OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

HFuzz: Towards automatic fuzzing testing of NB-IoT core network protocols implementations
Xinyao Liu, Baojiang Cui, Junsong Fu, et al.
Future Generation Computer Systems (2020) Vol. 108, pp. 390-400
Closed Access | Times Cited: 22

Showing 22 citing articles:

A Review of IoT Firmware Vulnerabilities and Auditing Techniques
Taimur Bakhshi, Bogdan Ghita, Ievgeniia Kuzminykh
Sensors (2024) Vol. 24, Iss. 2, pp. 708-708
Open Access | Times Cited: 19

A taxonomy of IoT firmware security and principal firmware analysis techniques
Ibrahim Nadir, Haroon Mahmood, Ghalib Asadullah
International Journal of Critical Infrastructure Protection (2022) Vol. 38, pp. 100552-100552
Closed Access | Times Cited: 31

Design Strategy for Narrowband Internet of Things with Its Scope and Challenges of Security Solutions
R. Reshma, N. Mohanasundaram, R. Santhosh
(2025), pp. 187-227
Closed Access

Generative fuzzer-driven vulnerability detection in the Internet of Things networks
Mohammed Tanvir Masud, Nickolaos Koroniotis, Marwa Keshk, et al.
Applied Soft Computing (2025), pp. 112973-112973
Open Access

A Smart Parking Solution by Integrating NB-IoT Radio Communication Technology into the Core IoT Platform
Esad Kadušić, Nataša Živić, Christoph Ruland, et al.
Future Internet (2022) Vol. 14, Iss. 8, pp. 219-219
Open Access | Times Cited: 19

TEEFuzzer: A fuzzing framework for trusted execution environments with heuristic seed mutation
Guoyun Duan, Yuanzhi Fu, Boyang Zhang, et al.
Future Generation Computer Systems (2023) Vol. 144, pp. 192-204
Closed Access | Times Cited: 10

A Systematic Review of IoT Systems Testing: Objectives, Approaches, Tools, and Challenges
Jean Baptiste Minani, Fatima Sabir, Naouel Moha, et al.
IEEE Transactions on Software Engineering (2024) Vol. 50, Iss. 4, pp. 785-815
Closed Access | Times Cited: 3

CT-IoT: a combinatorial testing-based path selection framework for effective IoT testing
Linghuan Hu, W. Eric Wong, D. Richard Kuhn, et al.
Empirical Software Engineering (2021) Vol. 27, Iss. 2
Closed Access | Times Cited: 8

Coverage-guided differential testing of TLS implementations based on syntax mutation
Yan Pan, Wei Lin, He Yu-Bo, et al.
PLoS ONE (2022) Vol. 17, Iss. 1, pp. e0262176-e0262176
Open Access | Times Cited: 4

Model-Based Grey-Box Fuzzing of Network Protocols
Yan Pan, Wei Lin, Liang Jiao, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-13
Open Access | Times Cited: 4

MaskFuzzer: A MaskGAN-based Industrial Control Protocol Fuzz Testing Framework
Weifeng Sun, Bowei Zhang, Jianqiao Ding, et al.
(2022), pp. 51-57
Closed Access | Times Cited: 4

An Efficient Vulnerability Detection Method for 5G NAS Protocol Based on Combinatorial Testing
Siyuan Wang, Zhiwei Cui, Jie Xu, et al.
Lecture notes on data engineering and communications technologies (2024), pp. 64-74
Closed Access

Systematic Review of Fuzzing in IoT: Evaluating Techniques, Vulnerabilities, and Research Gaps
Asma Touqir, Faisal Iradat, Abdur Rakib, et al.
Research Square (Research Square) (2024)
Closed Access

RANsacked: A Domain-Informed Approach for Fuzzing LTE and 5G RAN-Core Interfaces
Nathaniel Bennett, Zhu Wei-dong, Benjamin Simon, et al.
(2024), pp. 2027-2041
Open Access

Testing Smart Contracts
Sefa Akca, Chao Peng, Ajitha Rajan
(2021), pp. 1-11
Open Access | Times Cited: 4

Fuzzy Testing Method of CAN Bus of Charging Pile Based on Genetic Algorithm
Chang Liu, Xueqiong Wang, Tian Li, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-11
Open Access | Times Cited: 2

QoS Constrained Network Coding Technique to Data Transmission Using IoT
A. Sathishkumar, T. Rammohan, S. Sathish Kumar, et al.
Computer Systems Science and Engineering (2022) Vol. 43, Iss. 2, pp. 531-544
Open Access | Times Cited: 2

Plant Growth Monitoring Cloud Platform Based on Internet of Things
Haolun Ma, Jin Qi, Ke Li, et al.
2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP) (2021) Vol. 180, pp. 1126-1129
Closed Access | Times Cited: 2

Refraction reverse learning based hybrid Namib Antenna Beetle Optimization for resource allocation in NB-IoT platform
Manish K. Singh, Yogendra Kumar Verma
Multimedia Tools and Applications (2023) Vol. 83, Iss. 18, pp. 53687-53713
Closed Access

Berserker: ASN.1-based Fuzzing of Radio Resource Control Protocol for 4G and 5G.
Srinath Potnuru, Prajwol Kumar Nakarmi
arXiv (Cornell University) (2021)
Closed Access

Page 1

Scroll to top