OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Blockchain-based Intrusion Detection System of IoT urban data with device authentication against DDoS attacks
E. Suresh Babu, SrinivasaRao BKN, Soumya Ranjan Nayak, et al.
Computers & Electrical Engineering (2022) Vol. 103, pp. 108287-108287
Closed Access | Times Cited: 29

Showing 1-25 of 29 citing articles:

A Survey of Blockchain Applications for Management in Agriculture and Livestock Internet of Things
Yang Yang, Min Lin, Yangfei Lin, et al.
Future Internet (2025) Vol. 17, Iss. 1, pp. 40-40
Open Access | Times Cited: 1

Tides of Blockchain in IoT Cybersecurity
Love Allen Chijioke Ahakonye, Cosmas Ifeanyi Nwakanma, Dong‐Seong Kim
Sensors (2024) Vol. 24, Iss. 10, pp. 3111-3111
Open Access | Times Cited: 7

Systematic Literature Review of IoT Botnet DDOS Attacks and Evaluation of Detection Techniques
Metehan Gelgi, Yueting Guan, Sanjay Arunachala, et al.
Sensors (2024) Vol. 24, Iss. 11, pp. 3571-3571
Open Access | Times Cited: 7

Insights into Modern Intrusion Detection Strategies for Internet of Things Ecosystems
Bassey Isong, Otshepeng Kgote, Adnan M. Abu‐Mahfouz
Electronics (2024) Vol. 13, Iss. 12, pp. 2370-2370
Open Access | Times Cited: 6

A Comprehensive Review of Block Chain Based Multi Factor Authentication
Abdul Rahman Khan, Parma Nand, Bharat Bhushan, et al.
Lecture notes in networks and systems (2025), pp. 713-726
Closed Access

An optimized Bi-LSTM with deep learning-based intrusion detection system in healthcare using Blockchain
Swathi Darla, C. Naveena, B N Ajay, et al.
Information Security Journal A Global Perspective (2025), pp. 1-14
Closed Access

Sec-edge: Trusted blockchain system for enabling the identification and authentication of edge based 5G networks
E. Suresh Babu, Amogh Barthwal, Rajesh Kaluri
Computer Communications (2022) Vol. 199, pp. 10-29
Closed Access | Times Cited: 25

FL-CTIF: A federated learning based CTI framework based on information fusion for secure IIoT
Mikail Mohammed Salim, Abir El Azzaoui, Xianjun Deng, et al.
Information Fusion (2023) Vol. 102, pp. 102074-102074
Closed Access | Times Cited: 15

Fog‐Sec: Secure end‐to‐end communication in fog‐enabled IoT network using permissioned blockchain system
E. Suresh Babu, Mekala Srinivasa Rao, Gandharba Swain, et al.
International Journal of Network Management (2023) Vol. 33, Iss. 5
Closed Access | Times Cited: 12

Evaluating the Barriers to Blockchain Adoption in the Energy Sector: A Multicriteria Approach Using the Analytical Hierarchy Process for Group Decision Making
Ioanna Andreoulaki, Aikaterini Papapostolou, Vangelis Marinakis
Energies (2024) Vol. 17, Iss. 6, pp. 1278-1278
Open Access | Times Cited: 5

Blockchain-based IoT security solutions for IDS research centers
Selman Hızal, A. F. M. Suaib Akhter, Ünal Çavuşoğlu, et al.
Internet of Things (2024) Vol. 27, pp. 101307-101307
Closed Access | Times Cited: 4

Hybrid deep learning-based cyberthreat detection and IoMT data authentication model in smart healthcare
Manish Kumar, Sushil Kumar Singh, Sunggon Kim
Future Generation Computer Systems (2025), pp. 107711-107711
Closed Access

An Optimized Intelligent Computational Security Model for Interconnected Blockchain-IoT System & Cities
Sunil Kumar, Aman Singh, Abderrahim Benslimane, et al.
Ad Hoc Networks (2023) Vol. 151, pp. 103299-103299
Open Access | Times Cited: 11

Survey and classification of Dos and DDos attack detection and validation approaches for IoT environments
Mohamed Riadh Kadri, Abdelkrim Abdelli, Jalel Ben‐Othman, et al.
Internet of Things (2023) Vol. 25, pp. 101021-101021
Closed Access | Times Cited: 11

Blockchain-Assisted Machine Learning with Hybrid Metaheuristics-Empowered Cyber Attack Detection and Classification Model
Ashwag Albakri, Bayan Alabdullah, Fatimah Alhayan
Sustainability (2023) Vol. 15, Iss. 18, pp. 13887-13887
Open Access | Times Cited: 9

Blockchain as a driver for transformations in the public sector
Maria José Sousa
Policy Design and Practice (2023) Vol. 6, Iss. 4, pp. 415-432
Open Access | Times Cited: 7

BlockFog: A Blockchain-based Framework for Intrusion Defense in IOT Fog Computing
Prasuna VG, B. Ravindra Babu, Bhasha Pydala
Scalable Computing Practice and Experience (2024) Vol. 25, Iss. 3, pp. 1950-1962
Open Access | Times Cited: 2

Blockchain-Assisted Secure Smart Home Network Using Gradient-Based Optimizer With Hybrid Deep Learning Model
Latifah Almuqren, Khalid Mahmood, Sumayh S. Aljameel, et al.
IEEE Access (2023) Vol. 11, pp. 86999-87008
Open Access | Times Cited: 6

Interactive Use of Deep Learning and Ethereum Blockchain for the Security of IIoT Sensor Data
Emrullah Şahin, Naciye Nur Arslan, Fırat Aydemir
Bilecik Şeyh Edebali Üniversitesi Fen Bilimleri Dergisi (2024), pp. 369-384
Open Access | Times Cited: 1

Evaluation of soft computing in intrusion detection for secure social Internet of Things based on collaborative edge computing
Bishwajeet Kumar Pandey, Ashendra Kumar Saxena, Amit Barve, et al.
Soft Computing (2023)
Closed Access | Times Cited: 4

An efficient blockchain‐based approach to improve the accuracy of intrusion detection systems
Ahmed Aliyu, Jinshuo Liu, Ezekia Gilliard
Electronics Letters (2023) Vol. 59, Iss. 18
Open Access | Times Cited: 4

Improved Adaptive Spiral Seagull Optimizer for Intrusion Detection and Mitigation in Wireless Sensor Network
Swathi Darla, C. Naveena
SN Computer Science (2024) Vol. 5, Iss. 4
Closed Access

Advancing knowledge management in machine-to-machine communication - A comparative analysis of stacked ensembles for IoT device classification mechanisms
Ganesh Shivaji Pise, Sachin D. Babar, Parikshit N. Mahalle
AIP conference proceedings (2024) Vol. 3214, pp. 020049-020049
Closed Access

Blockchain-Based Security Optimization for Iot Systems: State of the Art
Chahrazad Adouane, Sonia Sabrina Bendib, Hamouma Moumen
Studies in systems, decision and control (2024), pp. 531-541
Closed Access

Page 1 - Next Page

Scroll to top