
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing
Sarra Cherbal, Abdelhak Zier, Sara Hebal, et al.
The Journal of Supercomputing (2023) Vol. 80, Iss. 3, pp. 3738-3816
Closed Access | Times Cited: 43
Sarra Cherbal, Abdelhak Zier, Sara Hebal, et al.
The Journal of Supercomputing (2023) Vol. 80, Iss. 3, pp. 3738-3816
Closed Access | Times Cited: 43
Showing 1-25 of 43 citing articles:
Privacy-Preserving Security of IoT Networks: A Comparative Analysis of Methods and Applications
Abubakar Wakili, Sara Bakkali
Cyber Security and Applications (2025), pp. 100084-100084
Open Access | Times Cited: 1
Abubakar Wakili, Sara Bakkali
Cyber Security and Applications (2025), pp. 100084-100084
Open Access | Times Cited: 1
Quantum-empowered federated learning and 6G wireless networks for IoT security: Concept, challenges and future directions
Danish Javeed, Muhammad Shahid Saeed, Ijaz Ahmad, et al.
Future Generation Computer Systems (2024) Vol. 160, pp. 577-597
Open Access | Times Cited: 9
Danish Javeed, Muhammad Shahid Saeed, Ijaz Ahmad, et al.
Future Generation Computer Systems (2024) Vol. 160, pp. 577-597
Open Access | Times Cited: 9
Securing internet of things using machine and deep learning methods: a survey
Ali Ghaffari, Nasim Jelodari, Samira pouralish, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 9065-9089
Open Access | Times Cited: 7
Ali Ghaffari, Nasim Jelodari, Samira pouralish, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 9065-9089
Open Access | Times Cited: 7
AI-driven fusion with cybersecurity: Exploring current trends, advanced techniques, future directions, and policy implications for evolving paradigms– A comprehensive review
Sijjad Ali Khuhro, Jia Wang, Victor Chung Ming Leung
Information Fusion (2025), pp. 102922-102922
Closed Access
Sijjad Ali Khuhro, Jia Wang, Victor Chung Ming Leung
Information Fusion (2025), pp. 102922-102922
Closed Access
Elevating IoT healthcare security using ProSRN and ICOM methodologies for effective threat management
Y. Sowjanya, S. Gopalakrishnan, Rakesh Kumar
International Journal of Information Technology (2025)
Closed Access
Y. Sowjanya, S. Gopalakrishnan, Rakesh Kumar
International Journal of Information Technology (2025)
Closed Access
Current research on Internet of Things (IoT) security protocols: A survey
Raghavendra Mishra, Ankita Mishra
Computers & Security (2025), pp. 104310-104310
Closed Access
Raghavendra Mishra, Ankita Mishra
Computers & Security (2025), pp. 104310-104310
Closed Access
Deep learning technology: enabling safe communication via the internet of things
Ramiz Salama, Hitesh Mohapatra, Tuğşad Tülbentçi, et al.
Frontiers in Communications and Networks (2025) Vol. 6
Open Access
Ramiz Salama, Hitesh Mohapatra, Tuğşad Tülbentçi, et al.
Frontiers in Communications and Networks (2025) Vol. 6
Open Access
Optimizing SIKE for blockchain-based IoT ecosystems with resource constraints
Nabil A. Ismail, Shaimaa Abu Khadra, Gamal Attiya, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 3
Open Access
Nabil A. Ismail, Shaimaa Abu Khadra, Gamal Attiya, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 3
Open Access
IoT Applications and Cyber Threats: Mitigation Strategies for a Secure Future
Pratik Kumar Swain, Lal Mohan Pattnaik, Suneeta Satpathy
(2025), pp. 403-428
Closed Access
Pratik Kumar Swain, Lal Mohan Pattnaik, Suneeta Satpathy
(2025), pp. 403-428
Closed Access
Biometric Iris Authentication Using a Segmentation Network with Attention and a Key-Points Detection Algorithm
Katarzyna Prokop, Dawid Połap
Lecture notes in computer science (2025), pp. 356-367
Closed Access
Katarzyna Prokop, Dawid Połap
Lecture notes in computer science (2025), pp. 356-367
Closed Access
Artificial Intelligence and Quantum Synergies in Trust-Enhanced Consumer Applications for Software Defined Networks
Kamran Ahmad Awan, Ikram Ud Din, Ahmad Almogren, et al.
IEEE Transactions on Consumer Electronics (2024) Vol. 70, Iss. 1, pp. 791-799
Closed Access | Times Cited: 2
Kamran Ahmad Awan, Ikram Ud Din, Ahmad Almogren, et al.
IEEE Transactions on Consumer Electronics (2024) Vol. 70, Iss. 1, pp. 791-799
Closed Access | Times Cited: 2
Advances in Blockchain-Based Internet of Vehicles Application: Prospect for Machine Learning Integration
Emmanuel Ekene Okere, Vipin Balyan
Future Internet (2024) Vol. 16, Iss. 12, pp. 449-449
Open Access | Times Cited: 2
Emmanuel Ekene Okere, Vipin Balyan
Future Internet (2024) Vol. 16, Iss. 12, pp. 449-449
Open Access | Times Cited: 2
Secure Key Exchange Scheme and Blockchain-oriented Data Protection in the Internet of Vehicles
Sarra Cherbal
(2023), pp. 45-50
Closed Access | Times Cited: 5
Sarra Cherbal
(2023), pp. 45-50
Closed Access | Times Cited: 5
Post-quantum security design for hierarchical healthcare systems based on lattices
Manel Boujelben, Mohamed Abid
The Journal of Supercomputing (2024) Vol. 80, Iss. 12, pp. 17292-17313
Closed Access | Times Cited: 1
Manel Boujelben, Mohamed Abid
The Journal of Supercomputing (2024) Vol. 80, Iss. 12, pp. 17292-17313
Closed Access | Times Cited: 1
Quantum Computing Integrated Patterns for Real-Time Cryptography in Assorted Domains
Shally Nagpal, Shivani Gaba, Ishan Budhiraja, et al.
IEEE Access (2024) Vol. 12, pp. 132317-132331
Open Access | Times Cited: 1
Shally Nagpal, Shivani Gaba, Ishan Budhiraja, et al.
IEEE Access (2024) Vol. 12, pp. 132317-132331
Open Access | Times Cited: 1
Quantum communication based cyber security analysis using artificial intelligence with IoMT
Huimin Han, Jun Yao, Yujun Wu, et al.
Optical and Quantum Electronics (2024) Vol. 56, Iss. 4
Closed Access | Times Cited: 1
Huimin Han, Jun Yao, Yujun Wu, et al.
Optical and Quantum Electronics (2024) Vol. 56, Iss. 4
Closed Access | Times Cited: 1
IoT Security Model for Smart Cities based on a Metamodeling Approach
Daifallah Zaid Alotaibe
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 3, pp. 14109-14118
Open Access | Times Cited: 1
Daifallah Zaid Alotaibe
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 3, pp. 14109-14118
Open Access | Times Cited: 1
A Review of Post-Quantum Privacy Preservation for IoMT Using Blockchain
Fariza Sabrina, Shaleeza Sohail, Umair Ullah Tariq
Electronics (2024) Vol. 13, Iss. 15, pp. 2962-2962
Open Access | Times Cited: 1
Fariza Sabrina, Shaleeza Sohail, Umair Ullah Tariq
Electronics (2024) Vol. 13, Iss. 15, pp. 2962-2962
Open Access | Times Cited: 1
Swarm-intelligence-based quantum-inspired optimization techniques for enhancing algorithmic efficiency and empirical assessment
Ishaani Priyadarshini
Quantum Machine Intelligence (2024) Vol. 6, Iss. 2
Closed Access | Times Cited: 1
Ishaani Priyadarshini
Quantum Machine Intelligence (2024) Vol. 6, Iss. 2
Closed Access | Times Cited: 1
Exploration and Development of Quantum Computing Algorithms for Optimization, Cryptography, and Machine Learning Applications
Kaya Tunçel
Human computer interaction. (2024) Vol. 8, Iss. 1, pp. 1-1
Closed Access | Times Cited: 1
Kaya Tunçel
Human computer interaction. (2024) Vol. 8, Iss. 1, pp. 1-1
Closed Access | Times Cited: 1
Quantum-Empowered Federated Learning and 6G Wireless Networks for IoT Security: Concept, Challenges and Future Directions
Danish Javeed, Muhammad Shahid Saeed, Ijaz Ahmad, et al.
(2023)
Open Access | Times Cited: 3
Danish Javeed, Muhammad Shahid Saeed, Ijaz Ahmad, et al.
(2023)
Open Access | Times Cited: 3
Accurate and Efficient Security Authentication of IoT Devices using Machine Learning Algorithms
Ilham Alghamdi, Mohammad Eid Alzahrani
(2024), pp. 79-90
Open Access
Ilham Alghamdi, Mohammad Eid Alzahrani
(2024), pp. 79-90
Open Access
Unilateral protection scheme for N-qubit GHZ states against decoherence: a resource-efficient approach
Sajede Harraz, Wang Yueyan, Shuang Cong
The Journal of Supercomputing (2024) Vol. 80, Iss. 12, pp. 17004-17020
Closed Access
Sajede Harraz, Wang Yueyan, Shuang Cong
The Journal of Supercomputing (2024) Vol. 80, Iss. 12, pp. 17004-17020
Closed Access
Securing Social Media: Analyzing User Behaviors for Threat Detection Using Ensemble Random Forest Algorithm
T S Sanjai, D. Vanathi, P. Thirumoorthi, et al.
(2024), pp. 1-4
Closed Access
T S Sanjai, D. Vanathi, P. Thirumoorthi, et al.
(2024), pp. 1-4
Closed Access
Bridging the Gap to 6G: Leveraging the Synergy of Standardization and Adaptability
Anjanabhargavi Kulkarni, R. H. Goudar, Joshi Vinayak B., et al.
ICST Transactions on Scalable Information Systems (2024) Vol. 11
Open Access
Anjanabhargavi Kulkarni, R. H. Goudar, Joshi Vinayak B., et al.
ICST Transactions on Scalable Information Systems (2024) Vol. 11
Open Access