OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Authentication and Identity Management of IoHT Devices: Achievements, Challenges, and Future Directions
Moustafa Mamdouh, Ali Ismail Awad, Ashraf A. M. Khalaf, et al.
Computers & Security (2021) Vol. 111, pp. 102491-102491
Open Access | Times Cited: 81

Showing 1-25 of 81 citing articles:

Data Protection and Privacy of the Internet of Healthcare Things (IoHTs)
Jahanzeb Shahid, Rizwan Ahmad, Adnan K. Kiani, et al.
Applied Sciences (2022) Vol. 12, Iss. 4, pp. 1927-1927
Open Access | Times Cited: 115

Artificial intelligence for IoMT security: A review of intrusion detection systems, attacks, datasets and Cloud–Fog–Edge architectures
Mireya Lucia Hernandez-Jaimes, Alfonso Martínez-Cruz, Kelsey Alejandra Ramírez-Gutiérrez, et al.
Internet of Things (2023) Vol. 23, pp. 100887-100887
Open Access | Times Cited: 68

A review of multi-factor authentication in the Internet of Healthcare Things
Tance Suleski, Mohiuddin Ahmed, Wencheng Yang, et al.
Digital Health (2023) Vol. 9, pp. 205520762311771-205520762311771
Open Access | Times Cited: 49

A blockchain-enabled privacy-preserving authentication management protocol for Internet of Medical Things
Junfeng Miao, Zhaoshun Wang, Zeqing Wu, et al.
Expert Systems with Applications (2023) Vol. 237, pp. 121329-121329
Closed Access | Times Cited: 43

AI-powered biometrics for Internet of Things security: A review and future vision
Ali Ismail Awad, Aiswarya Babu, Ezedin Barka, et al.
Journal of Information Security and Applications (2024) Vol. 82, pp. 103748-103748
Closed Access | Times Cited: 28

Machine learning in identity and access management systems: Survey and deep dive
Sara Aboukadri, Aafaf Ouaddah, Abdellatif Mezrioui
Computers & Security (2024) Vol. 139, pp. 103729-103729
Closed Access | Times Cited: 23

A Survey on Cybersecurity in IoT
Ηλίας Δρίτσας, Μαρία Τρίγκα
Future Internet (2025) Vol. 17, Iss. 1, pp. 30-30
Open Access | Times Cited: 2

Intelligent authentication of 5G healthcare devices: A survey
Ali Hassan Sodhro, Ali Ismail Awad, Jaap van de Beek, et al.
Internet of Things (2022) Vol. 20, pp. 100610-100610
Open Access | Times Cited: 53

A systematic and critical review of Internet of Things in contemporary hospitality: a roadmap and avenues for future research
Zakaria Elkhwesky, Esraa Fayez Youssif Elkhwesky
International Journal of Contemporary Hospitality Management (2022) Vol. 35, Iss. 2, pp. 533-562
Closed Access | Times Cited: 41

An Improved Mutual Information Feature Selection Technique for Intrusion Detection Systems in the Internet of Medical Things
Mousa Alalhareth, Sungchul Hong
Sensors (2023) Vol. 23, Iss. 10, pp. 4971-4971
Open Access | Times Cited: 24

TFAS: two factor authentication scheme for blockchain enabled IoMT using PUF and fuzzy extractor
Namrata Singh, Ayan Kumar Das
The Journal of Supercomputing (2023) Vol. 80, Iss. 1, pp. 865-914
Closed Access | Times Cited: 23

Securing Wireless Sensor Networks Using Machine Learning and Blockchain: A Review
Shereen Ismail, Diana W. Dawoud, Hassan Reza
Future Internet (2023) Vol. 15, Iss. 6, pp. 200-200
Open Access | Times Cited: 22

A comprehensive and systematic literature review on intrusion detection systems in the internet of medical things: current status, challenges, and opportunities
Arezou Naghib, Farhad Soleimanian Gharehchopogh, Azadeh Zamanifar
Artificial Intelligence Review (2025) Vol. 58, Iss. 4
Open Access | Times Cited: 1

Blockchain-Based Identity Management Systems in Health IoT: A Systematic Review
Bandar Alamri, Katie Crowley, Ita Richardson
IEEE Access (2022) Vol. 10, pp. 59612-59629
Open Access | Times Cited: 36

An Intelligent Two-Layer Intrusion Detection System for the Internet of Things
Mohammed M. Alani, Ali Ismail Awad
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 1, pp. 683-692
Closed Access | Times Cited: 33

Hardware Security for Internet of Things Identity Assurance
André Cirne, Patrícia R. Sousa, João S. Resende, et al.
IEEE Communications Surveys & Tutorials (2024) Vol. 26, Iss. 2, pp. 1041-1079
Closed Access | Times Cited: 7

Blockchain-Based Authentication Schemes in Smart Environments: A Systematic Literature Review
Mustafa A. Al Sibahee, Zaid Ameen Abduljabbar, Alladoumbaye Ngueilbaye, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 21, pp. 34774-34796
Closed Access | Times Cited: 7

Blockchain–Cloud Integration: A Survey
Abhirup Khanna, Anushree Sah, Vadim Bolshev, et al.
Sensors (2022) Vol. 22, Iss. 14, pp. 5238-5238
Open Access | Times Cited: 26

Authentication in the Internet of Medical Things: Taxonomy, Review, and Open Issues
Norah Alsaeed, Farrukh Nadeem
Applied Sciences (2022) Vol. 12, Iss. 15, pp. 7487-7487
Open Access | Times Cited: 26

Access management of IoT devices using access control mechanism and decentralized authentication: A review
Inderpal Singh, Balraj Singh
Measurement Sensors (2022) Vol. 25, pp. 100591-100591
Open Access | Times Cited: 25

Developing an IoT Identity Management System Using Blockchain
Sitalakshmi Venkatraman, Sazia Parvin
Systems (2022) Vol. 10, Iss. 2, pp. 39-39
Open Access | Times Cited: 23

A Systematic Review and IoMT Based Big Data Framework for COVID-19 Prevention and Detection
Soomaiya Hamid, Narmeen Zakaria Bawany, Ali Hassan Sodhro, et al.
Electronics (2022) Vol. 11, Iss. 17, pp. 2777-2777
Open Access | Times Cited: 23

A Blockchain-based IoT Security Solution Using Multichain
Shereen Ismail, Hassan Reza, Hossein Kashani Zadeh, et al.
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) (2023)
Closed Access | Times Cited: 15

A Deep Learning-Based Framework for Strengthening Cybersecurity in Internet of Health Things (IoHT) Environments
Sarah A. Algethami, Sultan S. Alshamrani
Applied Sciences (2024) Vol. 14, Iss. 11, pp. 4729-4729
Open Access | Times Cited: 5

COIChain: Blockchain scheme for privacy data authentication in cross-organizational identification
Zhexuan Yang, Xiao Qu, Zeng Chen, et al.
Computer Communications (2025), pp. 108054-108054
Closed Access

Page 1 - Next Page

Scroll to top