge-IoT Platforms Using a Hybrid Multi-Criteria Decision-Making Model
Bhaskar B. Gardas, Arash Heidari, Nima Jafari Navimipour, et al.
Applied Sciences (2022) Vol. 12, Iss. 17, pp. 8906-8906
Open Access | Times Cited: 26

Deep Learning-Based Privacy-Preserving Data Transmission Scheme for Clustered IIoT Environment
Kuruva Lakshmanna, R. Kavitha, B. T. Geetha, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-11
Open Access | Times Cited: 22

Enhanced collaborative intrusion detection for industrial cyber-physical systems using permissioned blockchain and decentralized federated learning networks
Junwei Liang, Muhammad Sadiq, Geng Yang, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 135, pp. 108862-108862
Closed Access | Times Cited: 4

Blockchain-based mutual authentication protocol without CA
Yue Li, Mingcheng Xu, Gaojian Xu
The Journal of Supercomputing (2022) Vol. 78, Iss. 15, pp. 17261-17283
Closed Access | Times Cited: 21

Block chain fostered cycle‐consistent generative adversarial network framework espoused intrusion detection for protecting IoT network
G. Sugitha, A. Solairaj, J. Suresh
Transactions on Emerging Telecommunications Technologies (2022) Vol. 33, Iss. 11
Closed Access | Times Cited: 20

Smart contract and IPFS-based trustworthy secure data storage and device authentication scheme in fog computing environment
Sanjeev Kumar Dwivedi, Ruhul Amin, Satyanarayana Vollala
Peer-to-Peer Networking and Applications (2022) Vol. 16, Iss. 1, pp. 1-21
Closed Access | Times Cited: 20

Blockchain‐oriented location privacy preserving for cooperative spectrum sensing in 6G wireless networks
Vuppula Roopa, Himansu Shekhar Pradhan
IET Blockchain (2023) Vol. 3, Iss. 2, pp. 74-97
Open Access | Times Cited: 9

On the Design of Secured and Reliable Dynamic Access Control Scheme of Patient E-Healthcare Records in Cloud Environment
Kirtirajsinh Zala, Hiren Kumar Thakkar, Rajendrasinh Jadeja, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-19
Open Access | Times Cited: 13

Schloss: Blockchain-Based System Architecture for Secure Industrial IoT
Fatemeh Ghovanlooy Ghajar, Axel Sikora, Dominik Welte
Electronics (2022) Vol. 11, Iss. 10, pp. 1629-1629
Open Access | Times Cited: 12

Golden Jackal Optimization with a Deep Learning-Based Cybersecurity Solution in Industrial Internet of Things Systems
Louai A. Maghrabi, Ibrahim R. Alzahrani, Dheyaaldin Alsalman, et al.
Electronics (2023) Vol. 12, Iss. 19, pp. 4091-4091
Open Access | Times Cited: 7

Blockchain and Deep Learning for Cyber Threat-Hunting in Software-Defined Industrial IoT
Randhir Kumar, Prabhat Kumar, Abhinav Kumar, et al.
2022 IEEE International Conference on Communications Workshops (ICC Workshops) (2022), pp. 776-781
Closed Access | Times Cited: 8

Page 1 - Next Page

Scroll to top