OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Security of Internet of Things for a Reliable Internet of Services
Ahmet Arış, Sema Oktuğ, Thiemo Voigt
Lecture notes in computer science (2018), pp. 337-370
Open Access | Times Cited: 29

Showing 1-25 of 29 citing articles:

The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey
Noshina Tariq, Muhammad Asim, Feras Al‐Obeidat, et al.
Sensors (2019) Vol. 19, Iss. 8, pp. 1788-1788
Open Access | Times Cited: 243

Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications
Nasr Abosata, Saba Al–Rubaye, Gökhan İnalhan, et al.
Sensors (2021) Vol. 21, Iss. 11, pp. 3654-3654
Open Access | Times Cited: 111

Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction
Fatma Foad Ashrif, Elankovan Sundararajan, Rami Ahmad, et al.
Journal of Network and Computer Applications (2023) Vol. 221, pp. 103759-103759
Open Access | Times Cited: 27

New lightweight mitigation techniques for RPL version number attacks
Ahmet Arış, Berna Örs, Sema Oktuğ
Ad Hoc Networks (2018) Vol. 85, pp. 81-91
Closed Access | Times Cited: 62

A lightweight IoT‐based security framework for inventory automation using wireless sensor network
Isha Batra, Sahil Verma, Kavita Kavita, et al.
International Journal of Communication Systems (2019) Vol. 33, Iss. 4
Closed Access | Times Cited: 58

EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things
Ankur Bang, Udai Pratap Rao
Peer-to-Peer Networking and Applications (2022) Vol. 15, Iss. 1, pp. 642-665
Closed Access | Times Cited: 32

Modern security threats in the Internet of Things (IoT): Attacks and Countermeasures
G. Rajendran, R S Ragul Nivash, Purushotham Parthiban Parthy, et al.
(2019)
Closed Access | Times Cited: 46

Internet of Things Management Based on Software Defined Networking: A Survey
Wiem Bekri, Rihab Jmal, Lamia Chaari Fourati
International Journal of Wireless Information Networks (2020) Vol. 27, Iss. 3, pp. 385-410
Closed Access | Times Cited: 34

Impact Analysis of Rank Attack on RPL-Based 6LoWPAN Networks in Internet of Things and Aftermaths
Ankur Bang, Udai Pratap Rao
Arabian Journal for Science and Engineering (2022) Vol. 48, Iss. 2, pp. 2489-2505
Closed Access | Times Cited: 14

Analysis of the RPL Version Number Attack with Multiple Attackers
Ahmet Arış, Sema Oktuğ
(2020), pp. 1-8
Closed Access | Times Cited: 22

IoT and Cyber Security
Keyurbhai A. Jani, Nirbhay Kumar Chaubey
Advances in information security, privacy, and ethics book series (2020), pp. 203-235
Closed Access | Times Cited: 20

Performance Evaluation of RPL Protocol Under Decreased and Increased Rank Attacks: A Focus on Smart Home Use-Case
Ankur Bang, Udai Pratap Rao
SN Computer Science (2023) Vol. 4, Iss. 4
Closed Access | Times Cited: 4

Digital Forensics Analysis of IoT Nodes using Machine Learning
Maryam Arshad, Hameedur Rahman, Junaid Tariq, et al.
Journal of Computing & Biomedical Informatics (2022) Vol. 4, Iss. 01
Open Access | Times Cited: 6

Multi-Trace: Multi-level Data Trace Generation with the Cooja Simulator
Niclas Finne, Joakim Eriksson, Thiemo Voigt, et al.
(2021), pp. 390-395
Open Access | Times Cited: 7

Securing an Internet of Things from Distributed Denial of Service and Mirai Botnet Attacks Using a Novel Hybrid Detection and Mitigation Mechanism
M. Karthik, M. B. Mukesh Krishnan
International journal of intelligent engineering and systems (2020) Vol. 14, Iss. 1, pp. 113-123
Open Access | Times Cited: 7

A Framework to Address Security Concerns in Three Layers of IoT
Alwyn Jose, Sami Azam, Asif Karim, et al.
(2020), pp. 1-6
Closed Access | Times Cited: 6

Ivycide: Smart Intrusion Detection System Against E-IoT Driver Threats
Luis Puche Rondon, Leonardo Babun, Ahmet Arış, et al.
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 10, pp. 8533-8546
Closed Access | Times Cited: 4

BRAIN: Buffer Reservation Attack PreventIoN Using Legitimacy Score in 6LoWPAN Network
Pradeepkumar Bhale, Satya Prakash, Santosh Biswas, et al.
Communications in computer and information science (2019), pp. 208-223
Closed Access | Times Cited: 5

DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer Network
Victoria Bull, Niclas Finne, Andrea Agiollo, et al.
Lecture notes in computer science (2024), pp. 198-213
Closed Access

A Lightweight Blockchain Architecture for IoT Based on Delegated Nodes
Yassin Elgountery, Meryem Lasaad, Mohamed Oualla, et al.
(2024), pp. 1-6
Closed Access

IoT Insider Attack - Survey
Morshed Chowdhury, Robin Doss, Biplob Ray, et al.
Springer eBooks (2020), pp. 28-41
Closed Access | Times Cited: 2

Security and Threats of RFID and WSNs: Comparative Study
Ghada Hisham Alzeer, Ghada Sultam Aljumaie, Wajdi Alhakami
International Journal of Advanced Computer Science and Applications (2021) Vol. 12, Iss. 5
Open Access | Times Cited: 2

A Survey on Emerging Security Issues, Challenges, and Solutions for Internet of Things (IoTs)
Anish Khan, Dragan Peraković
Advances in information security, privacy, and ethics book series (2021), pp. 148-175
Closed Access | Times Cited: 1

Page 1 - Next Page

Scroll to top