OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Improving security of the Internet of Things via RF fingerprinting based device identification system
Sohail Abbas, Qassim Nasir, Douae Nouichi, et al.
Neural Computing and Applications (2021) Vol. 33, Iss. 21, pp. 14753-14769
Closed Access | Times Cited: 37

Showing 1-25 of 37 citing articles:

A Blockchain-Based IoT-Enabled E-Waste Tracking and Tracing System for Smart Cities
Atta ur Rehman Khan, Raja Wasim Ahmad
IEEE Access (2022) Vol. 10, pp. 86256-86269
Closed Access | Times Cited: 62

A secure cryptosystem using DNA cryptography and DNA steganography for the cloud-based IoT infrastructure
Suyel Namasudra
Computers & Electrical Engineering (2022) Vol. 104, pp. 108426-108426
Closed Access | Times Cited: 44

Integration of Data Science and IoT with Blockchain for Industry 4.0
Pranav Gangwani, Alexander Perez-Pons, Santosh Joshi, et al.
Studies in big data (2023), pp. 139-177
Closed Access | Times Cited: 21

Application and Outlook of Intelligent Big Data Analysis in Internet of Things Security
Fei Tan, Hongfei Guo
Lecture notes on data engineering and communications technologies (2025), pp. 25-34
Closed Access

Enhancing randomness of the ciphertext generated by DNA-based cryptosystem and finite state machine
Pramod Pavithran, Sheena Mathew, Suyel Namasudra, et al.
Cluster Computing (2022) Vol. 26, Iss. 2, pp. 1035-1051
Closed Access | Times Cited: 18

A survey on device fingerprinting approach for resource-constraint IoT devices: Comparative study and research challenges
Rajarshi Roy Chowdhury, Pg Emeroylariffion Abas
Internet of Things (2022) Vol. 20, pp. 100632-100632
Closed Access | Times Cited: 18

Device Identity Recognition Based on an Adaptive Environment for Intrinsic Security Fingerprints
Zesheng Xi, Gongxuan Zhang, Bo Zhang, et al.
Electronics (2024) Vol. 13, Iss. 3, pp. 656-656
Open Access | Times Cited: 3

Deep-Learning-Based Device Fingerprinting for Increased LoRa-IoT Security: Sensitivity to Network Deployment Changes
Bechir Hamdaoui, Abdurrahman Elmaghbub
IEEE Network (2022) Vol. 36, Iss. 3, pp. 204-210
Open Access | Times Cited: 15

Zone of trust: blockchain assisted IoT authentication to support cross-communication between bubbles of trusted IoTs
Aqsa Rashid, Asif Masood, Atta ur Rehman Khan
Cluster Computing (2022) Vol. 26, Iss. 1, pp. 237-254
Closed Access | Times Cited: 13

HeuCrip: a malware detection approach for internet of battlefield things
Imtiaz Ali shah, Abid Mehmood, Abdul Nasir Khan, et al.
Cluster Computing (2022) Vol. 26, Iss. 2, pp. 977-992
Closed Access | Times Cited: 12

The Day-After-Tomorrow: On the Performance of Radio Fingerprinting over Time
Saeif Alhazbi, Savio Sciancalepore, Gabriele Oligeri
Annual Computer Security Applications Conference (2023)
Open Access | Times Cited: 6

A Novel Machine Learning Technique for Selecting Suitable Image Encryption Algorithms for IoT Applications
Arslan Shafique, Abid Mehmood, Moatsum Alawida, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-21
Open Access | Times Cited: 9

Robust Federated Learning for execution time-based device model identification under label-flipping attack
Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, José Rafael Buendía Rubio, et al.
Cluster Computing (2023)
Open Access | Times Cited: 4

Radio frequency fingerprinting techniques for device identification: a survey
Sohail Abbas, Manar Abu Talib, Qassim Nasir, et al.
International Journal of Information Security (2023) Vol. 23, Iss. 2, pp. 1389-1427
Closed Access | Times Cited: 4

Construction of a College Physical Education Teaching Model Using Multiple Intelligences Theory
Ming Xie, Xiaoqin Xu
Scientific Programming (2022) Vol. 2022, pp. 1-10
Open Access | Times Cited: 7

An improved hash algorithm for monitoring network traffic in the internet of things
Teng Zhan, Shiping Chen
Cluster Computing (2022) Vol. 26, Iss. 2, pp. 961-976
Closed Access | Times Cited: 5

LED-RFF: LTE DMRS-Based Channel Robust Radio Frequency Fingerprint Identification Scheme
Yang Xuan, Dongming Li
IEEE Transactions on Information Forensics and Security (2023) Vol. 19, pp. 1855-1869
Closed Access | Times Cited: 2

A Novel Fuzzy Identity-Based Encryption with Wireless PUF for IoT Device Authentication
Ye Chen, Yubo Song, Yihan Cai, et al.
(2023), pp. 574-581
Closed Access | Times Cited: 2

A Pest Intrusion Detection in Chinese Beehive Culture Using Deep Learning
Chao Liu, Shouying Lin
Scientific Programming (2022) Vol. 2022, pp. 1-10
Open Access | Times Cited: 4

Analysis of wireless communication networks under edge computing scenarios
Jianhang Wang
Wireless Networks (2022) Vol. 28, Iss. 8, pp. 3665-3676
Closed Access | Times Cited: 3

IoT-Enabled Systems for E-Waste Monitoring and Recycling
Ajay Kumar, Yashvant Kumar, Anjali Kumari, et al.
(2024), pp. 375-394
Closed Access

A Generative Adversarial Network (GAN) Fingerprint Approach Over LTE
Luigi Serreli, Mauro Fadda, Roberto Girau, et al.
IEEE Access (2024) Vol. 12, pp. 82083-82094
Open Access

Convergence of Artificial Intelligence and Internet of Things for Software‐Defined Radios
Shilpa Mehta, Xue Jun Li, Surjeet Dalal
(2024), pp. 475-505
Closed Access

DevDet: Detecting IoT Device Impersonation Attacks via Traffic Based Identification
Hongliang Yong, Le Yu, Tian Dong, et al.
Lecture notes in computer science (2024), pp. 439-451
Closed Access

Page 1 - Next Page

Scroll to top