OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Systematic Survey on IoT Security Issues, Vulnerability and Open Challenges
Ranjit Patnaik, Neelamadhab Padhy, K. Srujan Raju
Advances in intelligent systems and computing (2020), pp. 723-730
Closed Access | Times Cited: 28

Showing 1-25 of 28 citing articles:

Advances in IoT Security: Vulnerabilities, Enabled Criminal Services, Attacks, and Countermeasures
Yuba R. Siwakoti, Manish Bhurtel, Danda B. Rawat, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 13, pp. 11224-11239
Closed Access | Times Cited: 51

Machine learning and internet of things applications in enterprise architectures: Solutions, challenges, and open issues
Zubaida Rehman, Noshina Tariq, Syed Atif Moqurrab, et al.
Expert Systems (2023) Vol. 41, Iss. 1
Open Access | Times Cited: 23

A Systematic Review of IoT Security: Research Potential, Challenges, and Future Directions
Wen Fei, Hiroyuki Ohno, Srinivas Sampalli
ACM Computing Surveys (2023) Vol. 56, Iss. 5, pp. 1-40
Closed Access | Times Cited: 19

IoT Eco-system, Layered Architectures, Security and Advancing Technologies: A Comprehensive Survey
Aparna Raj, Sujala D. Shetty
Wireless Personal Communications (2021) Vol. 122, Iss. 2, pp. 1481-1517
Closed Access | Times Cited: 25

Securing the Internet of Things via Blockchain-Aided Smart Contracts
S. Mohammadali Zanjani, Hossein Shahinzadeh, Jalal Moradi, et al.
(2022)
Closed Access | Times Cited: 11

Methodology for Mitigating the Security Issues and Challenges in the Internet of Things (IoT) Framework for Enhanced Security
Vinod Varma Vegesna
Asian Journal of Basic Science & Research (2023) Vol. 05, Iss. 01, pp. 85-102
Open Access | Times Cited: 4

Security Risk Analysis in IoT Systems through Factor Identification over IoT Devices
Roberto Andrade, Sang Guun Yoo, Iván Ortiz-Garcés, et al.
Applied Sciences (2022) Vol. 12, Iss. 6, pp. 2976-2976
Open Access | Times Cited: 6

A Survey on the Integration of Blockchain and IoT: Challenges and Opportunities
Mwrwan Abubakar, Zakwan Jarocheh, Ahmed Al‐Dubai, et al.
Advanced sciences and technologies for security applications (2022), pp. 197-221
Closed Access | Times Cited: 6

Evaluating the AdaBoost Algorithm for Biometric-Based Face Recognition
B. Thilagavathi, K. Suthendran, K. Srujan Raju
Lecture notes on data engineering and communications technologies (2021), pp. 669-678
Closed Access | Times Cited: 8

Quality and Security Frameworks for IoT-Architecture Models Evaluation
Darine Ameyed, Fehmi Jaafar, Fábio Petrillo, et al.
SN Computer Science (2023) Vol. 4, Iss. 4
Open Access | Times Cited: 2

Using smart grid infrastructure for authentication and data management in Internet of Medical Things
Ikram Ud Din, Wajahat Ali, Ahmad Almogren, et al.
Security and Privacy (2024) Vol. 7, Iss. 3
Closed Access

Survey on intelligent hybrid steganography optimization algorithms for IoT application
Neha Waghchoure, G. Poddar, Anuja Mankar, et al.
AIP conference proceedings (2024) Vol. 3222, pp. 040003-040003
Closed Access

A Safe and Secured Deep Learnıng Cnn Approach for Robust Intellıgent Malware Detectıon Usıng Artıfıcıal Intellıgence
K. R. Murali, D. Maneiah, Ashutosh Kumar, et al.
Lecture notes in electrical engineering (2024), pp. 1224-1238
Closed Access

A novel effective chain encryption approach based on deep learning for IoT-based low-power wide area networks
Abbas Dehghani, Sadegh Fadaei, Resul Daş
Research Square (Research Square) (2024)
Open Access

A novel effective key synchronization approach based on optimized deep neural networks for IoT-based low-power wide area networks
Abbas Dehghani, Sadegh Fadaei, Resul Daş
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access

Identification of Compromised IoT Devices: Combined Approach Based on Energy Consumption and Network Traffic Analysis
Fehmi Jaafar, Darine Ameyed, Amine Barrak, et al.
2021 IEEE 21st International Conference on Software Quality, Reliability and Security (QRS) (2021), pp. 514-523
Closed Access | Times Cited: 3

A Mobility Adaptive Efficient Power Optimized Protocol for MANETs Based on Cross-Layering Concept
K. Anish Pon Yamini, K. Suthendran, K. Srujan Raju
Lecture notes on data engineering and communications technologies (2021), pp. 661-667
Closed Access | Times Cited: 2

GFDM-Based Device to Device Systems in 5G Cellular Networks
K. Anish Pon Yamini, J. Assis Nevatha, K. Suthendran, et al.
Lecture notes on data engineering and communications technologies (2021), pp. 653-660
Closed Access | Times Cited: 2

Cyber Security for IoT-Enabled Industry 4.0
Deepika Chauhan, Chaitanya Singh, Dyaneshwar Kudande, et al.
Advances in digital crime, forensics, and cyber terrorism book series (2022), pp. 89-124
Closed Access | Times Cited: 1

Novel Channel Estimation Technique for 5G MIMO Communication Systems
T. Anil Kumar, L. Anjaneyulu
Lecture notes on data engineering and communications technologies (2021), pp. 345-352
Closed Access | Times Cited: 1

Blockchain-Empowered Security Enhancement IoT Framework in Building Management System
Uma Tomar, Parul U. Gandhi
International Journal on Recent and Innovation Trends in Computing and Communication (2023) Vol. 11, Iss. 5, pp. 181-187
Open Access

A New Channel Estimation Technique for 5G MIMO Communication Systems
T. Anil Kumar, L. Anjaneyulu
(2020), pp. 108-111
Closed Access

Page 1 - Next Page

Scroll to top