OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

MitM Attack Detection in BLE Networks Using Reconstruction and Classification Machine Learning Techniques
Abdelkader Lahmadi, Alexis Duque, Nathan Heraief, et al.
Communications in computer and information science (2020), pp. 149-164
Open Access | Times Cited: 21

Showing 21 citing articles:

Man-in-the-Middle Attack Mitigation in Internet of Medical Things
Osman Salem, Khalid Alsubhi, Aymen Shaafi, et al.
IEEE Transactions on Industrial Informatics (2021) Vol. 18, Iss. 3, pp. 2053-2062
Closed Access | Times Cited: 71

Evolution of Bluetooth Technology: BLE in the IoT Ecosystem
Grigorios Koulouras, Stylianos Katsoulis, Fotios Zantalis
Sensors (2025) Vol. 25, Iss. 4, pp. 996-996
Open Access | Times Cited: 1

Securing Bluetooth Low Energy networking: An overview of security procedures and threats
Andrea Lacava, Valerio Zottola, Alessio Bonaldo, et al.
Computer Networks (2022) Vol. 211, pp. 108953-108953
Closed Access | Times Cited: 33

An electric power digital twin for cyber security testing, research and education
Nandha Kumar Kandasamy, Sarad Venugopalan, Tin Kit Wong, et al.
Computers & Electrical Engineering (2022) Vol. 101, pp. 108061-108061
Closed Access | Times Cited: 33

Threat Modeling and Risk Analysis for Miniaturized Wireless Biomedical Devices
Vladimir Vakhter, Betul Soysal, Patrick Schaumont, et al.
IEEE Internet of Things Journal (2022) Vol. 9, Iss. 15, pp. 13338-13352
Open Access | Times Cited: 22

P2ADF: a privacy-preserving attack detection framework in fog-IoT environment
Jasleen Kaur, Alka Agrawal, Raees Ahmad Khan
International Journal of Information Security (2023) Vol. 22, Iss. 4, pp. 749-762
Closed Access | Times Cited: 11

OASIS: An Intrusion Detection System Embedded in Bluetooth Low Energy Controllers
Romain Cayre, Vincent Nicomette, Guillaume Auriol, et al.
(2024), pp. 700-715
Open Access | Times Cited: 2

An Optimized Machine Learning Model for the Detection of Man-in-the-Middle Attack in Mobile Edge Computing
Ramahlapane Lerato Moila, Mthulisi Velempini
2021 IST-Africa Conference (IST-Africa) (2024), pp. 1-12
Closed Access | Times Cited: 2

Introducing Security Mechanisms in OpenFog-Compliant Smart Buildings
Imanol Martín Toral, Isidro Calvo, Eneko Villar, et al.
Electronics (2024) Vol. 13, Iss. 15, pp. 2900-2900
Open Access | Times Cited: 2

InjectaBLE: Injecting malicious traffic into established Bluetooth Low Energy connections
Romain Cayre, Florent Galtier, Guillaume Auriol, et al.
(2021), pp. 388-399
Open Access | Times Cited: 12

A Novel Approach for an Automated Advanced MITM Attack on IoT Networks
Keshav Kaushik, Vanshika Singh, V. Prabhu Manikandan
Communications in computer and information science (2022), pp. 60-71
Closed Access | Times Cited: 8

Cyber Security on the Edge: Efficient Enabling of Machine Learning on IoT Devices
Swati Kumari, Vatsal Tulshyan, Hitesh Tewari
Information (2024) Vol. 15, Iss. 3, pp. 126-126
Open Access | Times Cited: 1

Securing Billion Bluetooth Devices Leveraging Learning-Based Techniques
Hanlin Cai
Proceedings of the AAAI Conference on Artificial Intelligence (2024) Vol. 38, Iss. 21, pp. 23731-23732
Open Access | Times Cited: 1

Assessing Unsupervised Machine Learning solutions for Anomaly Detection in Cloud Gaming Sessions
Joël Roman Ky, Bertrand Mathieu, Abdelkader Lahmadi, et al.
(2022), pp. 367-373
Open Access | Times Cited: 4

A Secure Framework for Remote Healthcare Monitoring using the Internet of Medical Things
Osman Salem, Ahmed Mehaoua
ICC 2022 - IEEE International Conference on Communications (2022), pp. 1233-1238
Closed Access | Times Cited: 3

BLEKeeper: Response Time Behavior Based Man-In-The-Middle Attack Detection
Muhammed Ali Yurdagul, Hüsrev Taha Sencar
(2021), pp. 214-220
Open Access | Times Cited: 3

Security for Emerging Miniaturized Wireless Biomedical Devices: Threat Modeling with Application to Case Studies.
Vladimir Vakhter, Betul Soysal, Patrick Schaumont, et al.
arXiv (Cornell University) (2021)
Closed Access | Times Cited: 2

Neurocryptographic Bluetooth-attack prevention system
Лариса Владимировна Фомченкова, Alexey Lazarev, Pavel S. Kharlamov
2022 4th International Youth Conference on Radio Electronics, Electrical and Power Engineering (REEPE) (2022), pp. 1-5
Closed Access | Times Cited: 1

Protecting FIDO Extensions Against Man-in-the-Middle Attacks
Andre Büttner, Nils Gruschka
Lecture notes in computer science (2023), pp. 70-87
Closed Access

BLEKeeper: Response Time Behavior Based Man-In-The-Middle Attack Detection
Muhammed Ali Yurdagul, Hüsrev Taha Sencar
arXiv (Cornell University) (2021)
Closed Access

Page 1

Scroll to top