OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

DDoS attacks in Industrial IoT: A survey
Shubhankar Chaudhary, Pramod Kumar Mishra
Computer Networks (2023) Vol. 236, pp. 110015-110015
Closed Access | Times Cited: 19

Showing 19 citing articles:

Blockchain Based an Efficient and Secure Privacy Preserved Framework for Smart Cities
Adla Padma, Mangayarkarasi Ramaiah
IEEE Access (2024) Vol. 12, pp. 21985-22002
Open Access | Times Cited: 21

Botnet‐based IoT network traffic analysis using deep learning
N. Joychandra Singh, Nazrul Hoque, Kh. Robindro Singh, et al.
Security and Privacy (2023) Vol. 7, Iss. 2
Closed Access | Times Cited: 21

Modeling time-varying wide-scale distributed denial of service attacks on electric vehicle charging Stations
Tawfiq M. Aljohani, Abdulaziz Almutairi
Ain Shams Engineering Journal (2024) Vol. 15, Iss. 7, pp. 102860-102860
Open Access | Times Cited: 11

Botnets Unveiled: A Comprehensive Survey on Evolving Threats and Defense Strategies
Mehdi Asadi, Mohammad Ali Jabraeil Jamali, Arash Heidari, et al.
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 11
Open Access | Times Cited: 9

Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
Neder Karmous, Mohamed Ould-Elhassen Aoueileyine, Manel Abdelkader, et al.
Sensors (2024) Vol. 24, Iss. 15, pp. 5022-5022
Open Access | Times Cited: 6

Performance Evaluation of Deep Learning Models for Classifying Cybersecurity Attacks in IoT Networks
Fray L. Becerra-Suarez, Víctor A. Tuesta-Monteza, Heber I. Mejía-Cabrera, et al.
Informatics (2024) Vol. 11, Iss. 2, pp. 32-32
Open Access | Times Cited: 5

Classification of Internet of Things Cybersecurity Attacks Using a Hybrid Deep Learning Approach
Eman Karkawi Kareem, Mehdi Ebady Manaa
Communications in computer and information science (2025), pp. 186-200
Closed Access

ERINDA: A novel framework for Enhancing the Resilience of Industrial Networks against DDoS Attacks with adaptive recovery
Thuraya N.I. Alrumaih, Mohammed J. F. Alenazi
Alexandria Engineering Journal (2025) Vol. 121, pp. 248-262
Closed Access

Securing IIoT systems against DDoS attacks with adaptive moving target defense strategies
Swati, Sangita Roy, Jawar Singh, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access

An Unsupervised Generative Adversarial Network System to Detect DDoS Attacks in SDN
Daniel Matheus Brandão Lent, Vitor Gabriel da Silva Ruffo, Luiz F. Carvalho, et al.
IEEE Access (2024) Vol. 12, pp. 70690-70706
Open Access | Times Cited: 4

Securing Cloud-Based Internet of Things: Challenges and Mitigations
Nivedita Singh, Rajkumar Buyya, Hyoungshick Kim
Sensors (2024) Vol. 25, Iss. 1, pp. 79-79
Open Access | Times Cited: 3

Fuzzy based multi‐criteria based cluster head selection for enhancing network lifetime and efficient energy consumption
Ankita Srivastava, Pramod Kumar Mishra
Concurrency and Computation Practice and Experience (2023) Vol. 36, Iss. 4
Closed Access | Times Cited: 5

Secure architecture for Industrial Edge of Things(IEoT): A hierarchical perspective
Pengyong Li, Jiaqi Xia, Qian Wang, et al.
Computer Networks (2024) Vol. 251, pp. 110641-110641
Closed Access | Times Cited: 1

Traditional and Blockchain Based IoT and IIoT Security in the Context of Agriculture: A Survey
Rishikesh, Ditipriya Sinha
Wireless Personal Communications (2023) Vol. 133, Iss. 4, pp. 2267-2295
Closed Access | Times Cited: 3

Mitigating Adversarial Attacks against IoT Profiling
Euclides Carlos Pinto Neto, Sajjad Dadkhah, Somayeh Sadeghi, et al.
Electronics (2024) Vol. 13, Iss. 13, pp. 2646-2646
Open Access

Detecting DDoS Attacks using Machine Learning in IoT Environment
Amine Berqia, Habiba Bouijij, Ahmed Merimi, et al.
(2024), pp. 1-8
Closed Access

Securing Cyberspace: A Survey on Effective Botnet Detection Strategies
Karmel Arockiasamy, Niranjana Junar
Algorithms for intelligent systems (2024), pp. 729-740
Closed Access

Enhancing Industrial-IoT Cybersecurity Through Generative Models and Convolutional Neural Networks
Karima Hassini, Mohamed Lazaar
Lecture notes in networks and systems (2024), pp. 543-558
Closed Access

Security Issues on Industrial Internet of Things: Overview and Challenges
Maoli Wang, Sun Yu, Hongtao Sun, et al.
Computers (2023) Vol. 12, Iss. 12, pp. 256-256
Open Access | Times Cited: 1

Page 1

Scroll to top