
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
DDoS attacks in Industrial IoT: A survey
Shubhankar Chaudhary, Pramod Kumar Mishra
Computer Networks (2023) Vol. 236, pp. 110015-110015
Closed Access | Times Cited: 19
Shubhankar Chaudhary, Pramod Kumar Mishra
Computer Networks (2023) Vol. 236, pp. 110015-110015
Closed Access | Times Cited: 19
Showing 19 citing articles:
Blockchain Based an Efficient and Secure Privacy Preserved Framework for Smart Cities
Adla Padma, Mangayarkarasi Ramaiah
IEEE Access (2024) Vol. 12, pp. 21985-22002
Open Access | Times Cited: 21
Adla Padma, Mangayarkarasi Ramaiah
IEEE Access (2024) Vol. 12, pp. 21985-22002
Open Access | Times Cited: 21
Botnet‐based IoT network traffic analysis using deep learning
N. Joychandra Singh, Nazrul Hoque, Kh. Robindro Singh, et al.
Security and Privacy (2023) Vol. 7, Iss. 2
Closed Access | Times Cited: 21
N. Joychandra Singh, Nazrul Hoque, Kh. Robindro Singh, et al.
Security and Privacy (2023) Vol. 7, Iss. 2
Closed Access | Times Cited: 21
Modeling time-varying wide-scale distributed denial of service attacks on electric vehicle charging Stations
Tawfiq M. Aljohani, Abdulaziz Almutairi
Ain Shams Engineering Journal (2024) Vol. 15, Iss. 7, pp. 102860-102860
Open Access | Times Cited: 11
Tawfiq M. Aljohani, Abdulaziz Almutairi
Ain Shams Engineering Journal (2024) Vol. 15, Iss. 7, pp. 102860-102860
Open Access | Times Cited: 11
Botnets Unveiled: A Comprehensive Survey on Evolving Threats and Defense Strategies
Mehdi Asadi, Mohammad Ali Jabraeil Jamali, Arash Heidari, et al.
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 11
Open Access | Times Cited: 9
Mehdi Asadi, Mohammad Ali Jabraeil Jamali, Arash Heidari, et al.
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 11
Open Access | Times Cited: 9
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
Neder Karmous, Mohamed Ould-Elhassen Aoueileyine, Manel Abdelkader, et al.
Sensors (2024) Vol. 24, Iss. 15, pp. 5022-5022
Open Access | Times Cited: 6
Neder Karmous, Mohamed Ould-Elhassen Aoueileyine, Manel Abdelkader, et al.
Sensors (2024) Vol. 24, Iss. 15, pp. 5022-5022
Open Access | Times Cited: 6
Performance Evaluation of Deep Learning Models for Classifying Cybersecurity Attacks in IoT Networks
Fray L. Becerra-Suarez, Víctor A. Tuesta-Monteza, Heber I. Mejía-Cabrera, et al.
Informatics (2024) Vol. 11, Iss. 2, pp. 32-32
Open Access | Times Cited: 5
Fray L. Becerra-Suarez, Víctor A. Tuesta-Monteza, Heber I. Mejía-Cabrera, et al.
Informatics (2024) Vol. 11, Iss. 2, pp. 32-32
Open Access | Times Cited: 5
Classification of Internet of Things Cybersecurity Attacks Using a Hybrid Deep Learning Approach
Eman Karkawi Kareem, Mehdi Ebady Manaa
Communications in computer and information science (2025), pp. 186-200
Closed Access
Eman Karkawi Kareem, Mehdi Ebady Manaa
Communications in computer and information science (2025), pp. 186-200
Closed Access
Two‐Stage Botnet Detection Method Based on Feature Selection for Industrial Internet of Things
Shu Jian, J.-H Lu
IET Information Security (2025) Vol. 2025, Iss. 1
Open Access
Shu Jian, J.-H Lu
IET Information Security (2025) Vol. 2025, Iss. 1
Open Access
ERINDA: A novel framework for Enhancing the Resilience of Industrial Networks against DDoS Attacks with adaptive recovery
Thuraya N.I. Alrumaih, Mohammed J. F. Alenazi
Alexandria Engineering Journal (2025) Vol. 121, pp. 248-262
Closed Access
Thuraya N.I. Alrumaih, Mohammed J. F. Alenazi
Alexandria Engineering Journal (2025) Vol. 121, pp. 248-262
Closed Access
Securing IIoT systems against DDoS attacks with adaptive moving target defense strategies
Swati, Sangita Roy, Jawar Singh, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Swati, Sangita Roy, Jawar Singh, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
An Unsupervised Generative Adversarial Network System to Detect DDoS Attacks in SDN
Daniel Matheus Brandão Lent, Vitor Gabriel da Silva Ruffo, Luiz F. Carvalho, et al.
IEEE Access (2024) Vol. 12, pp. 70690-70706
Open Access | Times Cited: 4
Daniel Matheus Brandão Lent, Vitor Gabriel da Silva Ruffo, Luiz F. Carvalho, et al.
IEEE Access (2024) Vol. 12, pp. 70690-70706
Open Access | Times Cited: 4
Securing Cloud-Based Internet of Things: Challenges and Mitigations
Nivedita Singh, Rajkumar Buyya, Hyoungshick Kim
Sensors (2024) Vol. 25, Iss. 1, pp. 79-79
Open Access | Times Cited: 3
Nivedita Singh, Rajkumar Buyya, Hyoungshick Kim
Sensors (2024) Vol. 25, Iss. 1, pp. 79-79
Open Access | Times Cited: 3
Fuzzy based multi‐criteria based cluster head selection for enhancing network lifetime and efficient energy consumption
Ankita Srivastava, Pramod Kumar Mishra
Concurrency and Computation Practice and Experience (2023) Vol. 36, Iss. 4
Closed Access | Times Cited: 5
Ankita Srivastava, Pramod Kumar Mishra
Concurrency and Computation Practice and Experience (2023) Vol. 36, Iss. 4
Closed Access | Times Cited: 5
Secure architecture for Industrial Edge of Things(IEoT): A hierarchical perspective
Pengyong Li, Jiaqi Xia, Qian Wang, et al.
Computer Networks (2024) Vol. 251, pp. 110641-110641
Closed Access | Times Cited: 1
Pengyong Li, Jiaqi Xia, Qian Wang, et al.
Computer Networks (2024) Vol. 251, pp. 110641-110641
Closed Access | Times Cited: 1
Traditional and Blockchain Based IoT and IIoT Security in the Context of Agriculture: A Survey
Rishikesh, Ditipriya Sinha
Wireless Personal Communications (2023) Vol. 133, Iss. 4, pp. 2267-2295
Closed Access | Times Cited: 3
Rishikesh, Ditipriya Sinha
Wireless Personal Communications (2023) Vol. 133, Iss. 4, pp. 2267-2295
Closed Access | Times Cited: 3
Mitigating Adversarial Attacks against IoT Profiling
Euclides Carlos Pinto Neto, Sajjad Dadkhah, Somayeh Sadeghi, et al.
Electronics (2024) Vol. 13, Iss. 13, pp. 2646-2646
Open Access
Euclides Carlos Pinto Neto, Sajjad Dadkhah, Somayeh Sadeghi, et al.
Electronics (2024) Vol. 13, Iss. 13, pp. 2646-2646
Open Access
Detecting DDoS Attacks using Machine Learning in IoT Environment
Amine Berqia, Habiba Bouijij, Ahmed Merimi, et al.
(2024), pp. 1-8
Closed Access
Amine Berqia, Habiba Bouijij, Ahmed Merimi, et al.
(2024), pp. 1-8
Closed Access
Securing Cyberspace: A Survey on Effective Botnet Detection Strategies
Karmel Arockiasamy, Niranjana Junar
Algorithms for intelligent systems (2024), pp. 729-740
Closed Access
Karmel Arockiasamy, Niranjana Junar
Algorithms for intelligent systems (2024), pp. 729-740
Closed Access
Enhancing Industrial-IoT Cybersecurity Through Generative Models and Convolutional Neural Networks
Karima Hassini, Mohamed Lazaar
Lecture notes in networks and systems (2024), pp. 543-558
Closed Access
Karima Hassini, Mohamed Lazaar
Lecture notes in networks and systems (2024), pp. 543-558
Closed Access
Security Issues on Industrial Internet of Things: Overview and Challenges
Maoli Wang, Sun Yu, Hongtao Sun, et al.
Computers (2023) Vol. 12, Iss. 12, pp. 256-256
Open Access | Times Cited: 1
Maoli Wang, Sun Yu, Hongtao Sun, et al.
Computers (2023) Vol. 12, Iss. 12, pp. 256-256
Open Access | Times Cited: 1