OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Internet of Things (IoT) security dataset evolution: Challenges and future directions
Barjinder Kaur, Sajjad Dadkhah, Farzaneh Shoeleh, et al.
Internet of Things (2023) Vol. 22, pp. 100780-100780
Closed Access | Times Cited: 95

Showing 1-25 of 95 citing articles:

Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models
Fatima Alwahedi, Alyazia Aldhaheri, Mohamed Amine Ferrag, et al.
Internet of Things and Cyber-Physical Systems (2024) Vol. 4, pp. 167-185
Open Access | Times Cited: 63

AI-powered biometrics for Internet of Things security: A review and future vision
Ali Ismail Awad, Aiswarya Babu, Ezedin Barka, et al.
Journal of Information Security and Applications (2024) Vol. 82, pp. 103748-103748
Closed Access | Times Cited: 27

A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks
Hassan Khazane, Mohammed Ridouani, Fatima Salahdine, et al.
Future Internet (2024) Vol. 16, Iss. 1, pp. 32-32
Open Access | Times Cited: 17

Risk Factors Assessment of Smart Supply Chain in Intelligent Manufacturing Services Using DEMATEL Method With LINGUISTIC q-ROF Information
Tingjun Xu, Haolun Wang, Liangqing Feng, et al.
Journal of Operations Intelligence (2024) Vol. 2, Iss. 1, pp. 129-152
Open Access | Times Cited: 15

Just a little human intelligence feedback! Unsupervised learning assisted supervised learning data poisoning based backdoor removal
Ting Luo, Huaibing Peng, Anmin Fu, et al.
Computer Communications (2025), pp. 108052-108052
Closed Access | Times Cited: 1

Machine Learning: Models, Challenges, and Research Directions
Tala Talaei Khoei, Naima Kaabouch
Future Internet (2023) Vol. 15, Iss. 10, pp. 332-332
Open Access | Times Cited: 22

CICIoV2024: Advancing realistic IDS approaches against DoS and spoofing attack in IoV CAN bus
Euclides Carlos Pinto Neto, Hamideh Taslimasa, Sajjad Dadkhah, et al.
Internet of Things (2024) Vol. 26, pp. 101209-101209
Open Access | Times Cited: 14

IoT in energy: a comprehensive review of technologies, applications, and future directions
Oroos Arshi, Akanksha Rai, Gauri Gupta, et al.
Peer-to-Peer Networking and Applications (2024)
Closed Access | Times Cited: 9

CICIoMT2024: A benchmark dataset for multi-protocol security assessment in IoMT
Sajjad Dadkhah, Euclides Carlos Pinto Neto, Raphael Ferreira, et al.
Internet of Things (2024) Vol. 28, pp. 101351-101351
Open Access | Times Cited: 9

CICIoMT2024: Attack Vectors in Healthcare devices-A Multi-Protocol Dataset for Assessing IoMT Device Security
Sajjad Dadkhah, Euclides Carlos Pinto Neto, Raphael Ferreira, et al.
(2024)
Open Access | Times Cited: 8

A novel deep learning-based intrusion detection system for IoT DDoS security
Selman Hızal, Ünal Çavuşoğlu, Devrim Akgün
Internet of Things (2024) Vol. 28, pp. 101336-101336
Closed Access | Times Cited: 7

A review of Machine Learning (ML)-based IoT security in healthcare: A dataset perspective
Euclides Carlos Pinto Neto, Sajjad Dadkhah, Somayeh Sadeghi, et al.
Computer Communications (2023) Vol. 213, pp. 61-77
Closed Access | Times Cited: 18

ESCI-AKA: Enabling Secure Communication in an IoT-Enabled Smart Home Environment Using Authenticated Key Agreement Framework
Hisham Alasmary, Muhammad Tanveer
Mathematics (2023) Vol. 11, Iss. 16, pp. 3450-3450
Open Access | Times Cited: 16

A Novel IDS with a Dynamic Access Control Algorithm to Detect and Defend Intrusion at IoT Nodes
Moutaz Alazab, Albara Awajan, Hadeel Alazzam, et al.
Sensors (2024) Vol. 24, Iss. 7, pp. 2188-2188
Open Access | Times Cited: 6

Digital Twin and Federated Learning enabled Cyberthreat Detection System for IoT Networks
Mikail Mohammed Salim, David Camacho, Jong Hyuk Park
Future Generation Computer Systems (2024) Vol. 161, pp. 701-713
Closed Access | Times Cited: 6

Enhancing smart home device identification in WiFi environments for futuristic smart networks-based IoT
Hassan Falah Fakhruldeen, Mohamed J. Saadh, Samiullah Khan, et al.
International Journal of Data Science and Analytics (2024)
Closed Access | Times Cited: 5

SmartSentry: Cyber Threat Intelligence in Industrial IoT
Sapna Sadhwani, Urvi Kavan Modi, Raja Muthalagu, et al.
IEEE Access (2024) Vol. 12, pp. 34720-34740
Open Access | Times Cited: 5

Performance Evaluation of Deep Learning Models for Classifying Cybersecurity Attacks in IoT Networks
Fray L. Becerra-Suarez, Víctor A. Tuesta-Monteza, Heber I. Mejía-Cabrera, et al.
Informatics (2024) Vol. 11, Iss. 2, pp. 32-32
Open Access | Times Cited: 5

IoTPredictor: A security framework for predicting IoT device behaviours and detecting malicious devices against cyber attacks
Rudri Kalaria, A. S. M. Kayes, Wenny Rahayu, et al.
Computers & Security (2024) Vol. 146, pp. 104037-104037
Open Access | Times Cited: 5

NFIoT-GATE-DTL IDS: Genetic algorithm-tuned ensemble of deep transfer learning for NetFlow-based intrusion detection system for internet of things
Jing Li, Hewan Chen, Mohd Shahizan Othman, et al.
Engineering Applications of Artificial Intelligence (2025) Vol. 143, pp. 110046-110046
Open Access

Detection and mitigation of TCP-based DDoS attacks in cloud environments using a self-attention and intersample attention transformer model
G. Kirubavathi, I. R. Sumathi, J. Mahalakshmi, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 3
Closed Access

Federated Reinforcement Learning in IoT: Applications, Opportunities and Open Challenges
Euclides Carlos Pinto Neto, Somayeh Sadeghi, Xichen Zhang, et al.
Applied Sciences (2023) Vol. 13, Iss. 11, pp. 6497-6497
Open Access | Times Cited: 15

A comparative evaluation of intrusion detection systems on the edge-IIoT-2022 dataset
Taraf Al Nuaimi, Salama Al Zaabi, Mansor Alyilieli, et al.
Intelligent Systems with Applications (2023) Vol. 20, pp. 200298-200298
Open Access | Times Cited: 14

Customer perception, integration behavior, and loyalty of internet of things enterprises
Gaofei Ren, Chen Yao-yao, Maobao Yang
Technology in Society (2024) Vol. 78, pp. 102600-102600
Closed Access | Times Cited: 4

Machine Learning and IoT-Based Solutions in Industrial Applications for Smart Manufacturing: A Critical Review
Paolo Visconti, Giuseppe Rausa, Carolina Del-Valle-Soto, et al.
Future Internet (2024) Vol. 16, Iss. 11, pp. 394-394
Open Access | Times Cited: 4

Page 1 - Next Page

Scroll to top